2
Chapter 3 Installation 29
3.1 System Requirements................................................................................................30
3.1.1 Installation on Microsoft Exchange Server 2003 ............................................30
3.1.2 Installation on Microsoft Exchange Server 2007 ............................................32
3.1.3 Installation on Microsoft Exchange Server 2010 ............................................34
3.2 Centralized Management Requirements....................................................................35
3.3 Other System Component Requirements ..................................................................35
3.3.1 SQL Server Requirements .............................................................................36
3.3.2 Additional Windows Components...................................................................38
3.3.3 Web Browser Software Requirements ...........................................................38
3.4 Improving Reliability and Performance ......................................................................38
3.5 Centrally Administered or Stand-alone Installation? ..................................................39
3.6 Installation Overview ..................................................................................................40
3.7 Installing F-Secure Anti-Virus for Microsoft Exchange...............................................41
3.8 After the Installation ...................................................................................................54
3.8.1 Importing Product MIB files to F-Secure Policy Manager Console.................54
3.8.2 Configuring the Product..................................................................................55
3.9 Upgrading from Previous Product Versions ...............................................................57
3.10 Upgrading the Evaluation Version..............................................................................59
3.11 Uninstalling F-Secure Anti-Virus for Microsoft Exchange ..........................................60
Chapter 4 Configuring F-Secure Spam Control 61
4.1 Overview ....................................................................................................................62
4.2 Realtime Blackhole List Configuration .......................................................................63
4.2.1 Configuring Realtime Blackhole Lists .............................................................63
4.2.2 Optimizing F-Secure Spam Control Performance .......................................... 65
Appendix A Deploying the Product on a Cluster 67
A.1 Installation Overview ................................................................................................. 68
A.2 Creating Quarantine Storage .....................................................................................70
A.2.1 Quarantine Storage in Active-Passive Cluster ............................................... 70
A.2.2 Quarantine Storage in Active-Active Cluster ..................................................75
A.2.3 Creating the Quarantine Storage for a Single Copy Cluster Environment .....78