Manuel d'utilisation / d'entretien du produit Security for Exchange du fabricant Bitdefender
Aller à la page of 243
EXCHANGE Administrator's guide.
BitDefender Security for Exchange Administrator's guide Published 2010.05.21 Copyright© 2010 BitDefender Legal Notice All rights reserved. No part of this book may be reproduced or transmitted i.
She came to me one morning, one lonely Sunday morning Her long hair flowing in the mid-winter wind I know not how she found me, for in darkness I was walking And destruction lay around me, from a figh.
T able of Contents License and W arranty .. .. .. .. .. ... .. .. .. ... .. .. .. .. ... .. .. .. ... .. .. .. .. .. viii Preface .. ... .. .. .. ... .. .. .. .. ... .. .. .. ... .. .. .. .. ... .. .. .. ... .. .. .. .. ... .. .. xiii 1. Conventions Used in This Book .
6.2. Mailbox (VSAPI) Scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 Configuration and Management ............................ 27 7. Getting Started . .. ... .. .. .. .. ... .. .. .. ... .. .. ..
10.3. Configuring Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121 1 1. Antivirus . .. .. .. .. ... .. .. .. ... .. .. .. .. ... .. .. .. ... .. .. .. .. ... .. .. .. . 124 1 1.1. Real-time Antivirus Protection .
16. General . .. .. .. ... .. .. .. .. ... .. .. .. ... .. .. .. .. ... .. .. .. ... .. .. .. .. .. 213 16.1. Report Virus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213 16.2. Report Incidents .
License and W arranty IF YOU DO NOT AGREE TO THESE TERMS AND CONDITIONS DO NOT INST ALL THE SOFTW ARE. BY SELECTING "I ACCEPT", "OK", "CONTINUE", "YES" OR BY INST ALLING OR USING THE SOFTW ARE IN ANY WA Y , YOU ARE INDICA TING YOUR COMPLETE UNDERST ANDING AND ACCEPT ANCE OF THE TERMS OF THIS AGREEMENT .
(excepting the case when the desktop computer provides network services by running BitDefender Management Server). Each user may install this software on a single computer or on a single operating system and may make one additional copy for backup on a different device.
COPYRIGHT . All rights, titles and interest in and to BitDefender and all copyright rights in and to BitDefender (including but not limited to any images, photographs, logos, animations, video, audio,.
INCIDENT AL OR CONSEQUENTIAL DAMAGES, SO THE ABOVE LIMIT A TION OR EXCLUSION MA Y NOT APPL Y TO YOU. IN NO CASE SHALL BITDEFENDER'S LIABILITY EXCEED THE PURCHASE PRICE P AID BY YOU FOR BITDEFENDER. The disclaimers and limitations set forth above will apply regardless of whether you accept to use, evaluate, or test BitDefender .
Contact BitDefender , at 24 Preciziei Street, West Gate Park, Building H2, ground floor , Sector 6, Bucharest, Romania, or at T el No: 40-21-206.34.70 or Fax: 40-21-264.
Preface This guide is intended to all network administrators who have chosen BitDefender Security for Exchange as a security solution for their company's Microsoft Exchange servers. The information presented in this book is suitable not only for computer literates, it is accessible to everyone who is able to work under Windows.
1.2. Admonitions The admonitions are in-text notes, graphically marked, bringing to your attention additional information related to the current paragraph. Note The note is just a short observation. Although you can omit it, the notes can provide valuable information, such as specific feature or a link to some related topic.
3. Request for Comments We invite you to help us improve the book. We have tested and verified all of the information to the best of our ability . Please write to tell us about any flaws you find in this book or how you think it could be improved, to help us provide you with the best documentation possible.
Installation 1 BitDefender Security for Exchange.
1. System Requirements Before installing the product, make sure that your system meets the following minimum system requirements: ● Operating system: Windows 2000 with Service Pack 4 and Update .
2. Installing BitDefender Security for Exchange In order to install BitDefender Security for Exchange, you need an installation file or an installation CD that contains the installation package. The installation file comes under different names, depending on the BitDefender business products it contains.
BitDefender will also check if BitDefender Security for Exchange is already installed on the local computer . If the same version as the one in the setup file is installed, you will have to modify the existing configuration.
2. Please read the License Agreement, select I accept the terms in the License Agreement and click Next . Note If you do not agree to these terms click Cancel .
6. If you do not want the readme file to be opened at the end of the installation, clear the View Readme file check box. Click Install in order to begin the installation of the product. Note BitDefender will automatically detect your version of Microsoft Exchange Server.
3. Repairing or Removing BitDefender If you want to modify , repair or remove BitDefender , follow this path from the Windows start menu: Start → Programs → BitDefender Security for Windows Servers → Modify , Repair or Uninstall . Y ou will be requested to confirm your choice by clicking Next .
T o install a product, click the corresponding arrow and then select Will be installed on local hard drive on the shortcut menu. T o remove a product, click the corresponding arrow and then select Entire feature will be unavailable on the shortcut menu.
An error occurred while removing BitDefender If an error has occurred while removing BitDefender , the removal process will be aborted and a new window will appear .
Description 10 BitDefender Security for Exchange.
4. Features and Benefits Comprehensive protection for Exchange Servers BitDefender Security for Exchange provides antivirus, antispyware, antispam, antiphishing, attachment and content filtering seamlessly integrated with the MS Exchange Server , to create a malware free messaging environment.
Through its optimized scanning process, increases mail delivery speed and reduces server workload Improves the IT manager's productivity and prevents the loss of confidential information .
Easy-to-interpret statistics and reports based on the information received from BitDefender Security for Exchange 4.2. Key Features ● Certified antivirus engines ● Proactive heuristic protecti.
Upgrades. Registered users benefit from free upgrades to any new version of the product during the license period. Special price offers are also available to returning customers. Free 24/7 Professional T echnical Support. Certified representatives provide BitDefender business customers with free permanent support online, by telephone or e-mail.
5. Core Modules The core functionalities of BitDefender Security for Exchange are defined by 4 modules: Antivirus , Antispam , Content Filtering and Attachment Filtering .
Note By default background scanning is disabled. Y ou should enable it only as a second layer of protection when you want to check all your databases and make sure they are clean. ● Proactive scanning allows scanning messages before they are actually accessed.
Different filtering policies can be defined for users and user groups. The rules are those that specify which filters to use to analyze the message and the actions to take on spam, based on the groups to which the sender and the recipients belong.
address of the sender matches one of the IP addresses provided for the specified domain. If the domain address of the sender matches an associated IP address, the message is considered legitimate and antispam filtering stops. Otherwise, the message is considered SP AM and the connection is dropped.
Note These filters can be enabled and configured by the administrator separately for each rule. In order to configure them, go to the Antispam module, Policies section and set the appropriate rules. For more details, please refer to “ Creating Rules ” (p.
BitDefender maintains a database of such links. The URL filter checks every URL link in a message against its database. If a match is made, the message is tagged as SP AM. Image Filter Since avoiding heuristic filter detection has become quite a challenge, images are increasingly used in spam messages.
5.3. Content Filtering Content Filtering checks messages to see if the subject, the sender ’s or the recipient(s)’ address contain certain specified strings. If a defined string matches one of these mail headers, the message is detected and the specified action is taken.
6. How Does It W ork? BitDefender Security for Exchange scans e-mail messages both at SMTP (Simple Mail Transfer Protocol) level and at mailbox, or VSAPI (Virus Scanning Application Program), level. E-mail messages entering or leaving the Exchange server are scanned at SMTP level.
Connection Level When an attempt is made to establish a connection, the message is checked against the Allow / Deny IP List . If there is a match, the connection is dropped. Otherwise, the message is checked against the global Sender Black List . If the filter finds a match, the connection is dropped.
4. "Block sexually explicit content" Filter . If the message matches the filtering rule, it is considered SP AM, the antispam filtering stops and the specified action is taken on the message.
6.1.3. Attachment Filtering If the message is not deleted during content filtering, then the mail attachments, if any , are verified according to a specific attachment filtering group policy . The message is checked against the attachment filtering rules, by order of priority , until the sender and the recipients of the message match a rule.
by BitDefender . The scanning is performed according to the options specified by the default antivirus rule. Real-time VSAPI scanning can also be done through three additional methods, intended to optimize the overall scanning process: background, proactive or transport scanning.
Configuration and Management 27 BitDefender Security for Exchange.
7. Getting Started BitDefender Security for Exchange can be configured and managed through a centralized, MMC-based management console. The management console provides access to all features and settings of BitDefender Security for Exchange.
Statistics - offers real-time statistical information regarding the activity of the Antivirus, Antispam, Content Filtering and Attachment Filtering modules.
Important T o remotely manage a BitDefender Security for Exchange product, you must first set an administrative password for the respective product. T o connect to a BitDefender Security for Exchange product installed on a remote computer , follow these steps: 1.
Change administrative password 3. In the Password field, type the desired administrative password. 4. In the Confirm password field, type the password again. 5. Click OK 7.3. Exporting/Importing Product Settings Y ou can export and import the product settings.
3. Select the folder where to save the product settings and click OK . 7.3.2. Importing Product Settings T o import previously saved product settings, follow these steps: 1. Right-click BitDefender Security for Exchange in the tree menu. 2. From the contextual menu, select Import product settings to open the Import T ool.
4. Select the folder where the product settings were saved and click OK to import them. 5. W ait until the Import T ool completes the importing process. Importing Settings The Import T ool first stops the Microsoft Exchange Transport service, the Microsoft Information Store and the BitDefender Security for Exchange services.
Finish Click Exit to close the window . Getting Started 34 BitDefender Security for Exchange.
8. Registration and My Account BitDefender Security for Exchange comes with a 30-day trial period. If you decide that BitDefender Security for Exchange is the best choice for your organization, proceed to register its full version.
8.1. Step 1/3 - Register BitDefender Security for Exchange Registration If you do not have a BitDefender license, click the provided link to go to the BitDefender online store and purchase a license key .
8.2. Step 2/3 - Register a BitDefender Account Account Registratiion I do not have a BitDefender account T o create a BitDefender account, select Create a new BitDefender account and provide the required information. The data you provide here will remain confidential.
Note Use the provided e-mail address and password to log in to your account at http://myaccount.bitdefender .com . Click Create account . T o successfully create an account you must first activate your e-mail address. Check your e-mail address and follow the instructions in the e-mail sent to you by the BitDefender registration service.
8.3. Step 3/3 - Finish Finish Click Finish to close the window . Note T o log in to your BitDefender account, click My account . Registration and My Account 39 BitDefender Security for Exchange.
9. Monitoring The Monitoring snap-in provides you with all the necessary means to monitor and control the product activity . If you click Monitoring in the tree menu, the dashboard will be displayed.
9.1. Dashboard Click Monitoring in the tree menu to see the dashboard. Dashboard The dashboard provides you with useful information on the status of BitDefender Security for Exchange and helps you easily solve the issues that require your attention.
9.1.1. Important Links At the top of the dashboard there are several useful links. Description Link Opens a web page where you can buy the product from. Buy Opens your BitDefender account web page. My Account Opens the registration wizard . Register Opens the BitDefender support web page.
T o find out details about these issues, do one of the following: ● Click a status button to see the respective category of issues. ● Click corresponding to Issue details to expand this section and see all possible issues. The Issue details section contains three tables, one for each status button.
Description Status Critical issue. Antispam filtering is disabled and the Exchange server is not protected against spam. Not enabled Click Fix to enable antispam filtering. ● Content Filtering. The issues that can be reported are listed in the following table: Description Status Requires attention.
Description Status 2. Not an issue. Attachment filtering is not enabled and no attachment filtering rule is configured. Update Status If the Update Status button is orange or red, there are update issues affecting BitDefender Security for Exchange. Click the button to see the respective issues.
Description Status Critical issue. A new product update has been downloaded and it is not installed on your system. Product update downloaded, please install it Clicking Fix will install the update. If the update requires stopping traf fic or rebooting the server , you will have to confirm your choice by clicking OK .
License Status If the License Status button is orange or red, there are issues concerning the license of your BitDefender Security for Exchange. Note The License Status button and the related issues are not available if BitDefender Security for Exchange is managed by BitDefender Management Server .
Description Status Requires attention. Y ou have not registered an account yet. Y ou do not have an account. Please create an account Click Fix to open the registration wizard and create a new account or provide the details of an existing one. Click Fix to open the registration wizard where you can create a new account or log in to an existing one.
The statistics are grouped based on the core modules: Antivirus, Antispam, Content Filtering and Attachment Filtering. 9.1.4. Product Status T o see information on the product status, click corresponding to the Product status section.
Statistics There are five main windows which provide real-time statistical information on the overall product activity and the activity of the Antivirus, Antispam, Content Filtering and Attachment Filtering modules.
Description T ype Shows the top of the malware detected. T op Malware Lists mail senders based on the quantity of malware sent. T op Malware Senders Lists mail recipients based on the quantity of malware received. T op Malware Recipients ● Antispam.
9.2.1. Clearing All Records By default, BitDefender automatically erases statistical information older than one week. If you wish to keep the statistical information for a different period of time, click the Purge Options button and set the number of days / weeks / months for which statistics are to be stored.
Reports Y ou can see all the existing reports listed in the table. For each report, the following information is provided: the report name, the date when the report was generated, the type of information it contains and the format. Y ou can create the following types of reports: ● Antivirus.
Description Report T ype Contains the mail senders ordered by the quantity of malware sent. T op Malware Senders Contains the mail recipients ordered by the number of malware received. T op Malware Recipients ● Antispam. Create custom reports with information on the activity of the Antispam module.
Description Report T ype Provides complete information on the activity of the Attachment Filtering module. T otal Contains the mail senders ordered by the number of attachment filtering rules matched. T op V olume Senders Contains the mail recipients ordered by the number of attachment filtering rules matched.
Step 1/5 - W elcome to the Report Wizard Welcome Click Next to continue or Cancel to quit. Step 2/5 - Select Report T ype Select Report T ype First, you must select the module the generated report is on: Antivirus , Antispam , Content Filtering or Attachment Filtering .
Note For more information on the available report types, please refer to the table presented at the beginning of the “ Reports ” (p. 52 ) section. Depending on your choice, the report may contain a summary of or only specific data about the activity of a specified component.
Step 4/5 - Select T ime Interval Select Time Interval Select the time interval covered in the report: ● Last day ● Last week ● Last month ● Custom If you need information about the BitDefender activity related to a specific time interval, select Custom and specify the start and end date.
Step 5/5 - V iew Summary View Summary This window displays the selected report settings. Y ou can make any changes by returning to the previous steps (click Back ).
9.4. Alerts & Logs The Alerts & Logs snap-in allows configuring the BitDefender notification system. BitDefender is by default configured to keep a log of its activity . The BitDefender log provides you with a comprehensive list of the events that occured during product operation.
Alerts Mail Alerts BitDefender can notify the network administrator by sending configurable mail alerts in case an event for which they have been set takes place. Enabling this alert will provide you with relevant and timely information about the status of your server , and may eliminate the need to access the BitDefender management console.
2. Configure the SMTP settings, as described in the “ Configuring Mail Alert Settings ” (p. 62 ) section. 3. Configure the recipients of the mail alerts, as described in the “ Configuring Mail Alert Recipients ” (p.
Important Provide a valid e-mail address for the SMTP server , otherwise the server may decline to send an e-mail whose sender (e-mail address) is unknown to it. ● If the SMTP server used to send messages requires authentication, select Use SMTP Server Authentication and enter the user name and password in the corresponding fields.
Recipients Provide the e-mail address in the corresponding field and click Add to add the recipient to the list. T o import e-mail addresses from a txt file, click Import , select the file and then click Open . If you want to export the list to a txt file, click Export and save the file to the desired location.
If you want to disable this service, clear the check box corresponding to Enable Net Send Alerts and then click Apply to save the changes. Important In case of a virus outbreak it is not advisable to use this type of alert.
9.4.2. Logs BitDefender is by default configured to keep a log of its activity . The BitDefender log provides you with a comprehensive list of the events that occured during product operation. Note By default, the log file is saved in: ?:Program FilesBitDefenderBitDefender for Windows Servers ServicesBDLog .
Configuring Logging T o log the product activity to a file, select Enable file logging . BitDefender creates the log file in ?:Program FilesBitDefenderBitDefender for Windows Servers ServicesBDLog . By default, when the file reaches the size limit of 1024 KB, a new log file is created.
Events All of the events that may occur are listed in the table. There are 3 types of events: ● Information - such events provide information about the product activity . ● W arning - such events provide critical information about aspects of the product activity which require your attention.
Description Event Refers to the occurrence of an error during the update process. Update Error Occurs when an infected file or a file suspected of being infected has been detected. Infected/suspected file detected Groups critical information regarding the activity of BitDefender .
Note If event notification is disabled, the event is not logged and no alert is sent when it takes place. Configuring Events Y ou can configure the notification methods separately for each event in the list. T o configure the notification methods for a specific event, select it and click Configure event .
When an event takes place, based on its importance, it can be logged and, possibly , specified recipients may be notified through mail and net send alerts of its occurrence. Choose one of the following options to set the importance level: ● Disabled - to disable event notification.
Configure Mail Alerts Configure Alert T ext BitDefender allows you to configure the alert content. Y ou can see the default text in the box. Make the desired changes to the alert content. Important Y ou should NOT modify the strings that begin with the $ symbol as they provide valuable information about the event.
T o import e-mail addresses from a txt file, click Import , select the file and then click Open . If you want to export the list to a txt file, click Export and save the file to the desired location. T o remove one or several selected recipients click Remove .
Important Y ou should NOT modify the strings that begin with the $ symbol as they provide valuable information about the event. Configure Alert Recipients Provide the computer name in the corresponding field and click Add to add the recipient to the list.
9.5. Quarantine BitDefender allows isolating files in a secure area, named quarantine. T o see the quarantined files and manage them, click Quarantine in the tree menu (under Monitoring ).
● Attachment Filtering - contains the messages that matched an Attachment Filtering and which were stored in the quarantine area. Click a link to see the quarantined files for the corresponding component. 9.5.1. Antivirus Quarantine Click Antivirus in the tree menu ( Quarantine module) to enter this section.
Quarantined files are encrypted. In order to see an item from the quarantine area, select it and then click Save to disk to decrypt the file. In this way you can analyze the item and send it by mail. Note T o learn how to manage the quarantined files and the quarantine area, please refer to “ Managing Quarantine ” (p.
being spam, the mail address of the sender , the mail address of the recipients, the subject and the file name of the message. Quarantined files are encrypted. In order to see an item from the quarantine area, select it and then click Save to disk to decrypt the file.
This is where you can see the messages that matched a Content Filtering rule and which were stored in the quarantine area. For each quarantined message, the following information is provided: the date.
Attachment Filtering Quarantine This is where you can see the messages that matched an Attachment Filtering rule and which were stored in the quarantine area.
9.5.5. Managing Quarantine T o manage the quarantined files and the quarantine areas, use the following buttons: ● Restore - decrypts selected quarantined messages from the Antispam, Content Filtering and Attachment Filtering quarantine areas and delivers them to their intended recipients.
Important Provide a valid e-mail address for the SMTP server , otherwise the server may decline to send an e-mail whose sender (e-mail address) is unknown to it. ● IP - type the IP address used by the server . ● Port - type the port used by the server .
T o configure the server settings, click Settings . This will open the server settings window . 5. W ait for the restoration to complete and click Close to close the window . Configuring Quarantine Properties T o set the location of the quarantine folder and configure the purge options, click the Properties button.
By default, quarantined files older than 90 days are automatically deleted. T o change the time interval during which files are stored in the quarantine, type the number of hours / days / weeks / months in the corresponding field. Click OK to save the changes and close the window .
Scheduled T asks Y ou can see all the existing scheduled tasks listed in the table. For each task, the following information is provided: the task type and name, the last time when it was performed, the next time it is scheduled to run and the status.
● Delete - deletes one or several selected scheduled tasks. Y ou will have to confirm your choice by clicking Y es . ● Enable / Disable - enables / disables one or several selected scheduled tasks. ● Properties - opens the configuration window of a selected scheduled task, allowing you to modify it and to configure more advanced settings.
Step 2/4 - Select T ask T ype Select T ask T ype Provide the task name and then select Update T ask . Click Next . Step 3/4 - Configure Schedule Run T ask Periodically Specify the task schedule.
● Once - to run the task one time only , at a given moment. Specify the start date and time in the Start Date / Start Time fields. ● Periodically - to run the task periodically , at certain time intervals (minutes, hours, days, weeks, months, years), starting with a specified date and time.
Step 4/4 - View Summary View Summary This window displays the task settings. Y ou can make any changes by returning to the previous steps (click Back ). Select Open the advanced properties of this task when I click "Finish" if you want the Properties window of this task to be opened after you complete the wizard.
Viewing General Information Open the configuration window to check general information. General Y ou can see general information about the task (the name, the status, the last time when the task ran). If you want to change the task name, enter a new name in the corresponding field.
Schedule Specify the task schedule. Y ou must choose one of the following options from the menu: ● Once - to run the task one time only , at a given moment.
● Week Days - to run the task repeatedly only in certain days of the week starting with a specified date and time. T o configure the necessary settings, follow these steps: 1.
Step 1/7 - Welcome to the Scheduled T asks Wizard Welcome Click Next . Step 2/7 - Select T ask T ype Select T ask T ype Provide the task name and then select Generate Report T ask .
Step 3/7 - Configure Schedule Run T ask Periodically Specify the task schedule. Y ou must choose one of the following options from the menu: ● Once - to run the task one time only , at a given moment. Specify the start date and time in the Start Date / Start Time fields.
1. Specify the start date in the Start Date field. 2. If you want to run the task repeatedly until a certain date, check End Date and specify the end date in corresponding field. 3. Specify the start time in the Start T ime field. 4. Specify the day or days of the week on which the task should be run.
Step 5/7 - Select Report Format Select Report Format Select the format of the report file ( HTML , text or CSV ). Depending on your selection, the report will be created as an HTML, text or comma-separated values (CSV) file.
● Last day ● Last week ● Last month ● Custom If you need information about the BitDefender activity related to a specific time interval, select Custom and specify the start and end date. T o specify the start and end date, either click the numbers in the date field and enter new values or click the arrow to choose a date from the calendar .
Note The task will appear in the Scheduled T asks section. Configuring Properties In order to modify an existing scheduled task or to configure more advanced settings, unavailable in the configuration wizard, just double-click the task or select it and click Properties .
Click Apply to save the changes. If you want to save the changes and close the configuration window , click OK . If you want to close the configuration window without making any changes, click Cancel . Modifying Schedule Click the Schedule tab in the configuration window to modify the schedule.
2. If you want to run the task repeatedly until a certain date, check End Date and specify the end date in the corresponding field. 3. Specify the start time in the Start T ime field.
Settings Follow these steps to configure the report settings: 1. Choose on which module (Antivirus, Antispam, Content Filtering, Attachment Filtering) to generate the report. 2. Select one of the report types available for the previously specified module.
If you want to close the configuration window without making any changes, click Cancel . Configuring Notifications Click the Notifications tab in the configuration window to configure notifications. Notifications Select Report Generated to enable notifications on report generation.
9.6.4. On-demand Scanning T asks Scheduling T asks T o create a new scheduled task, click New task . The configuration wizard will appear and it will guide you through the process of creating a scheduled task. Follow these steps to schedule an on-demand scanning task: Step 1/7 - Welcome to the Scheduled T asks Wizard Welcome Click Next .
Step 2/7 - Select T ask T ype Select T ask T ype Provide the task name and then select On-demand Scanning T ask . Click Next . Step 3/7 - Configure Schedule Run T ask Periodically Specify the task schedule.
● Once - to run the task one time only , at a given moment. Specify the start date and time in the Start Date / Start Time fields. ● Periodically - to run the task periodically , at certain time intervals (minutes, hours, days, weeks, months, years), starting with a specified date and time.
Step 4/7 - Select Scan T arget Select Scan T arget Select the check boxes corresponding to the items (groups, mailboxes and public folders) you want to be scanned. If you want to scan all the Exchange databases (mailboxes and public folders), just click Select All .
Step 5/7 - Set Actions Set Actions Different actions can be configured for the infected and suspect objects detected by BitDefender . There is a list of actions that can be applied to each category of detected objects (infected or suspect). When such an object is detected, the first action in the corresponding list is applied.
Description Action The suspect object (mail body / attachment / public file) is moved to the quarantine folder . Move to Quarantine The suspect object (mail body / attachment / public file) is deleted. Delete object The suspect message is deleted. Delete e-mail The suspect message is delivered in full to its recipients.
Note T o view the report file, at the end of the scanning, open the configuration window (select the task and click Properties ) and then click View Log . Log Scanning Select Log start/end of on-demand scanning to record the start and the end of the process in the log file.
Note The task will appear in the Scheduled T asks section. Configuring Properties In order to modify an existing scheduled task or to configure more advanced settings, unavailable in the configuration wizard, just double-click the task or select it and click Properties .
Viewing General Information General Y ou can see general information about the task (the name, the status, the last time when the task ran). If you want to change the task name, enter a new name in the corresponding field. If the task is running, you can end the scanning process by clicking End T ask .
Modifying Schedule Click the Schedule tab in the configuration window to modify the schedule. Schedule Specify the task schedule. Y ou must choose one of the following options from the menu: ● Once - to run the task one time only , at a given moment.
2. If you want to run the task repeatedly until a certain date, check End Date and specify the end date in the corresponding field. 3. Specify the start time in the Start T ime field.
Settings Select Scan T arget Select the check boxes corresponding to the items (groups, mailboxes and public folders) you want to be scanned. If you want to scan all the Exchange databases (mailboxes and public folders), just click Select All . T o clear all check boxes and start a new selection, click Clear All .
Advanced Scan Settings If you do not want to scan messages that exceed a certain size limit, select Maximum mail size to be scanned and provide the size limit in the corresponding field. Beside messages, you can select other objects to be scanned: Contacts , T asks and Appointments .
Actions Different actions can be configured for the infected and suspect objects detected by BitDefender . There is a list of actions that can be applied to each category of detected objects (infected or suspect). When such an object is detected, the first action in the corresponding list is applied.
Description Action The infected object (mail body / attachment / public file) is deleted. Delete object The infected message is deleted. Delete e-mail The infected object (mail body / attachment / public file) is moved to the quarantine folder . Move to Quarantine The infected message is delivered in full to its recipients.
Notifications Log Scanning Select Log start/end of on-demand scanning to record the start and the end of the process in the log file. Note The corresponding event from the Events section must be enabled and properly configured. For more information, please refer to “ Configuring Events ” (p.
The report can be generated in HTML, text or CSV format. Y ou can choose the format of the report file from the menu. Note T o view the report file, at the end of the scanning process, open the configuration window (select the task and click Properties ) and then click View Log .
10. SMTP Groups BitDefender allows creating user groups, in order to apply dif ferent scanning and filtering policies for different user categories. For example, you can create appropriate policies for the IT department, for the sales team or for the managers of your company .
10.1. Managing Groups T o manage the groups, use these buttons: ● New Group - creates a new group. Y ou will have to configure the group before it appears in the table. ● Copy - copies one or several selected groups. ● Delete - deletes one or several selected groups.
Group Properties T o configure the group follow these steps: 1. Identify the new group. Provide the group name and, optionally , the group description in the corresponding fields. 2. Add users to the new group. ● Provide the e-mail address in the corresponding field and click Add .
Browse for Users (Groups) Y ou can see the list of all the users from Active Directory that have an SMTP address assigned. The list structure is the one from Active Directory . The user list is automatically updated once a day . T o update the list, click Update Now .
1 1. Antivirus The Antivirus module protects the Exchange server against viruses, spyware and riskware, and it ensures that users do not access infected e-mails. It detects infected or suspect messages and attempts to disinfect them or isolates the infection, according to the specified actions.
1 1.1. Real-time Antivirus Protection Click Antivirus in the tree menu to enter this section. Real-time Antivirus Protection This is where you can enable real-time protection and configure advanced antivirus settings. If you want the real-time antivirus protection to be enabled, select Enable real-time antivirus scanning .
1 1.1.1. Configuring Advanced Antivirus Settings Several advanced settings concerning the scanning process can be configured. These settings are applied regardless of the policy . Click Options to open the configuration window of the advanced antivirus settings.
Background scanning means scanning all folders with a low priority . When an object that has been checked by the background scanning is requested, it will not be scanned again unless a virus definition update has been made. Therefore, enabling this scan method optimizes the overall scanning process.
Note We recommend enabling transport scanning only when BitDefender Security for Exchange is installed on a gateway . Additional options are available by clicking the Advanced button. Advanced VSAPI settings ● Scan RTF - select this option if you want the body messages in Rich T ext Format (RTF) to be scanned.
If SMTP scanning is enabled, BitDefender can add a footer to all scanned mails. Select the Add footer to scanned emails check box to activate this option and type the desired text in the text box below . Maximum Archive Depth T o Scan Archives can contain other archives.
Scanning Instances 1 1.2. Policies Click Antivirus in the tree menu and then the Policies tab to enter this section. Antivirus 130 BitDefender Security for Exchange.
Policies This is where you can configure the rules of the real-time antivirus scanning. 1 1.2.1. Managing Rules Y ou can see all the existing rules listed in the table. For each rule, the following information is provided: priority , the name and the groups of senders and recipients it applies to.
● If the message was not scanned before the client’s request, it is scanned according to the rule. ● If the message was checked before by proactive or background scanning and no update was performed in the meantime, the message is delivered without being scanned according to the rule.
1 1.2.2. Creating Rules T o create a rule, choose one of these methods: ● copy an existing rule and click Properties to modify it. ● click New Rule and configure the new rule. In both cases, a new window will appear . Next, you must configure or modify the rule.
Provide the rule name and, optionally , the rule description. T o enable the rule, select Enabled . If you want the rule to be disabled, clear the check box. Step 2/6 - Select Senders Groups Click the From tab and select the groups of senders the rule applies to.
If necessary , you can create a new group by clicking New and configuring it. The new group will appear in the Groups section. T o configure an existing group or to see its parameters, select it and click Details . Note T o learn how to configure a group, please refer to “ Creating Groups ” (p.
If you choose Selected , you have to select from the list the groups you want the rule to apply to. Y ou can select Match all recipients to apply the rule only if all the recipients of the message belong to the specified groups.
Step 4/6 - Configure Scan Options Click the Scan Options tab and configure the scan options for the messages matching this policy . Scan Options If you do not want the messages to be scanned for malware, select Do not scan . Then, click OK to save the changes and close the configuration window .
Description Option All mail attachments are scanned, regardless of their extension. Scan all extensions Only the attachments containing applications are scanned. This category is limited to files with the Scan only application extensions following extensions: .
Actions Different actions can be configured for the infected and suspect objects detected by BitDefender . There is a list of actions that can be applied to each category of detected objects (infected or suspect). When such an object is detected, the first action in the corresponding list is applied.
Description Action The infected object (mail body / attachment) is deleted. Delete object The infected message is deleted. Delete e-mail The infected message is delivered in full to its recipients. Ignore Note The Delete e-mail action does not work on Exchange 2000 VSAPI scanning, it only works on Exchange 2000 SMTP scanning.
Step 6/6 - Configure Notifications Click the Notifications tab and specify whether to issue notifications or not when infected messages are detected or files cannot be scanned. Notifications Select the events for which to issue notifications: ● Infected file detected - when an infected file was detected.
1 1.3. On-demand Scanning BitDefender can scan the Exchange databases (mailboxes and public folders) for viruses and spyware on-demand. T o configure and initiate on-demand scanning processes, click Antivirus in the tree menu and then the On-demand tab.
Note Only one on-demand scan can be run at a time. Please note that on-demand scanning increases resource consumption. Y ou should not set BitDefender to scan the Exchange databases when the server workload is at a high level. If you want to schedule an on-demand scan, click Schedule and follow the steps of the wizard.
On-demand Scan Settings Select Scan T arget Select the check boxes corresponding to the items (groups, mailboxes and public folders) you want to be scanned. If you want to scan all the Exchange databases (mailboxes and public folders), just click Select All .
Advanced Scan Settings If you do not want to scan messages that exceed a certain size limit, select Maximum e-mail message size to be scanned and provide the size limit in the corresponding field. Beside messages, you can select other objects to be scanned: Contacts , T asks and Appointments .
Actions Different actions can be configured for the infected and suspect objects detected by BitDefender . There is a list of actions that can be applied to each category of detected objects (infected or suspect). When such an object is detected, the first action in the corresponding list is applied.
Description Action The infected object (mail body / attachment / public file) is moved to the quarantine folder . Move to Quarantine The infected object (mail body / attachment / public file) is deleted. Delete object The infected message is deleted. Delete e-mail The infected message is delivered in full to its recipients.
Notifications Log Scanning Select Log start/end of on-demand scanning to record the start and the end of the on-demand scanning in the log file. Note The corresponding event from the Events section must be enabled and properly configured. For more information, please refer to “ Configuring Events ” (p.
The report can be generated in HTML, text or CSV format. Y ou can choose the format of the report file from the menu. Click OK to save the changes and close the configuration window . 1 1.3.2. Viewing Scan Reports By default, everytime you scan the Exchange server on-demand, a scan report is created.
12. Antispam The Antispam module offers protection against spam, phishing and other attacks. It uses a combination of various filters and engines to determine whether messages are spam or not and to check them for patterns of spam.
12.1. Antispam Filtering Click Antispam in the tree menu and then the Antispam tab to enter this section. Antispam Filtering This is where you can enable antispam filtering and configure the global antispam filters. If you want the antispam protection to be enabled, select Enable antispam filtering .
12.1.1. Configuring Global Antispam Filters Several global antispam filters can be configured to filter all of the incoming mail traffic, in order to reduce the traffic on the server . These filters are used before a specific group filtering policy is applied.
Note The Allow IP List is used to except IP addresses from ranges of IP addresses defined on the Deny IP List. Select Enable Allow / Deny IP List and configure the IP addresses if you want to use the Allow / Deny IP List to filter the incoming mail traffic.
Manage IP List. Y ou can see the IP addresses and the associated action listed in the table. If you want to modify an entry , either double-click it or select it and click Modify . T o remove one or several selected entries, click Remove and then Y es to confirm your choice.
Manage Addresses. Y ou can see the e-mail addresses listed in the table. If you want to modify an address, either double-click it or select it and click Modify . T o remove one or several selected addresses, click Delete and then Y es to confirm your choice.
Spammers often try to "spoof" the sender's e-mail address to make the e-mail appear as being sent by someone in your domain. T o prevent this, you can use IP Match.
In the table on the right, you can see the IP addresses as they are added. If you want to modify an existing entry , select it, make the necessary changes and click Modify . T o select all entries, just click Select All . T o delete one or several entries from the list, select them and click Remove and then Y es to confirm your choice.
the DNSBL protocol and RBL servers to filter spam based on mail servers' reputation as spam senders. A DNS check is performed on the domain d.c.b.a.rbl.example.com , where d.c.b.a is the reversed IP address of the server and rbl.example.com is the RBL server .
12.2. Policies Click Antispam in the tree menu and then the Policies tab to enter this section. Policies This is where you can specify the antispam filtering options.
Note Messages are checked against each rule, by order of priority , until the sender and the recipients of the message match a rule. The message is then processed according to the antispam filtering options specified by that rule. Please note that the mail traffic is first filtered using the global antispam filters.
● click New Rule and configure the new rule. In both cases, a new window will appear . Next, you must configure or modify the rule. 12.2.3. Configuring Rules T o configure a rule follow these steps: Step 1/7 - Provide General Data Open the configuration window and provide general data for the rule.
Step 2/7 - Select Senders Groups Click the From tab and select the groups of senders the rule applies to. Senders Groups The following options are available: ● All - the rule applies to all senders, no matter if they belong to a group or not. ● Selected - the rule applies only to senders from the selected groups.
Note T o learn how to configure a group, please refer to “ Creating Groups ” (p. 121 ) . Step 3/7 - Select Recipients Groups Click the T o tab and select the groups of recipients the rule applies to. Recipients Groups The following options are available: ● All - the rule applies to all recipients, no matter if they belong to a group or not.
recipients and at least one of them is not found in the specified groups, the rule will not apply . Note The addresses in the Cc and Bcc fields also count as recipients. Click Select All to select all groups. If you click Clear All no group will be selected.
Step 4/7 - Set Actions Click the Actions tab and specify the actions to be taken on the messages matching this policy . Actions If you do not want the messages to be scanned using the antispam filters, select Do not scan . Then, click OK to save the changes and close the configuration window .
The Bayesian Filter , the Pre-trained Bayesian Filter and the NeuNet Filter give to each scanned message a Spam score. The aggregate of these scores represents an overall spam score. The overall spam score is measured against the desired level of spam sensitivity (threshold), and a decision is made.
Description Action ● [SPAM]${subject}[SPAM] - to add [SPAM] before and after the subject. This is the default subject pattern. ● [SPAM] - to replace the subject with [SPAM] . ● [$score% SPAM]$subject - to add [x SPAM] before the subject, where x represents the spam score.
Antispam Engines Note For more information on the antispam filters mentioned here, please refer to “ Policy Filters ” (p. 18 ) . The following options are available: ● Enable pre-trained Bayesian Filter - enables / disables the pre-trained Bayesian Filter .
● Enable Image Filter - enables / disables the Image Filter . ● Enable URL Filter - enables / disables the URL Filter . ● Enable RBL Filter - enables / disables the global RBL Filter . ● Enable Heuristic Filter - enables / disables the Heuristic Filter .
List filter , the administrator can set a list of trusted and untrusted addresses from which to respectively "always accept" or "always reject" e-mail messages. Select Enable White / Black Lists to filter messages using the White List and the Black List.
Import / Export Addresses. T o import addresses from a txt file, click Import , select it and then click Open . T o export the existing addresses to a txt file, click Export and save the file to the desired location.
configuring BitDefender server products on other machines or after reinstalling the product. Click OK to save the changes and close the window . If you click Cancel all changes will be lost. Step 7/7 - Configure Bayesian Filter Click the Bayesian Filter tab and configure the Bayesian Filter .
HAM folder (the folder containing legitimate mail) and the SP AM folder by clicking Browse . Note The messages in the SP AM and HAM folders are deleted after the training is completed. In order to get the best results, it is recommended to train the Bayesian Filter often.
13. Content Filtering Content Filtering helps you filter e-mail messages based on certain character strings found in the e-mail headers (subject, from, to, cc) or in the e-mail body . By using Content Filtering, you can achieve the following goals: ● prevent unwanted mail content from entering the Exchange server mailboxes.
13.1. Content Filtering Click Content Filtering in the tree menu to enter this section. Content Filtering This is where you can enable content filtering. If you want content filtering to be enabled, select Enable content filtering . Otherwise, clear this check box.
13.2. Policies Click Content Filtering in the tree menu and then the Policies tab to enter this section. Policies This is where you can specify the content filtering options.
Note Messages are checked against each rule, by order of priority , until the sender and the recipients of the message match a rule. The message is then processed according to the content filtering options specified by that rule. Default Rule. There is one rule created by default that manages the global content filtering settings.
13.2.3. Configuring Rules T o configure a rule follow these steps: Step 1/6 - Provide General Data Open the configuration window and provide general data for the rule. General Provide the rule name and, optionally , the rule description. T o enable the rule, select Enabled .
Step 2/6 - Select Senders Groups Click the From tab and select the groups of senders the rule applies to. Senders Groups The following options are available: ● All - the rule applies to all senders, no matter if they belong to a group or not. ● Selected - the rule applies only to senders from the selected groups.
Note T o learn how to configure a group, please refer to “ Creating Groups ” (p. 121 ) . Step 3/6 - Select Recipients Groups Click the T o tab and select the groups of recipients the rule applies to. Recipients Groups The following options are available: ● All - the rule applies to all recipients, no matter if they belong to a group or not.
recipients and at least one of them is not found in the specified groups, the rule will not apply . Note The addresses in the Cc and Bcc fields also count as recipients. Click Select All to select all groups. If you click Clear All no group will be selected.
Filtering Options If you do not want the messages to be scanned using content filtering options, select Do not scan . Then, click OK to save the changes and close the configuration window . If you select Scan , the messages will be scanned using the content filtering options configured for this policy .
T o specify the strings, click Configure subject . A new window will appear , where you can configure the defined strings (please see “ Configuring Strings ” (p. 183 ) ). Filtering Mail by Sender Address Select Sender and specify the rule strings in order to filter mail by the sender address.
Specify parameters Provide the string in the corresponding field and click Add . Y ou can choose to enter either a wildcard expression or a regular expression.
Description Option The rule applies only if an entire string matching the specified parameter is detected. Match whole word only Y ou can see all the defined strings in the list. T o remove entries, select them and click Remove . Click OK to save the changes.
Description Action The detected message is deleted. Delete e-mail The detected message is moved to the quarantine folder . Quarantine e-mail The detected message is delivered in full to its recipients. Deliver e-mail The detected message is rejected with a 550 SMTP error code.
Step 6/6 - Configure Notifications Click the Notifications tab and specify whether to issue notifications or not when messages match the rule. Notifications Select Rule matched to issue notifications when messages match the rule. Note The corresponding event in the Events section must be enabled and properly configured.
14. Attachment Filtering The Attachment Filtering module provides filtering features for mail attachments. It can detect attachments with certain name patterns, of a certain type or exceeding a certain size limit.
14.1. Attachment Filtering Click Attachment Filtering in the tree menu to enter this section. Attachment Filtering This is where you can enable attachment filtering. If you want attachment filtering to be enabled, select Enable attachment filtering . Otherwise, clear this check box.
14.2. Policies Click Attachment Filtering in the tree menu and then the Policies tab to enter this section. Policies This is where you can specify the attachment filtering options.
Note Messages are checked against each rule, by order of priority , until the sender and the recipients of the message match a rule. The message is then processed according to the attachment filtering options specified by that rule. Default Rule. There is one rule created by default that manages the global content filtering settings.
14.2.3. Configuring Rules T o configure a rule follow these steps: Step 1/6 - Provide General Data Open the configuration window and provide general data for the rule. General Provide the rule name and, optionally , the rule description. T o enable the rule, select Enabled .
Senders Groups The following options are available: ● All - the rule applies to all senders, no matter if they belong to a group or not. ● Selected - the rule applies only to senders from the selected groups. If you choose Selected , you have to select from the list the groups you want the rule to apply to.
Step 3/6 - Select Recipients Groups Click the T o tab and select the groups of recipients the rule applies to. Recipients Groups The following options are available: ● All - the rule applies to all recipients, no matter if they belong to a group or not.
Note The addresses in the Cc and Bcc fields also count as recipients. Click Select All to select all groups. If you click Clear All no group will be selected. If necessary , you can create a new group by clicking New and configuring it. The new group will appear in the Groups section.
If you do not want the messages to be scanned using attachment filtering options, select Do not scan . Then, click OK to save the changes and close the configuration window . If you select Scan , the messages will be scanned using the attachment filtering options configured for this policy .
All the names excepted from scanning are listed in the box. T o remove entries, select them and click Remove . Filtering Attachments by T ype Select Detect all extensions except for the following and specify the excepted extensions in order to filter attachments by type.
Actions Y ou must choose one of the following actions: Description Action The message containing the detected attachment is deleted. Delete e-mail The detected attachment is deleted. Delete attachment The detected attachment is replaced with a specified text.
Description Action The message containing the detected attachment is delivered in full to its recipients. Deliver e-mail The detected message is rejected with a 550 SMTP error code. Reject e-mail Y ou can also set additional actions to be taken on the detected messages.
Step 6/6 - Configure Notifications Click the Notifications tab and specify whether to issue notifications or not when attachments match the rule. Notifications Select Rule matched to issue notifications when attachments match the rule. Note The corresponding event in the Events section must be enabled and properly configured.
15. Update New viruses and spyware are found and identified every day . This is why it is very important to keep BitDefender up to date with the latest signatures.
15.1. Update T o find out information on the update status and if product updates are available, click Update in the tree menu and then the Update tab. Update If you want to update BitDefender immediately , just click Update Now . The Update module will check for updates at the specified update locations.
15.1.2. Product Update The product updates are different from the signature updates. Their function is to deliver bug fixes and new features to the product.
15.2. Update Settings T o configure the update frequency and the update settings, click Update in the tree menu and then the Settings tab. Update Settings 15.2.1. Configuring Update Schedule There are two ways to update BitDefender Security for Exchange on a regular basis: ● Using the automatic update.
Important Keep automatic update enabled in order to be protected against the latest threats. T o change the frequency BitDefender checks for updates, follow these steps: 1. T ype the number of hours between two consecutive checks for updates in the Automatic update interval field.
15.2.3. Configuring Product Updates Installing product updates regularly is essential to the security of your server . Depending on the level of interference with the server , there are three types of.
15.3. Update Locations T o set the update locations, click Update in the tree menu and then the Locations tab. Update Locations BitDefender can update from the local network, over the Internet, directly or through a proxy server .
Note If you are connected to a local network that has BitDefender virus signatures placed locally , you can change the location of the updates here. ● Allow unsigned updates - select this option to allow updates from a local server to be installed. ● Use proxy - select this option if the company uses a proxy server .
Update Notifications This is where you can specify the update events for which notifications should be issued. Select the update events for which to issue notifications: ● Update performed - when an update was performed. ● No update available - when no update is available.
15.5. Update Roll Back If you have performed a product update since first installing BitDefender , you can always revert to the previous product version using the Rollback feature. This feature is very useful in case the product starts behaving unexpectedly .
15.6. Manual Update This method allows installing the latest virus and spyware signatures. T o install a patch or a product upgrade of the latest version, go to the Product Update section. Important Use the manual update when the automatic update cannot be performed or when the computer is not connected to the Internet.
date stamp in the folder name). Extract the content of the archive in the Plugins folder and accept overwriting existing files. 6. Start BitDefender Antivirus Scanning Service. Right-click BitDefender Antivirus Scanning Service and select Start . 7. Start BitDefender File Scanning Service.
16. General The General snap-in allows configuring BitDefender to send the BitDefender Lab reports regarding the viruses found on the server and the incidents that occurred during product operation.
Report Virus Real-time Virus Reporting is disabled by default. T o activate it, follow these steps: 1. Select Enable real-time virus reports . 2. Click Apply to save the changes. 16.2. Report Incidents BitDefender Security for Exchange contains an incident management module that allows creating incident reports during product crashes.
T o configure the incident management module, click General in the tree menu and then the Report Incidents tab. Report Incidents By default, the reports created automatically during product crashes are not sent to the BitDefender Lab. T o configure BitDefender to send incident reports to the BitDefender Lab, follow these steps: 1.
T esting BitDefender 216 BitDefender Security for Exchange.
17. Antivirus T est Y ou can verify that the BitDefender Antivirus component works properly by the help of a special test file, known as the EICAR Standard Anti-virus T est file. EICAR stands for the European Institute of Computer Anti-virus Research .
18. Antispam T est Y ou can verify that the BitDefender Antispam component is correctly installed and works properly by the help of a special test, known as GTUBE . GTUBE stands for the Generic T est for Unsolicited Bulk Email . The test consists of entering the following 68-byte string, as one line, in the body of the email: XJS*C4JDBQADN1.
T roubleshooting and Getting Help 219 BitDefender Security for Exchange.
19. BitDefender Configuration Repair T ool If you have problems with BitDefender Security for Exchange, you can use the BitDefender Configuration Repair T ool to restore the last known good configuration. The BitDefender Configuration Repair T ool backs the configuration file up every hour so that you can restore it if needed.
Repairing Configuration The window displays the status of the restoration process. First, the BitDefender Configuration Repair T ool stops the services belonging to the BitDefender Security for Window.
Finish Click Exit to close the window . BitDefender Configuration Repair T ool 222 BitDefender Security for Exchange.
20. BitDefender Support T ool The BitDefender Support T ool creates a zip archive of files required by our support technicians to troubleshoot BitDefender Security for Exchange.
Gathering Information The Support T ool gathers product information, information related to other applications installed on the machine and the software and hardware configuration. 4. The Support T ool informs you when the process has completed. Finish The name of the zip archive that has been created on your desktop is displayed in this window .
21. Support With BitDefender , dedication to saving customers’ time and money by providing the most advanced products at the fairest prices has always been a top priority . Moreover , we believe that a successful business is based on good communication and commitment to excellence in customer support.
and development teams, along with more general articles about virus prevention, the management of BitDefender solutions with detailed explanations, and many other articles.
North America BitDefender , LLC PO Box 667588 Pompano Beach, Fl 33066 Phone (sales&technical support): 1-954-776-6262 Sales: sales@bitdefender .com Web: http://www .
Fax: +34 932179128 Phone (office&sales): +34 902190765 Phone (technical support): +34 935026910 Sales: comercial@bitdefender .es Website: http://www .
Un point important après l'achat de l'appareil (ou même avant l'achat) est de lire le manuel d'utilisation. Nous devons le faire pour quelques raisons simples:
Si vous n'avez pas encore acheté Bitdefender Security for Exchange c'est un bon moment pour vous familiariser avec les données de base sur le produit. Consulter d'abord les pages initiales du manuel d'utilisation, que vous trouverez ci-dessus. Vous devriez y trouver les données techniques les plus importants du Bitdefender Security for Exchange - de cette manière, vous pouvez vérifier si l'équipement répond à vos besoins. Explorant les pages suivantes du manuel d'utilisation Bitdefender Security for Exchange, vous apprendrez toutes les caractéristiques du produit et des informations sur son fonctionnement. Les informations sur le Bitdefender Security for Exchange va certainement vous aider à prendre une décision concernant l'achat.
Dans une situation où vous avez déjà le Bitdefender Security for Exchange, mais vous avez pas encore lu le manuel d'utilisation, vous devez le faire pour les raisons décrites ci-dessus,. Vous saurez alors si vous avez correctement utilisé les fonctions disponibles, et si vous avez commis des erreurs qui peuvent réduire la durée de vie du Bitdefender Security for Exchange.
Cependant, l'un des rôles les plus importants pour l'utilisateur joués par les manuels d'utilisateur est d'aider à résoudre les problèmes concernant le Bitdefender Security for Exchange. Presque toujours, vous y trouverez Troubleshooting, soit les pannes et les défaillances les plus fréquentes de l'apparei Bitdefender Security for Exchange ainsi que les instructions sur la façon de les résoudre. Même si vous ne parvenez pas à résoudre le problème, le manuel d‘utilisation va vous montrer le chemin d'une nouvelle procédure – le contact avec le centre de service à la clientèle ou le service le plus proche.