GroupShield 5.2 for Exchange 2000 Installation Guide - McAfee
GroupShield 5.2 for Exchange 2000 Installation Guide - McAfee GroupShield 5.2 for Exchange 2000 Installation Guide - McAfee
Installing the Software Uninstall cleanup 4 On completion, click Finish to close the dialog box. 5 Move to next node. 6 If this node is not the last node in the cluster, repeat Step 1 through Step 4. If it is the last node: a Use the Cluster Administrator to delete the GroupShield resources. NOTE: It is important to remove the GroupShield resource from every relevant disk group, simply taking the service offline is not sufficient. b Repeat Step 2 through Step 4. c On completion, click Finish to remove GroupShield files and registry settings. All cluster configuration data is now removed. During removal of GroupShield 5.2 for Microsoft Exchange 2000, the Microsoft Installer determines which files to remove. Only files that were part of the installation are uninstalled. Files that contain information generated during operation of GroupShield, for example, the log and quarantine databases, are not removed. You must decide whether to keep or remove any files left behind by the GroupShield uninstall. Remember that on a clustered installation, log and quarantine files are stored on virtual servers, and some data files are stored on nodes (controlling servers). ENG-40 GroupShield version 5.2 for Microsoft Exchange 2000
GroupShield Version 5.2 für Microsoft Exchange 2000 Installationshandbuch — Deutsch Installationshandbuch DEU - i
- Page 1 and 2: GroupShield VERSION 5.2 for Microso
- Page 3 and 4: Contents Purpose . . . . . . . . .
- Page 5 and 6: Contents Objectif . . . . . . . . .
- Page 7 and 8: Contents . . . . . . . . . . .
- Page 9 and 10: GroupShield version 5.2 for Microso
- Page 11 and 12: Preface Purpose Audience This Insta
- Page 13 and 14: Contacting McAfee and Network Assoc
- Page 15 and 16: 1Installing the Software Overview T
- Page 17 and 18: Components installed by the softwar
- Page 19 and 20: Installs and starts the services. U
- Page 21 and 22: Installation checklist Installing t
- Page 23 and 24: Installing the Software Installing
- Page 25 and 26: Installing the Software b Configure
- Page 27 and 28: Installing the Software GSECONFIGFI
- Page 29 and 30: g Select Physical disk and click Ad
- Page 31 and 32: Upgrading an existing version of th
- Page 33 and 34: Installing the Software For full de
- Page 35 and 36: Using the Microsoft Windows Perform
- Page 37 and 38: Repairing the software Installing t
- Page 39: Installing the Software NOTE: Remo
- Page 43 and 44: Vorwort Zweck Zielgruppe Das Instal
- Page 45 and 46: Kontakt zu McAfee und Network Assoc
- Page 47 and 48: 2Installieren der Software Überbli
- Page 49 and 50: Von der Software installierte Kompo
- Page 51 and 52: Phasen der Installation Installiere
- Page 53 and 54: Systemanforderungen Installieren de
- Page 55 and 56: Nach der Installation Installieren
- Page 57 and 58: Installieren der Software 6 Lesen S
- Page 59 and 60: Installieren der Software f Klicken
- Page 61 and 62: So erstellen Sie eine Konfiguration
- Page 63 and 64: k Klicken Sie auf Fertig stellen, u
- Page 65 and 66: Installieren der Software HINWEIS:
- Page 67 and 68: Installieren der Software So bearbe
- Page 69 and 70: Installieren der Software 4 Lösche
- Page 71 and 72: 9 Klicken Sie auf Beenden, um die I
- Page 73 and 74: Entfernen der Software von einem Cl
- Page 75 and 76: Installieren der Software 6 Wenn di
- Page 77 and 78: GroupShield version 5.2 pour Micros
- Page 79 and 80: Préface Objectif Public Ce Guide d
- Page 81 and 82: Préface Comment contacter McAfee e
- Page 83 and 84: 3Installation du logiciel Présenta
- Page 85 and 86: Composants installés par le logici
- Page 87 and 88: Phases d'installation Installation
- Page 89 and 90: Configuration requise Installation
Installing the Software<br />
Uninstall cleanup<br />
4 On completion, click Finish to close the dialog box.<br />
5 Move to next node.<br />
6 If this node is not the last node in the cluster, repeat Step 1 through Step 4.<br />
If it is the last node:<br />
a Use the Cluster Administrator to delete the <strong>GroupShield</strong> resources.<br />
NOTE: It is important to remove the <strong>GroupShield</strong> resource<br />
from every relevant disk group, simply taking the service<br />
offline is not sufficient.<br />
b Repeat Step 2 through Step 4.<br />
c On completion, click Finish to remove <strong>GroupShield</strong> files and<br />
registry settings.<br />
All cluster configuration data is now removed.<br />
During removal of <strong>GroupShield</strong> <strong>5.2</strong> <strong>for</strong> Microsoft <strong>Exchange</strong> <strong>2000</strong>, the<br />
Microsoft Installer determines which files to remove. Only files that were part<br />
of the installation are uninstalled.<br />
Files that contain in<strong>for</strong>mation generated during operation of <strong>GroupShield</strong>, <strong>for</strong><br />
example, the log and quarantine databases, are not removed.<br />
You must decide whether to keep or remove any files left behind by the<br />
<strong>GroupShield</strong> uninstall. Remember that on a clustered installation, log and<br />
quarantine files are stored on virtual servers, and some data files are stored on<br />
nodes (controlling servers).<br />
ENG-40 <strong>GroupShield</strong> version <strong>5.2</strong> <strong>for</strong> Microsoft <strong>Exchange</strong> <strong>2000</strong>