Forefront Security For Exchange Server Evaluation Guide
Forefront Security For Exchange Server Evaluation Guide
Exchange Server
Evaluation Guide
October 2006
Copyright
This is a preliminary document and may be changed substantially prior to final commercial release of the
software described herein.
The information contained in this document represents the current view of Microsoft Corporation on the
issues discussed as of the date of publication. Because Microsoft must respond to changing market
conditions, this document should not be interpreted to be a commitment on the part of Microsoft, and
Microsoft cannot guarantee the accuracy of any information presented after the date of publication.
This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS,
IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT.
Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights
under copyright, no part of this document may be reproduced, stored in, or introduced into a retrieval
system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or
otherwise), or for any purpose, without the express written permission of Microsoft Corporation.
Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property
rights covering subject matter in this document. Except as expressly provided in any written license
agreement from Microsoft, the furnishing of this document does not give you any license to these patents,
trademarks, copyrights, or other intellectual property.
Unless otherwise noted, the example companies, organizations, products, domain names, e-mail
addresses, logos, people, places, and events depicted herein are fictitious, and no association with any
real company, organization, product, domain name, e-mail address, logo, person, place, or event is
intended or should be inferred.
Microsoft, Forefront, Antigen, Excel, SharePoint, Windows, Windows Server System, and the Windows
Server System logo are either registered trademarks or trademarks of Microsoft Corporation or Sybari
Software, Inc. in the United States and/or other countries. Sybari Software, Inc. is a subsidiary of
Microsoft Corporation.
The names of actual companies and products mentioned herein may be the trademarks of their respective
owners.
Table of Contents
Executive Summary......................................................................................1
Benefits of Using Multiple Scanning Engines...................................................2
Forefront Security for Exchange Server Scanning Overview.........................2
Required Tasks for Forefront for Exchange Server.......................................5
Step 1: Configuring the Transport Scan Job.................................................6
Step 2: Configuring Scan Engine Updates.....................................................8
Step 3: Configuring Engine Bias Settings...................................................10
Step 4: Configuring Engine Actions and WormPurge .................................12
Step 5: Configuring the Realtime Scan Job.................................................16
Step 6: Configuring the Background Scan Job............................................19
Step 7: Configuring File Filtering................................................................23
Step 8: Setting Notifications......................................................................27
Step 9: Incident Log Options......................................................................31
Step 10: Quarantine Options......................................................................33
Step 11: General Options Review...............................................................35
Executive Summary
In Microsoft® Exchange Server, viruses can enter the environment in e-mail file
attachments, e-mail bodies, and Public Folder posts, but traditional antivirus technology
cannot monitor or scan the contents of the Exchange database or the Exchange
Transport stack. Exchange environments require an antivirus solution that can prevent
the spread of viruses by scanning all messages in real time with minimal impact on
server performance or message delivery times. Microsoft® Forefront Security™ for
Exchange Server is the solution for protecting Exchange environments.
Forefront Security for Exchange Server is uniquely suited for Exchange Server 2007
environments. It uses the Exchange Virus Scanning Application Programming Interface
(VSAPI) to deeply integrate with Exchange servers to provide comprehensive
protection.
Forefront Security for Exchange Server provides powerful features that include:
1. Antivirus scanning using multiple, integrated antivirus scan engines that are
included with the product.
2. Premium antispam protection through a license to enable the antispam services
that are built into Exchange 2007.
3. Distributed protection on all storage and transport Exchange server roles—
namely, at all Edge, Hub, and Mailbox/Public Folder servers.
4. Protection against new threats with heuristics technology and file filtering by file
name, extension, true file type, and file size.
5. Performance controls for optimizing server speed and availability.
6. Easy management of product configuration and operation, automated signature
updates, and reporting across the enterprise.
Forefront Security for Exchange Server provides comprehensive protection for your
messaging servers and is the antivirus solution for Exchange 2007 environments.
This guide provides a step-by-step explanation of how to configure Forefront Security
for Exchange Server, along with best practices, tips, and tactics to help ensure
successful implementation.
Store Scanning
Store scanning is handled by:
• Realtime Scan Jobs and Background Scan Jobs
• Manual scan jobs
Proactive scanning (scan when messages and files are written to the Store) is turned off
by default. This is a major change from previous versions of Exchange.
By default, messages that arrive at a Store server carry an AV stamp and are not re-
scanned by the Realtime Scan Job process. The Transport Hub that has scanned these
messages can either be located on a separate server or co-located with the Store
server. Content that has never been routed through a Transport Hub will not have an AV
stamp and will be scanned when first retrieved from the store during On-Access
Scanning.
By default, On-Access Scanning is used to scan a message when it is accessed only if
it has not been scanned before. An “access” can include opening a message, viewing it
Step 1: Configuring the Transport Set the scanning parameters for the Transport scanning
Scan Job job.
Step 2: Configuring Scan Engine Enable all scan engines to update automatically at pre-
Updates set intervals.
Step 3: Configuring Engine Bias Set the number of engines to be used in each scan.
Settings
Step 4: Configuring Engine Set the action to take in the event of detecting a virus.
Actions and WormPurge Also includes an explanation of the Forefront Worm List.
Step 5: Configuring the Realtime Set the scanning parameters for the Realtime Scan Job
Scan Job (Store).
Step 6: Configuring the Set the time and options for incremental background
Background Scan Job scanning in a Background Scan Job.
Step 7: Configuring File Filtering Set filtering parameters to block specific file types.
Step 9: Incident Log Options Review and update options for the Incident Log.
Step 10: Quarantine Options Review and update options for the Quarantine in
Forefront Security for Exchange Server.
Step 11: General Options Review Review and update General Options settings as needed.
One
Two
Three SAVE!
The following steps should be taken on this screen to properly set up the Transport Scan
Job.
One
Two
SAVE!
Microsoft Confidential – Internal & Partner’s under NDA Use Only
Forefront Security for Exchange Server Reviewer’s Guide 9
Verify that all your engines are Enabled. If for any reason you
choose not to use a particular engine, you can disable the update
One
process by highlighting the engine and clicking the Disable
button.
Configure your Update Path and Times. Forefront Security for
Exchange Server can pull engine updates via HTTP or a UNC path.
Two HTTP is the default setting which uses the update path:
http://forefrontdl.microsoft.com/server/scanengineupdate
If you accidentally delete this, right-click the path box and choose
Default HTTP Path.
Use of the UNC share allows one server to pull updates from
another. This is an efficient update mechanism that saves on
Internet bandwidth consumption if you have multiple servers
running Forefront Security for Exchange Server. One server only
will pull the signatures from the Internet, while the other servers
copy the files over the LAN. If you wish to use this configuration,
please consult the Forefront Security for Exchange Server User
Guide for details.
Important! Each engine must have its update path configured
separately!
You must also set the time that each engine will check for
updates. To do this, click the Daily button and then click the
Repeat Every check box and enter a timeframe.
By default, the Time field is staggered by five minutes for each
engine. This is a good idea, because to avoid bandwidth
contention you don’t want all your engines checking for updates at
the same time.
Important! Each engine must have its update time
configured separately!
SAVE! Click the Save button to have your settings take effect. You must
click the Save button separately for each engine you configure!
► Even if you aren’t using a particular engine, you should set it to update regularly, so
if you need to activate it the signatures will be up to date.
► If you have more than one server running Forefront Security for Exchange Server,
use a distributed update mechanism. This allows a single machine to download
signatures, which can then be distributed to other Microsoft Forefront servers (see the
User Guide for details on setting this up). Or, you can use the Microsoft® Forefront™
Server Security Management Console to provide this functionality. Either method will
save greatly on Internet bandwidth and make your updates quicker and more efficient.
TWO
ONE
SAVE!
Check the engines you want to use. You can select up to five
ONE engines for each scan job. Five are selected by default. To change
an engine, deselect one first before selecting the next.
Choose your Bias setting. Use the dropdown box to pick the
TWO Bias setting you want to use. Bias settings are explained in the
table above.
Click the Save button to have your settings take effect. You must
SAVE! click the Save button for your settings to take effect!
Certainty uses all available engines; most of the time e-mail is scanned by all selected
engines, unless one happens to be unavailable, such as during an update. For this
reason, Favor Certainty is considered the Best Practice setting.
► A common practice is to use different bias settings at different points in the
scanning process. Because the Transport Scan Job is less resource-intensive than a
Realtime or Manual Scan Job, Microsoft generally advises to use Maximum Certainty or
Favor Certainty for the Transport Scan Job with five engines enabled, at least as a
starting point. If you run into performance issues, you can make adjustments.
► To enhance performance, Forefront Security for Exchange Server allows additional
processes to be created for the Transport and Realtime Scan Jobs. If the first process is
busy scanning a file, the second process will begin to scan, and so on. By default there
are four Transport Scan Job processes running. This can be increased up to ten by
changing the Transport Process Count field found under General Options >
Scanning. However, be cautious when increasing the number of processes. Each
process will consume additional server resources. It is best to increase them one at a
time and evaluate the performance at each step. The Forefront Service will need to be
recycled for the change to take effect.
One
Two
Three
SAVE!
Choose the Action. After verifying that the Transport Scan Job is
selected, choose the desired engine action using the dropdown
One
menu. This action will be applied across all scan engines for the
Transport Scan Job.
Select Notifications, if desired. If you wish to send notifications
when a virus is detected, click the Send Notifications check box.
Two
For details on how to enable and customize specific notifications,
see Step 8: Setting Notifications.
Select Quarantine, if desired. If you want to save copies of
infected files for inspection, select the Quarantine Files option.
Three While rare, it is possible that a scan engine will falsely identify a
message as a virus. This option saves a copy of the message
and/or attachment into the Quarantine list, where it can be
examined and, if need be, released.
SAVE! Click the Save button to have your settings take effect.
and valid documents were often infected. The virus world has changed over the years,
and the vast majority of viruses today are not cleanable (some estimates are that less
than 10% of viruses can be cleaned). Also, a valid infected file is much less common.
Most of the time the entire attachment is a virus and has no valid content. Because the
attempt to clean the virus requires additional processing resources, many organizations
decide to simply use the “Delete: Remove Infection” option.
► If you choose the “Clean” option, Forefront Security for Exchange Server will pass
the file to each of the selected scan engines for cleaning. If one is not able to clean the
file, it gets passed to the next scanner which will attempt to clean it. If none of the
engines can successfully clean the file, it is deleted.
► Consider whether you wish to use the Quarantine feature. It does provide an added
level of security because you can retrieve a message that has been incorrectly tagged
as a virus. However, there is overhead involved in quarantining files, particularly if many
viruses are captured each day. Large organizations may block millions of viruses in a
month. Many of these, however, may be worm viruses, which are not quarantined under
any circumstance (see Why WormPurge Is Important, below). Ideally, you would want
to Quarantine detected viruses, but you may determine that the better course is to
simply delete them.
► There are various considerations around sending notifications. Please see Step 8:
Setting Notifications to better understand your options.
Action Benefit
The entire worm message is The worm is stopped before it enters the network.
deleted, including the full Network impact is minimized; there is no impact
message body. on the mail store or the e-mail services.
The worm message or The Quarantine is kept much smaller and runs
attachment is never more efficiently.
quarantined, even if you select
the Quarantine option.
No notifications are sent, and Users are not even aware that a worm has been
users do not receive anything. detected and blocked, so there are no help desk
calls. Users are not alarmed. Notification floods
are stopped. Note that there is an option to send
Worm Notifications to specific Worm
Administrators.
The Worm List is updated periodically in the same manner as any other scan engine.
Because worms now form the vast majority of viruses in the wild, the WormPurge
feature in Forefront Security for Exchange Server is an exceptionally valuable tool in
network security.
The WormPurge feature also works on outbound and internal e-mail. This is important if
a machine in your network is infected and begins sending worm messages outbound.
Sending viruses could lead to legal liabilities for your company. WormPurge helps ensure
this does not happen. Internal protection is important to prevent an infected mailbox
from infecting other mailboxes in your organization.
Configuring WormPurge in Forefront Security for Exchange Server
WormPurge is configured by default. There is no need to turn it on. Just make sure you
set the Worm List to periodically update along with the rest of your scan engines as
explained in Step 2: Configuration Steps for Scan Engine Updates. WormPurge can be
deactivated by setting a registry key (as described in the User Guide). This is highly
discouraged and is considered a violation of security best practices.
One
Two
Three SAVE!
shown previously in Step 3: Configuring Engine Bias Settings and Step 4: Configuring
Engine Actions and WormPurge. Follow these same steps, but make sure you highlight
the Realtime Scan Job when making your settings.
TIPS, CONSIDERATIONS and BEST PRACTICES
► Be aware of the engines you are using. Some virus labs release signatures more
frequently than others on a regular basis (all labs will respond to a major outbreak with
more frequent updates). For example, the Kaspersky lab releases a new update nearly
every hour. The update schedule for that engine should be set accordingly.
► You should stagger your update times so they do not all happen at once. In addition,
you may want to use a time that does not end in 0 or 5. Many users will set their
updates at 1:05 or 1:30 etc. which can lead to contention at the download site. To avoid
this possibility, pick a time such as 1:09 or 1:42.
► Even if you aren’t using a particular engine, you should set it to update regularly, so
if you need to activate it the signatures will be up to date.
► If you have more than one server running Forefront Security for Exchange Server,
use a distributed update mechanism. This allows a single machine to download
signatures, which can then be distributed to other Microsoft Forefront servers (see the
User Guide for details on setting this up). Or, you can use the Microsoft® Forefront™
Server Security Management Console to provide this functionality. Either method will
save greatly on Internet bandwidth and make your updates quicker and more efficient.
► Ideally you would always use five engines and set them to Maximum Certainty. This
would provide the best possible level of detection. However, depending on the
characteristics of your server, you may or may not be able to run five engines. Each
additional engine does add to scanning time and resource usage. This is particularly
true at the Realtime Scan Job.
► A common practice is to use different bias settings at different points in the
scanning process. Microsoft recommends using the Favor Certainty setting for the best
combination of security and performance. As you monitor performance, you can make
adjustments if needed to the bias setting.
► To enhance performance, Forefront Security for Exchange Server allows additional
processes to be created for the Realtime Scan Job. If the first process is busy scanning
a file, the second process will begin to scan, and so on. By default there are four
Realtime Scan Jobs running. This can be increased up to ten by changing the Realtime
Process Count field found under General Options > Scanning.
However, be cautious when increasing the number of processes. Each process will
consume additional server resources. It is best to increase them one at a time and
evaluate the performance at each step. The Forefront Service will need to be recycled
for the change to take effect.
The Background Scan Job provides a key protection mechanism by periodically scanning
the mail Store with the latest signature updates. This provides a “clean up” mechanism
to catch any viruses that may have been missed during a Transport Scan Job. Microsoft
recommends that you run the Background Scan Job once each day, preferably at a time
of low mail activity.
Unless set otherwise, the Background Scan Job does not recognize the previously
scanned status of a message. It scans based on its own parameters. This is because the
Background Scan Job is meant specifically for re-scanning messages that have been
scanned before and applying the latest scan engine signatures to them.
The Background Scan Job has various configurable parameters that allow for
incremental background scanning. This reduces the extent of the scan, providing a
balance between protection and performance. The engines and bias settings used by
the Background Scan Job are the same as those set in the Realtime Scan Job.
One
Two
SAVE!
Option Description
Enable Background Scan Indicates that Forefront Security for Exchange Server
Job if “Scan On Scanner should initiate a background scan every time a scan
Update” Enabled engine is updated if the General Option setting Scan
on Scanner Update is enabled. This setting is
enabled by default. See the Tips section below for
more details.
Scan Only Messages With Indicates that the Background Scan Job should only
Attachments scan messages that include attachments. This setting
is enabled by default.
Scan Only Unscanned Indicates that the Background Scan Job should only
Messages scan messages that have not already been scanned.
Scan Messages Received Places limits on background scanning by allowing
Within The Last <x> administrators to configure Forefront Security for
Hours/Days Exchange Server to scan messages based on their age.
The options are: Anytime, 4 hours, 6 hours, 8
hours, 12 hours, 18 hours, 1 Day, 2 Days, 3 Days,
4 Days, 5 Days, 6 Days, 7 Days, and 30 Days.
If background scanning is scheduled to run daily, the
recommended setting is to scan the previous two days’
worth of mail. However, the time should be set based
on both security and performance considerations.
Update” Enabled, you are telling Forefront Security for Exchange Server to restart
background scanning every time a new scanner update is received (this is typically
many times a day). The Background Scan Job moves along scanning folder after folder,
and after a restart it continues scanning where it left off. This ensures that all folders
will get scanned. Keep in mind that turning this feature on means background scanning
will likely be a continuous process, and it may impact mail system performance.
However, this provides the most significant level of protection as it repeatedly applies
the latest signatures to messages in the Store. The scoping parameters are still
respected during this process, so the number of messages scanned is still limited.
Action Description
Skip: detect only Records the number of messages that meet the filter
criteria, but allows messages to route normally. This
setting does not provide any protection. However, you may
want to use this setting to log instances of specific file
types being sent or received without taking action on them.
Delete: Remove Deletes the file attachment. The detected file attachment is
contents removed from the message and a text file is inserted in its
place. The text file contains the text you configure using
the “Deletion Text” button. The user receives the original
message, with the unwanted file(s) removed.
Purge: eliminate Deletes the message from your mail system. The user
message never sees the message. If you wish to keep a copy of the
e-mail, choose the Quarantine File option.
Identify: tag message Writes a customizable prefix into the message subject line
or a custom X-header in to the e-mail header. This mode is
not commonly used for file filtering.
One
SAVE!
Two Three
Four
Select the Scan Job that the filter will apply to. File Filtering is
One available across all Scan Jobs. Each Scan Job can have its own set
of File Filters.
Create the File Filter. Create the file filter by clicking the Add
button and entering the proper syntax. You have a number of
Two
ways to enter a File Filter. The filters work by a combination of
name and file type. You must select both elements to complete
the filter.
File Name/Extension—this will match on the actual name of the
file. You can use a full file name (for example, file.doc) or use
wildcards (*.doc). This is shown under the File Names section.
File Type—in the File Types section you must associate the File
Name filter with file types. For instance, to block anything with a
name of *.doc, enter *.doc in the File Names section, and under
File Types choose All Types. To block only actual DOC files, then
enter *.doc under File Names, and under File Types clear the All
Types option and choose DOCFILE from the list of file types.
Keep in mind that the File Names and File Types sections work
together for every filter you create.
For more details on acceptable wildcard usage, see the Forefront
Security for Exchange Server User Guide. For details on other
ways to block files, see the “Tips” section below.
Enable the Filter and Choose the Actions and Notifications.
Three Using the drop-down make sure the filter is set to Enabled. This
provides a quick way to turn a filter off as well.
Set the Filter action and Quarantine options, as desired. To
notify senders or recipients that their file has been blocked, check
the Notifications box and then customize the notification
messages in the Notifications section.
Keep in mind that Actions, Quarantine, and Notification are set
individually for every filter you create.
Configure your Deletion Text. When a file is deleted based on a
Four File Filter, Forefront Security for Exchange Server replaces it with
text that tells the recipient the file was deleted. By default it says:
Microsoft Forefront Security for Exchange Server removed
a file since it was found to match a filter.
File name: "%File%"
Filter name: "%Filter%"
The text can be customized, as needed, to reflect any information
you may want to provide to your users. There are two dynamic
keywords that will be filled in based on the virus detected:
%File% — the name of the file that was removed
%Filter% — the name of the filter used to remove the file
Additional dynamic keywords can be added to the message, such
as the name of the sender or recipient. To insert a dynamic
keyword, right-click in the Deletion Text window and choose
Paste Keyword.
SAVE! Click the Save button so your settings take effect.
► File Filters can be created to work only on inbound or outbound messages. This is
useful in order to establish different rules for what enters your organization and what
leaves it. To set a filter for inbound or outbound messages, prefix the filter with <in> or
<out>. For example:
<in>test.doc — detects the file test.doc only if it is entering the organization
<out>test.doc — detects the file test.doc only if it is leaving the organization
► File Filters can be set to block files of a certain size, using standard comparison
operators ( =, <, >, <=, >=) and file size designations (KB, MB, GB). These can be
combined with file name and type conventions. For example:
*.bmp>=1.2MB — detects any BMP file equal to or greater than 1.2 Megabytes
<in>*.com>150KB — detects any inbound COM file greater than 150 Kilobytes
*.*>5GB — detects any file greater than 5 Gigabytes
► The file filtering of Forefront Security for Exchange Server provides excellent
flexibility for blocking files based on size. Rather than have a single rule that applies
across all file types, you can apply file type-specific rules.
► File filters are applied before virus scanning. Therefore, if a message contains a
virus and is also included on the list of blocked file types, it will be stopped by the File
Filter rule. If you then release this message from the Quarantine, it will go to the virus
engines for scanning and be caught as a virus.
► Be aware of product behavior when a message has more than one attachment type.
For example, if a message has two different attachments and one corresponding filter
rule was set to Delete and the other to Purge, the entire message will be purged.
► Each scan job has unique Deletion Text. You may want to design different text for
Transport Scan Job file filters and Realtime or Manual Scan Job file filters.
► You may want to use the Skip: detect only feature to identify specific files without
blocking them. This may be done for corporate compliance or monitoring reasons. For
example, you may want to filter for any spreadsheet files leaving the organization to
create an Incident Log event.
► In addition to direct File Filtering rules, Forefront Security for Exchange Server
allows the use of Filter Lists that can contain multiple filtering rules. Lists can also be
activated quickly to provide protection. Consult the User Guide for information on
creating Filter Lists.
► Forefront Security for Exchange Server can unpack and repack ZIP and other
container files while removing specific contents from within them. For example, if a ZIP
file contained a DOC file and an EXE file, and a File Filter were created to block EXE
files, then Forefront Security for Exchange Server will unpack the ZIP, remove the EXE
file, replace it with a text place marker, repackage the ZIP, and deliver it to the user.
This way, the user still is able to receive the DOC file, while the EXE is blocked.
One
Two
Three
SAVE!
One
SAVE!
Two
Three
Set the Incident Log Purge time. The Incident Log can grow
Two very large. When this happens, performance can be affected. To
keep the log from growing too large, you can set a Purge time.
Click the Purge After check box and choose how many days of
Incident Log data you wish to retain.
Use the filter to locate items. When searching for a specific
Incident, the Filtering field can be very helpful. Mark the check
Three
box, select a column category, and then enter specific filter text.
Wildcards are available for the Filtering field. Consult the
Forefront Security for Exchange Server User Guide for details. You
must click the Save button for your filter settings to take effect.
For example, you may wish to examine only virus incidents. To do
so, set the Filter Column to “Incident” and enter “Virus” in the
Filter box. Click Save and the result will be a list of all virus
detections.
SAVE!
Click the Save button to have your settings take effect.
One
Four
SAVE!
Two
Set the Quarantine Purge time. The Quarantine can grow very
large, especially if you are quarantining spam. When this happens,
Two performance can be affected. To keep the log from growing too
large, you can set a Purge time. Click the Purge After check box
and choose how many days of Quarantine data you wish to
maintain.
Use the filter to search for items. When searching for a
Three specific Quarantine item, the Filtering field can be very helpful.
Mark the check box, select a column category, and then enter
specific filter text. Wildcards are available for the Filtering field.
Consult the User Guide for details. You must click the Save button
for your filter settings to take effect.
For example, you may wish to examine only virus incidents. To do
so, set the Filter Column to “Incident” and enter “Virus” in the
Filter box. Click Save and the result will be a list of all Virus
detections.
Deliver items as needed. If a particular message or attachment
Four needs to be delivered, highlight the item and click the Deliver
button. The pop-up window will allow you to deliver the item to
the original recipient(s) or redirect it elsewhere. All items released
from Quarantine will be re-scanned for viruses, to prevent release
of a known virus. If the release from Quarantine releases a virus,
the item will return to the Quarantine. See the “Tips” section
below for other aspects of released items.
SAVE! Click the Save button so your settings take effect.
needed to view the message and attachment (after saving it to a separate file outside
the Quarantine). Without Outlook Express, it will be very difficult to extract the file from
within the EML format. If you do not wish to use Outlook Express, then by storing items
separately you can view the message body as a text file and/or retrieve the attachment
directly. To set how items are stored, go to the General Options panel and use the drop-
down list under Quarantine Messages.
Logging
The Logging settings allow Forefront Security for Exchange Server to generate detailed
logging information. While not as detailed as the Diagnostics logging, these logging
functions retain important historical information about the program’s environment.
Best Practices:
• Make the same selections as shown below.
• Enter a value for Max Program Log Size. If kept at 0, the Program Log may
grow too large and begin to cause performance issues.
Scanner Updates
The Scanner Update settings are used to customize how engine updates are performed,
as well as providing notifications about updates. The majority of these settings are used
on an as-needed basis.
Best Practices:
• Choose Perform Updates at Startup. This ensures that if any server running
Forefront Security for Exchange Server is inoperative for a long period of time,
the program will immediately begin to download new scan engines upon startup.
Scanning
The Scanning settings are a critical part of Forefront Security for Exchange Server and
should be carefully reviewed by security administrators. This extensive portion of the
General Options covers areas such as what kind of message scanning should be
performed, how certain file types should be handled (such as compressed files, corrupt
files, nested ZIP files, etc.), scanner time-out settings, quarantine behavior, and some
important infrastructure settings, such as entering lists of internal domains to help
distinguish internal from external e-mail. The default values provided will work in most
environments. The “Best Practices” section below refers only to items that are not
defaulted but may be desirable in your network.
Best Practices:
• Choose Scan Doc Files as Containers on both the Transport Scan Job and
Realtime Scan Job. This provides deep scanning of .doc files and others that use
the OLE embedded data format (such as .xls, .ppt). These files may have other
files embedded in them. There is a performance impact associated with this
practice, but it provides a more complete level of scanning.
• Choose Purge Message if Message Body Deleted – Transport. In some
instances, part or all of a message body will be deleted because it is considered
a virus, but the message may still be delivered with Deletion Text replacing the
removed contents. This can cause confusion or concern among recipients. By
selecting this option, the entire message is deleted and the user never sees it. It
is not very likely that the message contains any valid information.
• Make sure to fill out the Internal Address field with all of your internal mail
domains. This is necessary for Forefront to properly determine email direction.
Background Scanning
These settings are discussed in the Step 6: Configuring the Background Scan Job.