Logo
programming4us
programming4us
programming4us
programming4us
Home
programming4us
XP
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server
programming4us
Windows Phone
 
Windows Server

Exchange Server 2010 : Managing Anti-Spam and Antivirus Countermeasures (part 3) - Implementing File-Level Antivirus Scanning

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
5/28/2011 11:30:25 AM

3. Implementing File-Level Antivirus Scanning

Implementing file-level antivirus scanning can help enhance the security and health of your Exchange Server 2010 organization. However, you need to take care that the file-level scanner you use is correctly configured. Badly configured file-level scanners can cause problems in Exchange Server 2010. You can use two types of file-level scanners:

  • Memory-resident file-level scanners The antivirus software is loaded in memory at all times and checks all the files that are used on the hard disk and in computer memory.

  • On-demand file-level scanners You can configure the antivirus software to scan files on a hard disk manually or at scheduled intervals. Some antivirus software packages start an on-demand scan automatically after virus signatures are updated to ensure that all files are scanned with the latest signatures.

3.1. Potential Problems Related to File-Level Scanners

A number of problems may occur when you use file-level scanners with Exchange Server 2010. For example, a scanner may scan a file when the file is being used. This can cause the scanner to lock or quarantine the file. In particular, a file-level scanner could lock an Exchange log or a database file while Exchange tries to use it, resulting in a severe failure.

You should also be aware that file-level scanners do not provide protection against some email viruses, such as backdoor Trojan horse viruses. An example of this is the Storm Worm, which propagated itself through email messages. The worm joined the infected computer to a network of similarly compromised machines, known as a botnet, which could then be remotely controlled by an attacker and used to send spam email messages in periodic bursts.

When you deploy file-level scanners on Exchange Server 2010 servers, you can avoid many of the associated problems by ensuring that the appropriate exclusions, such as directory exclusions, process exclusions, and file name extension exclusions, are in place for both memory-resident and file-level scanning.
3.2. Directory Exclusions

You must exclude specific directories on each Exchange Server 2010 server or server role on which you run a file-level antivirus scanner. On a Mailbox server, you should exclude the following:

  • Exchange databases, checkpoint files, and log files These are located by default in subfolders of the %ExchangeInstallPath%\Mailbox folder. You can obtain the directory location using the EMS. For example, the following command determines the location of mailbox databases, transaction logs, and checkpoint files on the Mailbox server VAN-EX1:

    Get-MailboxDatabase -server VAN-EX1 | FL *path*

    Figure 6 shows the output from this command.

    Figure 6. Discovering the location of mailbox databases, transaction logs, and checkpoint files

  • Database content indexes These are located by default in the same folder as the database file.

  • Group Metrics files These are located by default in the %ExchangeInstallPath%\GroupMetrics folder.

  • General log files These include, for example, message tracking and calendar repair log files. These files are located by default in subfolders in the %ExchangeInstallPath%\TransportRoles\Logs folder and %ExchangeInstallPath%\Logging folder. The following command determines the log paths being used on the Mailbox server VAN-EX1:

    Get-MailboxServer -Identity VAN-EX1 | FL *path*

    Figure 7 shows the output from this command.

    Figure 7. Discovering the location of log paths

  • IIS system files These are located in the %SystemRoot%\System32\Inetsrv folder.

  • Offline address book files These are located by default in subfolders in the %ExchangeInstallPath%\ExchangeOAB folder.

  • Temporary folder used with offline maintenance utilities such as Eseutil.exe This is the folder location from which you run the .exe file. You can configure where you perform the operation when you run the utility.

  • The Mailbox database temporary folder This is located at %ExchangeInstallPath%\Mailbox\MDBTEMP.

  • Exchange-aware antivirus program folders.

If the Mailbox server is a member of a database availability group (DAG), you should also exclude the quorum disk and the %Winnt%\Cluster folder. If the server is a witness server, you should exclude the witness directory files. These are located on another server in the environment—typically a Hub Transport server—by default in \\%SystemDrive%:\DAGFileShareWitnesses\<DAGFQDN> and default share (<DAGFQDN>) on that server.

On a Hub Transport server, you should exclude the following:

  • Pickup and Replay message directory folders These folders are located by default in the %ExchangeInstallPath%\TransportRoles folder. To determine the paths being used on, for example, the Hub Transport server DEN-EX1, you run the following command:

    Get-TransportServer -Identity DEN-EX1 | FL *dir*path*

  • General log files These include, for example, message tracking and connectivity logs. These files are located by default in subfolders under the %ExchangeInstallPath%\TransportRoles\Logs folder. The following command would, for example, determine the log paths being used on the Transport server DEN-EX2:

    Get-TransportServer -Identity DEN-EX2| FL *logpath*,*tracingpath*

  • The Transport Server role Sender Reputation database, checkpoint, and log files These are located by default in the %ExchangeInstallPath%\TransportRoles\Data\SenderReputation folder.

  • The Transport Server role IP filter database, checkpoint, and log files These are located by default in the %ExchangeInstallPath%\TransportRoles\Data\IpFilter folder.

  • The Transport Server role queue database, checkpoint, and log files These are located by default in the %ExchangeInstallPath%\TransportRoles\Data\Queue folder.

  • The temporary folders used to perform content and object linking and embedding (OLE) conversions By default, content conversions are performed in the Exchange server’s TMP folder, and OLE conversions are performed in the %ExchangeInstallPath%\Working\OleConvertor folder.

  • Exchange-aware antivirus program folders.

On an Edge Transport server, you should exclude the following:

  • General log files These can include, for example, message tracking log files. These files are located by default in subfolders in the %ExchangeInstallPath%\TransportRoles\Logs folder. To determine the log paths being used on the Edge Transport server VAN-EX2, for example, you run the following EMS command:

    Get-TransportServer -Identity VAN-EX2 | FL *logpath*,*tracingpath*

  • Pickup and Replay message folders These are located by default in the %ExchangeInstallPath%\TransportRoles folder. To determine the log paths being used on the Edge Transport server VAN-EX2, for example, you run the following command:

    Get-TransportServer -Identity VAN-EX2 | FL *dir*path*

  • AD LDS database and log files These are located by default in the %ExchangeInstallPath%\TransportRoles\Data\Adam folder.

  • Transport Server role queue database, checkpoint, and log files These are located by default in the %ExchangeInstallPath%\TransportRoles\Data\Queue folder.

  • Transport Server role IP filter database, checkpoint, and log files These are located by default in the %ExchangeInstallPath%\TransportRoles\Data\IpFilter folder.

  • Transport Server role Sender Reputation database, checkpoint, and log files These are located by default in the %ExchangeInstallPath%\TransportRoles\Data\SenderReputation folder.

  • The temporary folders that are used to perform content and OLE conversions By default, content conversions are performed in the Exchange server’s TMP folder, and OLE conversions are performed in the %ExchangeInstallPath%\Working\OleConvertor folder.

  • Exchange-aware antivirus program folders.

On a Client Access server, you should exclude the following:

  • The compression folder used with OWA On servers running IIS 7.0, the compression folder is located by default at %SystemDrive%\inetpub\temp\IIS Temporary Compressed Files. On servers running IIS 6.0, the compression folder is located by default at %systemroot%\IIS Temporary Compressed Files.

  • IIS system files in the %SystemRoot%\System32\Inetsrv folder.

  • The Internet-related files stored in subfolders of the %ExchangeInstallPath%\ClientAccess folder.

  • Folders on servers that have protocol logging enabled for POP3 or IMAP4 The POP3 folder %ExchangeInstallPath%\Logging\POP3 and the IMAP4 folder: %ExchangeInstallPath%\Logging\IMAP4.

  • The folder Inetpub\logs\logfiles\w3svc.

  • The temporary folders that are used to perform content and OLE conversions By default, content conversions are performed in the Exchange server’s TMP folder, and OLE conversions are performed in the %ExchangeInstallPath%\Working\OleConvertor folder.

On a Unified Messaging server, you should exclude the following:

  • Grammar files for different locales These could include, for example, en-EN and es-ES. By default, these files are stored in subfolders of the %ExchangeInstallPath%\UnifiedMessaging\grammars folder.

  • Voice mail files temporarily stored in the %ExchangeInstallPath%\UnifiedMessaging\voicemail folder.

  • Voice prompts, greetings, and informational message files These are stored by default in the subfolders of the %ExchangeInstallPath%\UnifiedMessaging\Prompts folder.

  • Temporary files generated by unified messaging These are stored by default in the %ExchangeInstallPath%\UnifiedMessaging\temp folder.

On a server running Microsoft Forefront Protection 2010 for Exchange Server, you should exclude the following:

  • The Forefront installation folder By default, this is %Program Files%\Microsoft Forefront Security\Exchange Server.

  • Quarantined files These are stored by default in the %Program Files%\Microsoft Forefront Security\Exchange Server\Data\Quarantine folder.

  • Archived messages These are stored by default in the %Program Files%\Microsoft Forefront Security\Exchange Server\Data\Archive folder.

  • Antivirus engine files These are stored by default in the subfolders of %Program Files%\Microsoft Forefront Security\Exchange Server\Data\Engines\x86 folder.

  • Configuration files These are stored by default in the %Program Files%\Microsoft Forefront Security\Exchange Server\Data folder.


Note:

The topic of exclusions configured on file-level virus scanning software inevitably involves lists of exclusions. Treat these lists as a reference. Read through them a few times but do not attempt to memorize them. Know that you need to configure directory, file, and process exclusions.


3.3. Process Exclusions

If a file-level scanner supports the scanning of processes and the incorrect processes are scanned, this can adversely affect Exchange operation. You should exclude the following processes from file-level scanners:

  • Cdb.exe

  • Cidaemon.exe

  • Cluster.exe

  • Dsamain.exe

  • EdgeCredentialSvc.exe

  • EdgeTransport.exe

  • ExFBA.exe

  • GalGrammarGenerator.exe

  • Inetinfo.exe

  • Mad.exe

  • Microsoft.Exchange.AddressBook.Service.exe

  • Microsoft.Exchange.AntispamUpdateSvc.exe

  • Microsoft.Exchange.ContentFilter.Wrapper.exe

  • Microsoft.Exchange.EdgeSyncSvc.exe

  • Microsoft.Exchange.Imap4.exe

  • Microsoft.Exchange.Imap4service.exe

  • Microsoft.Exchange.Infoworker.Assistants.exe

  • Microsoft.Exchange.Monitoring.exe

  • Microsoft.Exchange.Pop3.exe

  • Microsoft.Exchange.Pop3service.exe

  • Microsoft.Exchange.ProtectedServiceHost.exe

  • Microsoft.Exchange.RPCClientAccess.Service.exe

  • Microsoft.Exchange.Search.Exsearch.exe

  • Microsoft.Exchange.Servicehost.exe

  • MSExchangeASTopologyService.exe

  • MSExchangeFDS.exe

  • MSExchangeMailboxAssistants.exe

  • MSExchangeMailboxReplication.exe

  • MSExchangeMailSubmission.exe

  • MSExchangeRepl.exe

  • MSExchangeTransport.exe

  • MSExchangeTransportLogSearch.exe

  • MSExchangeThrottling.exe

  • Msftefd.exe

  • Msftesql.exe

  • OleConverter.exe

  • Powershell.exe

  • SESWorker.exe

  • SpeechService.exe

  • Store.exe

  • TranscodingService.exe

  • UmService.exe

  • UmWorkerProcess.exe

  • W3wp.exe

If you are deploying Forefront Protection for Exchange Server, you should also exclude the following processes:

  • Adonavsvc.exe

  • FscController.exe

  • FscDiag.exe

  • FscExec.exe

  • FscImc.exe

  • FscManualScanner.exe

  • FscMonitor.exe

  • FscRealtimeScanner.exe

  • FscStatsServ.exe

  • FscTransportScanner.exe

  • FscUtility.exe

  • FsEmailPickup.exe

  • FssaClient.exe

  • GetEngineFiles.exe

  • PerfmonitorSetup.exe

  • ScanEngineTest.exe

  • SemSetup.exe

  • File name extension exclusions

Sometimes directory exclusions fail or files are moved from their default locations. Therefore, in addition to excluding directories and processes, you should exclude the following Exchange-specific file name extensions:

  • Application-related extensions, for example, .config, .dia, and .wsb

  • Database-related extensions, for example, .chk, .log, .edb, .jrs, and .que

  • Offline address book–related extensions (.lzx)

  • Content Index–related extensions, for example, .ci, .wid, .dir, .000, .001, and .002

  • Unified Messaging–related extensions, for example, .cfg and .grxml

  • GroupMetrics extensions, for example, .dsc, .bin, and .xml

  • Forefront Protection 2010 for Exchange Server–related extensions, for example, .avc, .dt, .lst, .cab, .fdb, .mdb, .cfg, .fdm, .ppl, .config, .ide, .set, .da1, .key, .v3d, .dat, .klb, .vdb, .def, .kli, and .vdm

Note that the file name extensions listed for Forefront Protection 2010 for Exchange Server are the signature files from various antivirus directory engines. Additional file name extensions may be added in the future as third-party antivirus vendors update their antivirus signature files.

Other -----------------
- SharePoint 2010 : The SharePoint Object Model (part 3) - Programmatically Using SQL Snapshots
- SharePoint 2010 : The SharePoint Object Model (part 2) - Export, Import, and Associated Types & Site Collection Backup and Restore
- SharePoint 2010 : The SharePoint Object Model (part 1) - Extending Catastrophic Backup and Restore Through the SharePoint API
- BizTalk 2010 Recipes : Business Activity Monitoring - Setting Up BAM Alerts
- BizTalk 2010 Recipes : Business Activity Monitoring - Using the BAM Portal
- Exchange Server 2010 : Ensuring Message Integrity (part 3) - Configuring Permissions on Active Directory Objects & Rights Management Services Federation
- Exchange Server 2010 : Ensuring Message Integrity (part 2) - Using TLS and MTLS & Implementing Domain Security
- Exchange Server 2010 : Ensuring Message Integrity (part 1) - Using S/MIME Extensions
- Windows Server 2003 : Designing a Security Infrastructure - Securing a Wireless Network
- Windows Server 2003 : Designing a Security Infrastructure - Planning a Security Update Infrastructure
 
 
Top 10
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
 
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server