Feedback will be sent to Microsoft: By pressing the submit button, your feedback will be used to improve Microsoft products and services. Privacy policy. When you run Windows antivirus programs on Microsoft Exchange servers, you can help enhance the security and health of your Exchange organization. However, if they aren't configured correctly, Windows antivirus programs can cause problems in Exchange Server.
Memory-resident scanning or real-time protection monitors all files and processes that are loaded and running in a computer's active memory. File-level scanning refers to checking files on the hard disk for viruses manually or on a regular schedule. Some antivirus programs start an on-demand scan automatically after the virus signatures are updated to make sure that all files are scanned with the latest signatures.
The biggest potential problem is a Windows antivirus program might lock or quarantine an open log file or database file that Exchange needs to modify. This can cause severe failures in Exchange Server, and it might also generate event log errors. Therefore, excluding these files from being scanned by the Windows antivirus program is very important. Another issues to consider is that Windows antivirus programs can't replace email-based antispam and antimalware solutions because Windows antivirus programs that run on Windows servers can't detect viruses, malware, and spam that are distributed only through email.
When you deploy a Windows antivirus program on an Exchange server, make sure that the folder exclusions, process exclusions, and file name extension exclusions that are described in these sections are configured for both memory-resident and file-level scanning. By using either configuration method, you can, for example, modify the list of file types that are blocked in email messages.
Outlook checks for up-to-date antivirus software to help determine when to display OAB access warnings and other Outlook security warnings.
When you plan antivirus scanning for Outlook files and email messages, take precautions to prevent the issues that can arise. If you use antivirus software to perform file-level scanning on them, while Outlook is in use, data corruption issues might occur.
Instead, we recommend that you scan email message attachments on the email server and on the Outlook client computer. To scan email messages that are on an email server, you must use antivirus software that was developed to scan incoming and outgoing email. To scan the attachments that are included in email messages on the client computer, use antivirus software on the client computer.
We recommend this in case an unwanted message reaches your email client because antivirus software on the email server failed to identify it. Outlook includes a junk email filter that replaces the rules that were used in earlier versions of Outlook to filter mail. Messages caught by the filter are moved to the Junk Email folder, where they can be viewed or deleted later. Junk email senders often add a web beacon in HTML email messages that includes external content, such as graphic images.
When users open or view the email, the web beacons verify that their email addresses are valid. This increases the probability that users will receive more junk email messages. Outlook reduces the probability that users will become targets for future junk email by blocking automatic picture downloads from external servers by default.
Outlook helps protect against issues that are created by phishing email messages and deceptive domain names. By default, Outlook screens phishing email messages.
These messages seem legitimate but they attempt to trick users to provide personal information, such as a user's bank account number and password. Outlook also helps prevent the receipt of email messages from deceptive users by warning about suspicious domain names in email addresses.
Outlook supports internationalized domain names IDNs in email addresses. IDNs allow people to register and use domain names in their native languages instead of English.
IDN support allows phishers to send homograph attacks, a situation in which a look-alike domain name is created by using alphabet characters from different languages, not just English, with the intention of deceiving users into thinking that they are visiting a legitimate website. Outlook provides cryptographic features for sending and receiving security-enhanced email messages over the Internet or intranet.
You can customize features in an Outlook deployment to set cryptographic options that are appropriate for your organization. You can also implement additional features to help improve security in email messaging. For example, you can provide security labels that match your organization's security policy. An Internal Use Only label might be implemented as a security label to apply to email messages that should not be sent outside your company. Information Rights Management IRM helps users prevent sensitive email messages and other Office content, such as documents and worksheets, from being forwarded, edited, or copied by unauthorized people.
In Outlook , users can use IRM to mark email messages with "Do not forward," which automatically restricts permission for recipients to forward, print, or copy the message.
In addition, you can define customized IRM permission policies in Office for your organization's needs and can deploy the new permission policies for users to use with email messages or other Office documents. Users can use the Contacts, Tasks, and Calendar features in Outlook without being connected to an email server. You can install Outlook over any previous installation of Outlook.
User settings that are stored in the registry are migrated when you upgrade from Office Outlook or later versions to Outlook If a MAPI profile already exists on a user's computer, you typically can configure a deployment to continue to use the profile. When you upgrade users from an earlier version of Outlook, you must make choices about how to configure user profiles, consider Cached Exchange Mode issues, and be aware of fax and forms changes.
The process of upgrading users who currently have Cached Exchange Mode enabled in Outlook , Outlook , Outlook , or Outlook is straightforward. If you do not change Cached Exchange Mode settings, the same settings are kept for Outlook By default, when Outlook is installed, a new compressed version of the Outlook data file.
This compressed version of the. If you must keep Outlook from creating a new compressed Outlook data file. With Outlook, if you're using the volume licensed version MSI-based installation , such as Office Standard , you cannot have two versions of Outlook installed.
Use a version of antivirus software that is designed to work with Active Directory domain controllers and that uses the correct Application Programming Interfaces APIs to access files on the server. Older versions of most vendor software inappropriately change a file's metadata as the file is scanned.
This causes the File Replication Service engine to recognize a file change and therefore schedule the file for replication. Newer versions prevent this problem. For more information, see the following article in the Microsoft Knowledge Base:. Do not use a domain controller to browse the Internet or to perform other activities that may introduce malicious code. We recommend that you minimize the workloads on domain controllers. When possible, avoid using domain controllers in a file server role.
This lowers virus-scanning activity on file shares and minimizes performance overhead. The location of these files is specified in the following registr subkey:. Specifically, exclude the following files:. Exclude the Active Directory transaction log files.
The location of these files is specified in the following registry subkey:. Exclude the following files that exist in the folder:. Turn off scanning of files in the FRS Database Log files that are specified in the following registry subkey:. Exclude the following files. Note Settings for specific file exclusions is documented here for completeness. By default, these folders allow access only to System and Administrators.
Please verify that the correct protections are in place. This attribute contains the path to the actual location that DFS replication uses to stage files. Exclude the following files from this folder and all its subfolders:. Turn off scanning of files in the DFSR database and working folders. The location is specified by the following registry subkey:. In this example, the path would contain "Domain System Volume.
By default, DHCP files that should be excluded are present in the following folder on the server:. The location of DHCP files can be changed. In some scenarios, on a Windows Server based computer that has the Hyper-V role installed or on a Microsoft Hyper-V Server or on a Microsoft Hyper-V Server R2-based computer, it may be necessary to configure the real-time scanning component within the antivirus software to exclude files and entire folders.
Windows More Need more help? Expand your skills.
0コメント