ScanMail™ for Microsoft™ Exchange 11.0 Online Help
Contents
Index
Search
Search Knowledge Base
Collapse All
Expand All
Previous Page
Next Page
Introducing ScanMail and Getting Started
Introducing Trend Micro ScanMail for Microsoft Exchange
System Requirements
ScanMail with Exchange Server 2013
ScanMail with Exchange Server 2010
ScanMail with Exchange Server 2007
Cluster Installations
ScanMail Integration with Trend Micro Products
What’s New
Features and Benefits
Web-based Product Console
Installation and Support
Antivirus Features and Scan Types
Multiple Scan Filters
Informative Monitoring Tools
Version Comparison
How ScanMail Protects the Microsoft Exchange Environment
About Uncleanable Files
ScanMail Technology
Trend Micro Scan Technology
The Trend Micro Virus Scan Engine
Scan Engine Updates
The Trend Micro Pattern Files
Pattern File Numbering
How the Scan Engine Works with the Pattern File
About ActiveUpdate
Incremental Updates of the Pattern File
Using ActiveUpdate with ScanMail
IntelliScan
IntelliTrap
Trend Micro ActiveAction
About Hot Fixes, Patches, and Service Packs
Enterprise Protection Strategy
Outbreak Prevention Services
Getting Started with ScanMail
Getting Started
The Product Console
Viewing the Product Console for a Local Server
Viewing the Product Console from a Remote Server
Product Console Main View
Product Console Elements
Getting Help While Using the ScanMail Product Console
ScanMail Registration
Online Purchase
Reseller Purchase
Registering ScanMail
ScanMail Activation
Activating ScanMail During Installation
Activating ScanMail After Installation Using the Product Console
Activation Codes
Standard Activation Code
Suite Activation Code
Suite Activation Code with Additional Features
Activation Code Comparison
Reactivating ScanMail
About ScanMail Updates
Updating ScanMail - Prerequisite Tasks
Updating Components on Clusters
Configuring Your Proxy Settings
Configuring Manual Updates
Configuring Scheduled Update
Configuring the Download Source
Rolling Back a Component Update
Establishing and Maintaining Security for Your Exchange Servers
Establishing a Security Baseline
Maintaining Security
Managing Outbreak Situations
Managing ScanMail
Understanding Real-time Monitor
Viewing Real-time Monitor for a Remote Server
Understanding the Server Management Console
Activating Server Management
Using the Server Management Console
Viewing Servers from the Product Console
Viewing Virtual Servers on a Cluster
Using Server Management to Replicate Configurations
Manually Creating a ScanMail Resource for Virtual Servers
Creating a Resource for Windows Server 2003
Creating a Resource for Windows Server 2008, Exchange 2007 SCC Cluster
Creating a Resource for Windows Server 2008, Exchange 2007 CCR Cluster
Creating a Resource for Exchange 2007 SCR Cluster
Starting and Stopping the Services
Understanding ScanMail Icons
Configuring Scans and Scan Filters
Understanding Smart Protection
About Trend Micro Smart Protection
The Need for a New Solution
Smart Protection Services
File Reputation Services
Web Reputation Services
Smart Protection Sources
Trend Micro Smart Protection Network
Smart Protection Server
Smart Protection Sources Compared
Smart Protection Pattern Files
Configuring Local Sources
Scan Service Settings
Configuring Scans
About Scans
Real-time Scan
Trust Scan
Manual Scan
Scheduled Scan
Scheduled Scan List
About Manual Scans and Scheduled Scans on Cluster Servers
Manual and Scheduled Scan Settings
Compressed File Handling
Compression Types
Blocking All Compressed Attachments
Security Risk Scan Compressed File Restrictions
About ScanMail Actions
Scan Actions by Scan Settings
Advanced Scan Action Options
Notifications
Notification Settings
Configuring Security Risk Scans
About Security Risk Scans
ScanMail Scan Hierarchy
About Advanced Threat Scan Engine
Security Risk Scan Actions
Using Customized Scan Actions
Enabling Real-time Security Risk Scan
Configuring Security Risk Scan Targets
Configuring Security Risk Scan Actions
Configuring Macro Scanning
Configuring Security Risk Scan Notifications
Configuring Attachment Blocking
About Attachment Blocking
Enabling Real-time Attachment Blocking
Adding an Exception to the Attachment Blocking Global Policy
Editing an Attachment Blocking Exception
Configuring Attachment Blocking Targets
Configuring Attachment Blocking Actions
Configuring Attachment Blocking Notifications
Configuring Content Filtering
About Content Filtering
Active Directory Integrated Policies
Data Leakage Prevention
Enabling Real-time Content Filtering
Global Settings
Configuring Content Filtering Policies
Configuring the Senders and Recipients List (Match any or apply to all)
Configuring Content Filtering Targets
Imported Keyword Lists
Configuring Content Filtering Actions
Configuring Content Filtering Notifications
Enabling a Content Filtering Policy
Configuring a Content Filtering Exception
Editing a Content Filtering Policy
Configuring Data Loss Prevention
About Data Loss Prevention
Data Identifier Types
Expressions
Predefined Expressions
Customized Expressions
Criteria for Customized Expressions
Adding and Editing Expressions
Importing Expressions
Keywords
Predefined Keyword Lists
Customized Keyword Lists
Customized Keyword List Criteria
Adding and Editing Keyword Lists
Importing Expressions
About Data Loss Prevention Templates
Predefined DLP Templates
Defining a Data Loss Prevention Template
Deleting a Data Loss Prevention Template
Importing a Data Loss Prevention Template
Exporting a Data Loss Prevention Template
About Data Loss Prevention Policies
Global Settings
Configuring a Data Loss Prevention Policy
Selecting Accounts
Configuring DLP Targets
Configuring DLP Actions
Configuring DLP Notifications
Enabling a DLP Policy
Configuring Spam Prevention
About Spam Prevention
Spam Folder Configuration
About Email Reputation
Trend Micro Email Reputation Standard
Trend Micro Email Reputation Advanced
Enabling Email Reputation
Configuring Email Reputation Targets
Configuring Email Reputation Actions
About Content Scanning
Spam Engine and Spam Pattern Files
End User Quarantine
Approved and Blocked Sender Lists
Spam Filter
Enabling Content Scanning
Configuring Content Scanning Targets
Configuring Content Scanning Actions
Configuring Web Reputation
About Web Reputation Services
Command & Control Contact Alert Services
Configuring the Web Reputation Scan Service
Enabling Web Reputation
Configuring Web Reputation Targets
Configuring Web Reputation Actions
Configuring Web Reputation Notifications
Configuring Search & Destroy
About Search & Destroy
Configuring Search & Destroy Access Accounts
Activating Search & Destroy
About Mailbox Searches
Syntax Used for Keyword Strings
Mailbox Search Options
Configuring a Mailbox Search
Modifying a Mailbox Search
Deleting a Mailbox Search
Viewing Mailbox Search Results
Configuring Search & Destroy Settings
Viewing Search & Destroy Event Logs
Troubleshooting Search & Destroy
Configuring Deep Discovery Advisor
About Deep Discovery Advisor
Configuring Deep Discovery Advisor Settings
Managing ScanMail
Managing the Quarantine Area
About the Quarantine
Configuring the Quarantine Folder/Directory
Performing a Quarantine Query
Scheduling Automatic Quarantine Maintenance
Manually Performing Quarantine Maintenance
Resending Quarantined Messages
Monitoring ScanMail
Viewing the Summary Screen
Summary: System
Summary: Security Risks
Summary: Spam
About Alerts
System Events
Outbreak Alerts
Alert Notification Settings
About Reports
One-time Reports
Generating One-time Reports
Scheduled Reports
Generating Scheduled Reports
Report Maintenance
About Logs
Types of Logs
Querying Logs
Log Maintenance
Performing Manual Log Maintenance
Performing Scheduled Log Maintenance
Performing Administrative Tasks
Configuring Proxy Settings
Global Notification Settings
Configuring Global Notification Settings
Configuring Spam Maintenance
Configuring Real-time Scan Settings
About Access Control
Access Control Permissions
Enabling Access Control
Configuring Access Control
About Special Groups
Configuring Special Groups
About Internal Domains
Configuring Internal Domains
Product License
World Virus Tracking Program
Joining the World Virus Tracking Program
About Trend Micro Control Manager
About Trend Micro Management Communication Protocol
Using ScanMail with Control Manager
Registering to Control Manager
Unregistering ScanMail from Control Manager
Using Trend Support / System Debugger
Getting Help
Understanding Security Risks
Understanding the Terms
About Internet Security Risks
Viruses/Malware
Virus/Malware Writers
Malware Naming
Compressed Files
Joke Programs
Macro Viruses/Malware
Mass-Mailing Attacks
Trojan Horse Programs
Worms
Zip of Death
About Spyware/Grayware
Potential Risks and Threats
How Spyware/Grayware Gets into your Network
Encoding Types
Multipurpose Internet Mail Extensions (MIME) Types
True File Type
Disease Vector
Phish
Frequently Asked Questions
Updating ScanMail
Do I have the latest pattern file or Service Pack?
Locating the ScanMail Version
Where can I find the latest patches for updating ScanMail?
Expressions and Keywords
What are regular expressions?
How do I use keywords?
How do I use operators with keywords?
File Handling
How do I handle large files?
What is a compression ratio?
How do I calculate the size of a decompressed file?
Logging On and Registration
Where can I find my Activation Code and Registration Key?
Why am I unable to log on to the product console on Windows Server 2008?
What if the remote SQL server database account password is changed?
Security Threats
What is spyware/grayware?
What are phish attacks?
What is the EICAR test virus?
What are false positives?
Are some files dangerous?
How do I send Trend Micro suspected Internet threats?
How do I send Trend Micro detected viruses?
Troubleshooting
Updating the Scan Engine Manually
Updating the Pattern File (lpt$vpn.xxx) Manually
Known Issues
Contacting Trend Micro
Contacting Technical Support
TrendLabs
Speeding Up Your Support Call
Knowledge Base
Security Information Site
Introducing Trend Micro Control Manager
Control Manager Standard and Advanced
Introducing Control Manager Features
Control Manager Architecture
Registering ScanMail to Control Manager
Understanding User Access
Control Manager User Access with ScanMail User Access
MCP Heartbeat
Using the Schedule Bar
Setting an Agent Communication Schedule for a Managed Product
Determining the Right Heartbeat Setting
Configuring the Agent Communicator Heartbeat
Understanding the Product Directory
Product Directory Structure Recommendations
Accessing the Product Directory
Manually Deploying Components Using the Product Directory
Viewing Status Summaries for Managed Products
Accessing Through the Dashboard
Accessing Through the Product Directory
Configuring Managed Products
Issuing Tasks to Managed Products
Querying and Viewing Managed Product Logs
About Recovering Managed Products Removed From the Product Directory
Recovering Managed Products Removed From the Product Directory
Stopping and Restarting Control Manager Services
Searching for Managed Products, Product Directory Folders, or Computers
Searching for a Folder or Managed Product
Performing an Advanced Search
Refreshing the Product Directory
Understanding the Directory Management Screen
Using the Directory Management Screen Options
Using the Directory Management Screen
Accessing the Directory Management Screen
Creating Folders
Renaming Folders or Managed Products
Moving Folders or Managed Products
Deleting User-Defined Folders
Downloading and Deploying New Components
Manually Downloading Components
Step 1: Configure a Deployment Plan for Your Components
Step 2: Configure Your Proxy Settings (If You Use a Proxy Server)
Step 3: Select the Components to Update
Step 4: Configure the Download Settings
Step 5: Configure the Automatic Deployment Settings
Step 6: Complete the Manual Download
Understanding Scheduled Download Exceptions
Configuring Scheduled Download Exceptions
Configuring Scheduled Downloads
Step 1: Configure a Deployment Plan for Your Components
Step 2: Configure Your Proxy Settings (If You Use a Proxy Server)
Step 3: Select the Components to Update
Step 4: Configure the Download Schedule
Step 5: Configure the Download Settings
Step 6: Configure the Automatic Deployment Settings
Step 7: Enable the Schedule and Save Settings
Configuring Scheduled Download Schedule and Frequency
Configuring Scheduled Download Settings
Configuring Scheduled Download Automatic Deployment Settings
Understanding Deployment Plans
Configuring Proxy Settings
Configuring Update/Deployment Settings
Enabling HTTPS Download
Enabling UNC Download
Setting "Log on as batch job" Policy
Using Logs
Understanding Managed Product Logs
Querying Log Data
Understanding Data Views
Understanding Reports
Understanding Control Manager Report Templates
Understanding Control Manager 5 Templates
Understanding Control Manager 3 Templates
Adding One-time Reports
Step 1: Access the Add One-time Report Screen and Select the Report Type
Step 2: Specify the Product/Products From Which the Report Data Generates:
Step 3: Specify the Date That the Product/Products Produced the Data:
Step 4: Specify the Recipient of the Report:
Adding Scheduled Reports
Step 1: Access the Add Scheduled Report Screen and Select the Report Type
Step 2: Specify the Product/Products from Which the Report Data Generates
Step 3: Specify the Date that the Product/Products Produced the Data
Step 4: Specify the Recipient of the Report
Windows Event Log Codes
Database Schema for 64-bit Operating Systems
Log Database Schema
Log View Database Schema
Report Database Schema
Database Schema for 32-bit Operating Systems
Log Database Schema
Log View Database Schema
Report Database Schema
Best Practices
Real-time Scan Settings for Server Roles
Attachment Blocking Policies
Exception Rule Replication
Sample Usage Scenarios
Scenario:
Solution:
Scenario:
Solution:
Known Issue:
Content Filtering Active Directory Integrated Policies
Content Filtering Policy Replication
Data Loss Prevention Policies
Data Identifiers and Template Creation
Data Loss Prevention Policy Replication
Data Loss Prevention: Hidden Keys
Optimizing Web Reputation
Troubleshooting Web Reputation Performance Issues
Search & Destroy Best Practices
Search & Destroy Prerequisites
Using Search & Destroy in Mixed Exchange Environments
Preparing Exchange Server 2013 for Mixed Exchange Environments
Configuring Search & Destroy in a Multiple Data Center Environment
Optimizing Search Criteria
Optimizing Mailbox Searches
Deleting Mailbox Searches
Exchange Management Shell Commands
Service Account Settings
Discovery Mailbox Settings
Exchange Server 2013 Throttling Policy Settings
Backend Search Tasks
Deep Discovery Advisor - Integration Pre-requisites
Internal Domains
Recommended Settings
"Log on as batch job" policy
[1]
access control
configuring
[1]
[2]
enabling
[1]
permissions
[1]
full
[1]
read
[1]
role
[1]
Search & Destroy administrator
[1]
actions
[1]
[2]
attachment blocking
[1]
compressed files
[1]
Data Loss Prevention
[1]
security risk scan
[1]
spam prevention
content scanning
[1]
web reputation
[1]
activating ScanMail
[1]
[2]
Activation Code
[1]
additional features
[1]
standard
[1]
suite
[1]
reactivating
[1]
Activation Code
[1]
locating
[1]
reactivating
[1]
standard
[1]
suite
[1]
suite with additional features
[1]
ActiveAction
[1]
[2]
ActiveUpdate
[1]
[2]
incremental updates
[1]
advanced threats
[1]
actions
[1]
[2]
APT
[1]
exploits
[1]
targeted attacks
[1]
zero-day attacks
[1]
Advanced Threat Scan Engine
[1]
about
[1]
actions
[1]
[2]
Advanced Threat Scan Engine (ATSE)
scan engine
[1]
[2]
adware
[1]
alerts
[1]
[2]
[3]
notifications
[1]
outbreak
[1]
system events
[1]
ATSE
[1]
about
[1]
actions
[1]
[2]
attachment blocking
[1]
[2]
actions
[1]
[2]
[3]
configuring
[1]
compressed file handling
[1]
enabling
[1]
exceptions
add
[1]
edit
[1]
global policy
[1]
logs
[1]
notifications
[1]
settings
[1]
target
configuring
[1]
automatic deployment settings
Scheduled Download
[1]
Command & Control Contact Alert Services
[1]
categories
[1]
Deep Discovery Advisor
[1]
Global Intelligence list
[1]
Smart Protection Server
[1]
Virtual Analyzer list
[1]
components
downloading
[1]
compressed files
[1]
[2]
[3]
[4]
[5]
[6]
actions
[1]
compression ratios
[1]
compression types
[1]
Denial-of-Service
[1]
compression types
[1]
configuring
[1]
access control
[1]
[2]
internal domains
[1]
local sources
[1]
macro scans
[1]
managed products
[1]
notifications
[1]
proxy settings
[1]
quarantine folder/directory
[1]
real-time scan
[1]
Scheduled Download
automatic deployment settings
[1]
Scheduled Download Exceptions
[1]
Scheduled Download Settings
[1]
security risk scan
target
[1]
special groups
[1]
[2]
user accounts
[1]
web reputation
[1]
World Virus Tracking Program
[1]
contacting
technical support
[1]
content filtering
[1]
actions
[1]
[2]
[3]
alerts
[1]
data leakage prevention
[1]
enabling
[1]
[2]
exceptions
[1]
global settings
[1]
keywords
[1]
[2]
[3]
logs
[1]
notifications
[1]
policies
[1]
edit
[1]
enabling
[1]
exceptions
[1]
name and priority
[1]
selecting accounts
[1]
specify action
[1]
specify notification
[1]
specify target
[1]
content scanning
[1]
actions
[1]
enabling
[1]
target
[1]
Control Manager
[1]
[2]
about
[1]
accounts
[1]
agent
[1]
antivirus and content security components
[1]
[2]
basic features
[1]
configuring accounts
[1]
features
[1]
mail server
[1]
managed product
[1]
MCP
[1]
report server
[1]
see Trend Micro Control Manager
[1]
SQL database
[1]
Trend Micro Management Infrastructure
[1]
web-based management console
[1]
web server
[1]
widget framework
[1]
Control Manager antivirus and content security components
Anti-spam rules
[1]
Engines
[1]
Pattern files/Cleanup templates
[1]
creating
folders
[1]
criteria
customized expressions
[1]
keywords
[1]
customized expressions
[1]
[2]
criteria
[1]
customized keywords
[1]
criteria
[1]
data identifiers
[1]
expressions
[1]
creating
[1]
importing
[1]
[2]
file attributes
[1]
keyword lists
creating
[1]
keywords
[1]
data leakage prevention
[1]
Data Loss Prevention
[1]
[2]
actions
[1]
[2]
[3]
alerts
[1]
data identifiers
[1]
expressions
[1]
[2]
[3]
keyword lists
[1]
expressions
[1]
[2]
[3]
[4]
global settings
[1]
keywords
[1]
[2]
[3]
[4]
logs
[1]
notifications
[1]
policies
[1]
[2]
[3]
[4]
[5]
[6]
[7]
actions
[1]
creating
[1]
enabling
[1]
name and priority
[1]
notifications
[1]
selecting accounts
[1]
targets
[1]
templates
[1]
[2]
creating
[1]
deleting
[1]
exporting
[1]
importing
[1]
data views
understand
[1]
Deep Discovery Advisor
[1]
[2]
about
[1]
configuring
[1]
settings
[1]
Virtual Analyzer
[1]
[2]
Denial-of-Service
[1]
[2]
[3]
Denial-of-Service attack
[1]
deployment plans
[1]
dialers
[1]
Directory Management options
[1]
Directory Manager
[1]
disease vector
[1]
download components
manually
[1]
downloading and deploying components
[1]
EICAR
[1]
email reputation
actions
[1]
enabling
[1]
target
[1]
email reputation services
[1]
advanced
[1]
standard
[1]
encoding types
[1]
End User Quarantine
[1]
[2]
Enterprise Protection Strategy
[1]
expressions
[1]
[2]
customized
[1]
criteria
[1]
predefined
[1]
false positive
[1]
features
[1]
file attributes
[1]
file reputation
[1]
File Reputation Services
[1]
files
uncleanable
[1]
folders
creating
[1]
renaming
[1]
frequently asked questions
calculating decompressed file size
[1]
checking pattern file updates
[1]
checking service pack updates
[1]
compression ratios
[1]
dangerous files
[1]
EICAR test virus
[1]
false positives
[1]
handling large files
[1]
latest patches
[1]
locating Activation Code
[1]
locating Registration Key
[1]
[2]
phish attacks
[1]
regular expressions
[1]
remote SQL server password changed
[1]
sending detected viruses to Trend Micro
[1]
sending suspected threats to Trend Micro
[1]
spyware/grayware
[1]
unable to log on to product console
[1]
using keywords
[1]
[2]
[3]
using operators with keywords
[1]
global policy
[1]
global settings
quarantine folder/directory
[1]
grayware
[1]
hacking tools
[1]
hot fixes
[1]
icons
[1]
integrated server
[1]
IntelliScan
[1]
[2]
IntelliTrap
[1]
internal domains
[1]
configuring
[1]
joke program
[1]
[2]
keywords
[1]
[2]
[3]
[4]
[5]
customized
[1]
[2]
predefined
[1]
known issues
[1]
licenses
[1]
registering
[1]
local sources
configuring
[1]
settings
[1]
Smart Protection Server
[1]
logs
[1]
[2]
maintenance
[1]
querying
[1]
[2]
Search & Destroy
[1]
types
[1]
Windows events
[1]
macro scan
[1]
macro viruses/malware
[1]
mailbox search
configuring
[1]
criteria
date
[1]
discovery mailbox
[1]
keywords
[1]
mailbox components
[1]
mailboxes
[1]
specific senders or recipients
[1]
deleting
[1]
keywords
[1]
modifying
[1]
options
[1]
results
[1]
syntax
[1]
types
[1]
viewing
[1]
maintaining security
[1]
managed products
configuring
[1]
issue tasks
[1]
recovering
[1]
renaming
[1]
searching for
[1]
viewing logs
[1]
managing outbreak situations
[1]
analyzing
[1]
confirming the outbreak
[1]
recovering
[1]
responding
[1]
manually download components
[1]
manual scan
[1]
alerts
[1]
characteristics
[1]
compressed file handling
[1]
[2]
[3]
notifications
[1]
settings
[1]
manual updates
[1]
mass-mailing attack
[1]
master services
ScanMail EUQ Migrator Service
[1]
ScanMail EUQ Monitor
[1]
ScanMail for Exchange Remote Configuration Server
[1]
ScanMail for Microsoft Exchange Master Services
[1]
ScanMail for Microsoft Exchange System Watcher
[1]
starting and stopping
[1]
MCP
[1]
multipurpose internet mail extensions
[1]
notifications
[1]
[2]
[3]
about
[1]
actions that trigger
[1]
alerts
[1]
configuring
[1]
global settings
[1]
web reputation
[1]
one-time reports
[1]
[2]
generating
[1]
online help
accessing
[1]
operator
[1]
outbreak alerts
[1]
Outbreak Prevention Services
[1]
alerts
[1]
password cracking applications
[1]
patches
[1]
updating FAQ
[1]
pattern files
[1]
[2]
[3]
[4]
incremental updates
[1]
Smart Scan Agent pattern
[1]
Smart Scan pattern
[1]
spam pattern files
[1]
updates
[1]
updating manually
[1]
Web Blocking list
[1]
PCRE
[1]
Perle Compatible Regular Expressions
[1]
phish
[1]
[2]
[3]
[4]
policies
content filtering
[1]
Data Loss Prevention
[1]
post-installation
spam folder
[1]
predefined expressions
[1]
predefined templates
[1]
product console
[1]
banner
[1]
configuration area
[1]
getting help
[1]
side menu
[1]
unable to log on
[1]
viewing remote servers
[1]
viewing servers
[1]
viewing virtual servers
[1]
Product Directory
deploying components
[1]
proxy servers
[1]
proxy settings
[1]
[2]
configuring
[1]
quarantine
alerts
[1]
configuring
[1]
folder/directory
[1]
global settings
[1]
queries
maintenance
[1]
[2]
performing
[1]
resending messages
[1]
quarantine folder/directory
[1]
alerts
[1]
quarantine query
maintenance
automatic
[1]
manual
[1]
performing
[1]
resending messages
[1]
query logs
[1]
reactivating ScanMail
[1]
real-time monitor
[1]
viewing remote servers
[1]
real-time scan
[1]
[2]
characteristics
[1]
configuring
[1]
notifications
[1]
recovering
managed products
[1]
registering
to Control Manager
[1]
registering ScanMail
[1]
how to
[1]
online purchase
[1]
Registration Key
[1]
reseller purchase
[1]
to Control Manager
[1]
Registration Key
locating
[1]
[2]
regular expressions
[1]
remote access tools
[1]
remote servers
viewing with real-time monitor
[1]
renaming
folders
[1]
managed products
[1]
replicating configurations
[1]
[2]
reports
[1]
generating scheduled
[1]
maintenance
[1]
one-time reports
[1]
[2]
[3]
scheduled
[1]
scheduled reports
[1]
templates
[1]
report templates
[1]
resources
creating for virtual servers
[1]
[2]
[3]
[4]
creating for Windows 2003
[1]
creating for Windows 2008
[1]
[2]
Exchange 2007 CCR Cluster
[1]
Exchange 2007 SCC Cluster
[1]
Exchange 2007 SCR Cluster
[1]
role
operator
[1]
roll back
[1]
scan engine
[1]
ATSE
[1]
[2]
hierarchy
[1]
update manually
[1]
updates
[1]
Virtual Analyzer
[1]
[2]
VSAPI
[1]
[2]
ScanMail EUQ Migrator Service
[1]
ScanMail EUQ Monitor
[1]
ScanMail for Exchange Remote Configuration Server
[1]
ScanMail for Microsoft Exchange Master Services
[1]
ScanMail for Microsoft Exchange System Watcher
[1]
ScanMail technology
[1]
scan engine
[1]
scans
[1]
about scans
[1]
actions
[1]
[2]
logs
[1]
macro scan
[1]
manual scan
[1]
manual scan settings
[1]
on cluster servers
[1]
real-time scan
[1]
scheduled scan
[1]
scheduled scan settings
[1]
schedule bar
[1]
Scheduled Download
configuring
automatic deployment settings
[1]
Scheduled Download Exceptions
configuring
[1]
Scheduled Download Frequency
configuring
[1]
Scheduled Downloads
[1]
Scheduled Download Schedule
configuring
[1]
Scheduled Download Schedule and Frequency
[1]
Scheduled Download Settings
configuring settings
[1]
scheduled scan
[1]
alerts
[1]
characteristics
[1]
compressed file handling
[1]
[2]
[3]
notifications
[1]
settings
[1]
scheduled updates
[1]
Search & Destroy
about
[1]
access account
[1]
[2]
configuring
[1]
activating
[1]
discovery mailbox
[1]
[2]
event logs
[1]
mailbox search
[1]
configuring
[1]
deleting
[1]
keywords
[1]
modifying
[1]
options
[1]
syntax
[1]
types
[1]
viewing
[1]
service account
[1]
[2]
settings
[1]
troubleshooting
[1]
Search & Destroy administrator
[1]
searching
managed products
[1]
security baseline
[1]
managing real-time monitor
[1]
performing a manual scan
[1]
update ScanMail
[1]
security information site
[1]
security risks
[1]
advanced threats
[1]
compressed files
[1]
Denial-of-Service
[1]
Denial-of-Service attack
[1]
disease vector
[1]
encoding types
[1]
grayware
[1]
joke program
[1]
macro viruses/malware
[1]
mass-mailing attack
[1]
multipurpose internet mail extensions
[1]
other malicious codes
[1]
packed files
[1]
phish
[1]
[2]
[3]
spyware
[1]
spyware/grayware
[1]
[2]
Trojan Horse
[1]
[2]
true file type
[1]
virus/malware writers
[1]
viruses/malware
[1]
[2]
worms
[1]
[2]
zip-of-death
[1]
security risk scan
about
[1]
actions
[1]
[2]
settings
[1]
ActiveAction
[1]
compressed file handling
[1]
configuring target settings
[1]
custom settings
[1]
enabling real-time scan
[1]
IntelliScan
[1]
[2]
IntelliTrap
[1]
logs
[1]
notifications
settings
[1]
report
[1]
summary screen
[1]
server management console
[1]
activating
[1]
replicating configurations
[1]
[2]
replicating servers
[1]
view last replication
[1]
view pattern and engine version
[1]
view scan results
[1]
view scan status
[1]
view smart scan status
[1]
Server Management Console
about
[1]
service packs
[1]
[2]
services
starting and stopping
[1]
smart protection
[1]
[2]
[3]
[4]
File Reputation Services
[1]
source
[1]
[2]
sources
comparison
[1]
protocols
[1]
volume of threats
[1]
Smart Protection
[1]
[2]
File Reputation Services
[1]
integrated server
[1]
pattern files
[1]
Smart Protection Network
[1]
Smart Protection Server
[1]
standalone server
[1]
Web Reputation Services
[1]
[2]
Smart Protection Network
[1]
[2]
web reputation
[1]
Smart Protection Server
[1]
[2]
[3]
[4]
alerts
[1]
integrated server
[1]
security risk scan
alerts
[1]
standalone
[1]
web reputation
[1]
[2]
[3]
[4]
Smart Protection sources
integrated server
[1]
local source settings
[1]
Smart Protection Server
[1]
standalone server
[1]
spam engine
[1]
spam maintenance
[1]
End User Quarantine
[1]
spam pattern files
[1]
spam prevention
[1]
alerts
[1]
content scanning
[1]
actions
[1]
enabling
[1]
target
[1]
email reputation
actions
[1]
enabling
[1]
target
[1]
email reputation services
[1]
End User Quarantine
[1]
maintenance
[1]
notifications
[1]
spam engine
[1]
spam pattern files
[1]
special groups
[1]
[2]
configuring
[1]
[2]
spyware
[1]
spyware/grayware
[1]
[2]
[3]
[4]
adware
[1]
dialers
[1]
entering the network
[1]
hacking tools
[1]
joke program
[1]
malware naming
[1]
password cracking applications
[1]
remote access tools
[1]
risks and threats
[1]
SQL server
manually updating password
[1]
standalone server
[1]
summary
[1]
security risks
[1]
spam tab
[1]
system tab
[1]
support/system debugger
[1]
modules
[1]
using
[1]
targets
web reputation
[1]
templates
[1]
[2]
creating
[1]
deleting
[1]
exporting
[1]
importing
[1]
predefined
[1]
TrendLabs
[1]
Trend Micro Control Manager
[1]
agent
[1]
communication protocol
[1]
communicator
[1]
entity
[1]
managed product user access
[1]
registering ScanMail
[1]
registering to
[1]
server
[1]
unregistering ScanMail
[1]
using ScanMail
[1]
Trojan Horse
[1]
[2]
true file type
[1]
uncleanable files
[1]
understand
data views
[1]
deployment plans
[1]
log queries
[1]
logs
[1]
unregistering
ScanMail from Control Manager
[1]
updates
ActiveUpdate
[1]
alerts
[1]
components on clusters
[1]
download source
[1]
latest patches FAQ
[1]
logs
[1]
manual configurations
[1]
pattern file, manual
[1]
pattern files
[1]
rolling back
[1]
scan engine, manual
[1]
scheduled configurations
[1]
updating ScanMail
[1]
URLs
email technical support
[1]
Knowledge Base
[1]
security information site
[1]
update center
[1]
version comparison
[1]
viewing
managed products logs
[1]
Virtual Analyzer
scan engine technology
[1]
virtual servers
[1]
[2]
creating ScanMail resources
[1]
[2]
[3]
[4]
viewing from the product console
[1]
viruses/malware
[1]
[2]
[3]
boot
[1]
file
[1]
malware naming
[1]
script
[1]
writers
[1]
Virus Scan Application Programming Interface (VSAPI)
[1]
Virus Scan Engine
[1]
scan engine
[1]
web reputation
[1]
[2]
[3]
[4]
[5]
[6]
about
[1]
actions
[1]
[2]
[3]
alerts
[1]
configuring
[1]
enabling
[1]
logs
[1]
notifications
[1]
[2]
Smart Protection Network
[1]
Smart Protection Server
[1]
[2]
[3]
targets
[1]
Web Reputation Services
[1]
[2]
wildcard
[1]
wildcards
[1]
Windows event log codes
[1]
World Virus Tracking Program
[1]
[2]
configuring
[1]
worms
[1]
[2]
zip-of-death
[1]
Search
Toggle search result highlighting
Attachment Blocking Policies
The following table lists the recommended attachment blocking settings.
Recommended Attachment Blocking Settings
Server Role
Setting
Edge server
Disable
Transport Level Real-time Scan
Enable
Store Level Real-time Scan
Disable
Related information
Exception Rule Replication
Sample Usage Scenarios