There are various configuration settings that you can adjust for the transport scan in order to meet the needs of your environment. These include selecting the number of scan engines to use for each scan, setting the action to take when malware is detected, and specifying whether or not to quarantine detected files.
To configure the transport scan-
In the Forefront Protection 2010 for Exchange Server Administrator Console, click Policy Management, and under Antimalware, click Hub - Transport (if you are using an Edge Transport server, Edge - Transport appears instead of Hub - Transport).
-
In the Antimalware - Hub Transport pane, under the General Settings section, configure the following settings:
- Enable transport antivirus scan—Select or clear this
check box to enable or disable the transport antivirus scan. This
setting is enabled by default.
- Enable transport antispyware scan—Select or clear this
check box to enable or disable the transport antispyware scan. This
setting is enabled by default.
- Enable transport antivirus scan—Select or clear this
check box to enable or disable the transport antivirus scan. This
setting is enabled by default.
-
In the Antimalware - Hub Transport pane, under the Engines and Performance section, select the number of scan engines that should be used for this scan. For more information, see Configuring the number of scan engines used for each scan.
-
In the Antimalware - Hub Transport pane, under the Scan Actions section, configure the following settings:
- Action—Select the action that you want performed when a
virus or spyware is detected. For virus detections, you can select
Skip detect, Clean (the default), and Delete.
For spyware detections, you can select Skip detect,
Delete (the default), and Purge. For more
information, see Configuring the action
when malware is detected.
- Quarantine Files—Using the drop-down list, enable (by
selecting Yes) or disable (by selecting No) saving
infected files detected by the file-scanning engines. Quarantining
is enabled by default. Enabling quarantine causes deleted
attachments and purged messages to be stored in a secure location,
from which you can recover them. However, worm-purged messages are
not recoverable. For more information about quarantine, see
Viewing and
managing quarantine.
- Edit Malware Deletion Text—You can specify deletion
text, which is used to replace the contents of an infected file
during a delete operation. The default deletion text informs you
that an infected file was removed, along with the name of the file
and the name of the malware found. To change the default deletion
text, click Edit Malware Deletion Text, make the
modifications to the deletion text in the Edit Malware Deletion
Text dialog box, and then click Apply and Close to
return to the Antimalware - Hub Transport pane.
Note: FPE provides keywords that can be used in the deletion text field to obtain information from the message in which the infection was found. To use them, in the Edit Malware Deletion Text dialog box, right-click, select Insert Field, and then select the desired macro. For more information about this feature, see Keyword substitution macros.
- Action—Select the action that you want performed when a
virus or spyware is detected. For virus detections, you can select
Skip detect, Clean (the default), and Delete.
For spyware detections, you can select Skip detect,
Delete (the default), and Purge. For more
information, see Configuring the action
when malware is detected.
-
Click Save.
Configuring additional transport scanning options
You can configure the following additional settings located under the Additional Options section of the Antimalware - Hub Transport pane. Click Save after making any changes to your settings.
- Scan doc files as
containers—Configures the transport scan to scan files that use
structured storage and the OLE embedded data format (for example,
.doc, .xls, .ppt, or .shs) as container files. This ensures that
any embedded files are scanned as potential malware carriers. This
setting is disabled by default.
- Purge if message body is
deleted—Configures whether entire messages should be purged if
the message body is deleted by the transport scanner. This setting
is disabled by default.
Some messages carry malware in the body of the message file. When all or part of the message body is deleted to remove malware, the part of the message body that is deleted is replaced with deletion text. If you do not want e-mail users receiving cleaned messages that contain deletion text, you can purge messages where all or part of the message body has been deleted and there are no attachments. For example, if a message contains both HTML and plain text, and the HTML is deleted, the entire message will be purged.
- Optimize for performance by not rescanning
messages already virus scanned—Configures FPE to skip scanning
for messages that were previously scanned by any instance of FPE in
any configuration. This applies to messages being received on
Transport servers that have been scanned by FPE on another
Transport server within the Exchange organization. This setting is
enabled by default.
- Suppress malware
notifications—Suppresses the sending of Virus found,
Spyware found, and Worm found notifications, even if
these notifications are enabled. This setting is disabled by
default.
- Illegal MIME header action—Configures
what action to take when an illegal MIME header is encountered
during a scan. Illegal MIME headers are messages where any of the
following properties are not valid: Content-Disposition,
Content-Type header, and Multiple Content-Transfer-Encoding. You
can select Purge or Ignore. The default value is
Purge.
Messages detected as having illegal MIME headers are quarantined by default if the action is set to Purge. If you do not want purged messages to be quarantined, type the following Windows PowerShell command to disable quarantining of these items:
Set-FseTransportScan –IllegalMIMEHeaderQuarantine $false
- Transport sender
information—Configures which sender information to use for the
transport scan. Select one of the following options:
- Use MIME header—The MIME FROM header
sender address is used for the transport scan. When a MIME Sender
header is also present, this is the header information that is
used. This is the default value.
- User sender address from SMTP
protocol—The MAIL FROM sender address from the SMTP protocol is
used for the transport scan. The address in this field is used
anywhere the sender address is used.
- Use MIME header—The MIME FROM header
sender address is used for the transport scan. When a MIME Sender
header is also present, this is the header information that is
used. This is the default value.
- Process count—Configures the number of
processes you want running per Transport server. The default value
is 4; the maximum value is 10.
When multiple transport processes are running, the first process scans the file unless it is busy; in which case, the file is delivered to the second process for scanning. If the second process is busy and a third is enabled, the third process scans the file. Whenever possible, FPE delivers files to the first process if it is available.
Multiple processes increase the load on the server at startup, when the processes are being loaded, and whenever they are called upon to scan a file. More than the default number of processes should not be necessary, except in high-volume environments. Because increasing the number of processes consumes additional server resources, it is best to increase them one at a time, and evaluate the performance at each step.
Important: You must stop and then start the Microsoft Exchange Transport service in order for changes to this setting to take effect. Do not use the Restart function. - Scanning timeout (seconds)—Configures
the number of seconds that the transport scan scans a file before
timing out. The default value is 300 seconds.
In the event that the transport scan exceeds the specified time to scan a message, the process is terminated, and FPE attempts to restart the service. If successful, transport scanning resumes and a notification is sent to the administrator stating that the transport scan stopped and recovered.
When the new transport scan process starts, the message that caused it to terminate is reprocessed according to the Scan timeout action setting. For example, if it is set to Delete, FPE deletes the file, replaces its contents with the deletion text for the transport scan, logs an ExceededTransportTimeout incident, and quarantines and archives the file.
If the process cannot be restarted, a notification is sent to the administrator stating that the transport scan stopped. In this event, transport scanning does not function and the mail stream is not scanned.
Important: You must stop and then start the Microsoft Exchange Transport service in order for changes to this setting to take effect. Do not use the Restart function. - Scan timeout action—Configures what
action to take when the transport scan times out while scanning a
file. The options are:
- Ignore—Lets the file pass without
being scanned.
- Skip detect—Reports in the Incidents
log and the Program log that the file exceeded the scan time and
lets it pass without being scanned.
- Delete—Reports the event and replaces
the contents of the file with the deletion text. Delete is
the default value.
Note: If the Scan timeout action is set to Skip detect or Delete, and if quarantining is enabled, then a copy of the file is stored in the database. - Ignore—Lets the file pass without
being scanned.
- Maximum container scan time
(seconds)—Configures the number of seconds that the transport
scan scans a compressed attachment before reporting it as a
ScanTimeExceeded incident. This option is intended to prevent the
risk of denial of service due to zip-of-death attacks. The default
value is 120 seconds.
Bypassing the transport scan
You can configure FPE to bypass transport scanning of all e-mail messages. When you configure FPE to bypass transport scanning, no malware scanning or filtering is performed by the transport scan job.
Important: |
---|
Bypassing the transport scan should only be used for troubleshooting and under the direction of a Customer Service and Support (CSS) engineer. When enabled (it is disabled by default), the transport scan offers no protection from malware and there is the potential for unscanned malware to leave or enter your organization. |
-
In the Forefront Protection 2010 for Exchange Server Administrator Console, click Policy Management, and under Global Settings, click Scan Options.
-
In the Global Settings – Scan Options pane, under the Scan Targets – Transport section, select the Enable bypass scanning check box.
-
Click Save.
Important: |
---|
When you are finished troubleshooting, in order to once again be protected against malware, you must restore scanning by disabling the bypass. Do this by clearing the Enable bypass scanning check box and then clicking Save. |