Performance; Virus-Scanning Application Programming Interface (Vsapi); Microsoft Exchange Server 5.5 (Vsapi 1.0); Actions - ESET MAIL SECURITY 4 - FOR MICROSOFT EXCHANGE SERVER FOR WINDOWS SERVER 2000-2003-2008 User Manual

For microsoft exchange server
Table of Contents

Advertisement

4.2.3

Performance

In this section, you can set the number of ThreatSense
scan engines that should be used for virus scanning.
More ThreatSense scan engines on multiprocessor
machines can increase the scan rate.
4.2.4
Virus-Scanning Application Programming
Interface (VSAPI)
Microsoft Exchange Server provides a mechanism to
make sure that every message component is scanned
against the current virus signature database. If a message
component is not scanned, its corresponding component
is submitted to the scanner before the message is
released to the client. Every supported version of
Microsoft Exchange Server (5.5/2000/2003/2007/2010)
offers a different version of VSAPI.
4.2.4.1

Microsoft Exchange Server 5.5 (VSAPI 1.0)

This version of Microsoft Exchange Server includes VSAPI
version 1.0.
The Background scanning option allows scanning of all
messages in the system background. Microsoft Exchange
Server decides whether a background scan will run or
not, based on various factors, such as the current system
load, the number of active users, etc. Microsoft Exchange
Server keeps a record of scanned messages and the virus
signature database version used. If you are opening a
message that has not been scanned by the most current
virus signature database, Microsoft Exchange Server
sends the message to ESET Mail Security to be scanned
before opening the message in your e-mail client.
Since background scanning can affect system load
16
(scanning is performed after each virus signature
database update), we recommend using scheduled
scanning outside working hours. Scheduled background
scanning can be configured via a special task in the
Scheduler/Planner. When you schedule a Background
scanning task you can set the launch time, the number of
repetitions and other parameters available in the
Scheduler/Planner. After the task has been scheduled, it
will appear in the list of scheduled tasks and, as with the
other tasks, you can modify its parameters, delete it or
temporarily deactivate the task.
4.2.4.1.1

Actions

In this section you can specify the actions to be
performed when a message and/or attachment is
evaluated as infected.
The Actions to take if cleaning not possible field allows
you to block infected content or delete the message. This
action will be applied only if the automatic cleaning
(defined in ThreatSense engine parameter setup >
Cleaning) did not clean the message.
The Deletion option allows you to truncate a file
attachment to zero size or replace an infected file with a
virus protocol or rule description.
By activating Rescan, you can scan messages and files
that have already been scanned again.
4.2.4.1.2
Performance
During a scan, Microsoft Exchange Server allows you to
limit a time for opening message attachments. This time
is set in the Response time limit (ms) field and
represents the period after which the client will retry
accessing the file that had previously been inaccessible
due to scanning.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Mail security 4

Table of Contents