Solved

How to locate & remove viruses/corrupt files from Users exchange mailboxes?

Posted on 2004-10-12
2
1,280 Views
Last Modified: 2008-02-01
This is the result from  Trend Micro ServerProtect Management Console 5.58 + a whole lot more. My question should be obvious, but Has anybody got an Idea on how to remove these viruses from exchange mailbox(es) for a spesific user.

Manual scan found virus "WORM_Netsky.DAM" in "D:\Exchsrvr\MDBDATA\E00022BA.log"(Details.zip).Clean failed - Delete failed
Manual scan found virus "HTML_Netsky.P" in "D:\Exchsrvr\MDBDATA\E00022BA.log"(NONAMEFL).Clean failed - Delete failed
Real-time scan found virus "WORM_NETSKY.Y" in "D:\Exchsrvr\Mailroot\vsi 1\Queue\NTFS_848dca9601c4af670000102c.EML"(www.unknown.com.gho.session-00006642.com).Clean failed - Quarantine failed
Real-time scan found virus "WORM_NETSKY.Z" in "D:\Exchsrvr\Mailroot\vsi 1\Queue\NTFS_d2240dd801c4aeea00001006.EML"(Textfile.txt

When running Veritas Bacup Excec, I receive this message:

WARNING: "User1[Usr1]?Top of Information Store?Inbox?GateLock Virus Notification." is a corrupt file.
This file cannot verify.

When I exclude this user from the backup The backup job is successful.
0
Comment
Question by:TorgN
2 Comments
 
LVL 3

Accepted Solution

by:
jacauc earned 500 total points
ID: 12285280
Your Exchange MDBDATA folder should be excluded from the VirusScan list of folders.
This creates a LOT of overhead on your server, and the virus can be cleaned from the Client's Outlook.

The files which has viruses that you mention are in use by the Exchange Server Process that is why it can't be cleaned.

Hope this answers your question
Cheers
J
0
 

Author Comment

by:TorgN
ID: 12285484
I think so, thanks :)
0

Featured Post

Free Tool: IP Lookup

Get more info about an IP address or domain name, such as organization, abuse contacts and geolocation.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

As more computers now shipped with 64-bit version of Windows, more users are now using this Operating System.  So it's important to be aware how some 32-bit diagnostic tool works on these systems, so we know what to expect when analyzing the logs an…
PREFACE The purpose of this guide is to provide information to successfully add specific IIS 7.0 role services for the Symantec Endpoint Protection Manager (SEPM) to function properly when installed on Windows 2008. AUDIENCE Information Technol…
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

840 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question