Improve company productivity with a Business Account.Sign Up

x
  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 1308
  • Last Modified:

How to locate & remove viruses/corrupt files from Users exchange mailboxes?

This is the result from  Trend Micro ServerProtect Management Console 5.58 + a whole lot more. My question should be obvious, but Has anybody got an Idea on how to remove these viruses from exchange mailbox(es) for a spesific user.

Manual scan found virus "WORM_Netsky.DAM" in "D:\Exchsrvr\MDBDATA\E00022BA.log"(Details.zip).Clean failed - Delete failed
Manual scan found virus "HTML_Netsky.P" in "D:\Exchsrvr\MDBDATA\E00022BA.log"(NONAMEFL).Clean failed - Delete failed
Real-time scan found virus "WORM_NETSKY.Y" in "D:\Exchsrvr\Mailroot\vsi 1\Queue\NTFS_848dca9601c4af670000102c.EML"(www.unknown.com.gho.session-00006642.com).Clean failed - Quarantine failed
Real-time scan found virus "WORM_NETSKY.Z" in "D:\Exchsrvr\Mailroot\vsi 1\Queue\NTFS_d2240dd801c4aeea00001006.EML"(Textfile.txt

When running Veritas Bacup Excec, I receive this message:

WARNING: "User1[Usr1]?Top of Information Store?Inbox?GateLock Virus Notification." is a corrupt file.
This file cannot verify.

When I exclude this user from the backup The backup job is successful.
0
TorgN
Asked:
TorgN
1 Solution
 
jacaucCommented:
Your Exchange MDBDATA folder should be excluded from the VirusScan list of folders.
This creates a LOT of overhead on your server, and the virus can be cleaned from the Client's Outlook.

The files which has viruses that you mention are in use by the Exchange Server Process that is why it can't be cleaned.

Hope this answers your question
Cheers
J
0
 
TorgNAuthor Commented:
I think so, thanks :)
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Featured Post

Building an Effective Phishing Protection Program

Join Director of Product Management Todd OBoyle on April 26th as he covers the key elements of a phishing protection program. Whether you’re an old hat at phishing education or considering starting a program -- we'll discuss critical components that should be in any program.

Tackle projects and never again get stuck behind a technical roadblock.
Join Now