Solved

How to locate & remove viruses/corrupt files from Users exchange mailboxes?

Posted on 2004-10-12
2
1,270 Views
Last Modified: 2008-02-01
This is the result from  Trend Micro ServerProtect Management Console 5.58 + a whole lot more. My question should be obvious, but Has anybody got an Idea on how to remove these viruses from exchange mailbox(es) for a spesific user.

Manual scan found virus "WORM_Netsky.DAM" in "D:\Exchsrvr\MDBDATA\E00022BA.log"(Details.zip).Clean failed - Delete failed
Manual scan found virus "HTML_Netsky.P" in "D:\Exchsrvr\MDBDATA\E00022BA.log"(NONAMEFL).Clean failed - Delete failed
Real-time scan found virus "WORM_NETSKY.Y" in "D:\Exchsrvr\Mailroot\vsi 1\Queue\NTFS_848dca9601c4af670000102c.EML"(www.unknown.com.gho.session-00006642.com).Clean failed - Quarantine failed
Real-time scan found virus "WORM_NETSKY.Z" in "D:\Exchsrvr\Mailroot\vsi 1\Queue\NTFS_d2240dd801c4aeea00001006.EML"(Textfile.txt

When running Veritas Bacup Excec, I receive this message:

WARNING: "User1[Usr1]?Top of Information Store?Inbox?GateLock Virus Notification." is a corrupt file.
This file cannot verify.

When I exclude this user from the backup The backup job is successful.
0
Comment
Question by:TorgN
2 Comments
 
LVL 3

Accepted Solution

by:
jacauc earned 500 total points
ID: 12285280
Your Exchange MDBDATA folder should be excluded from the VirusScan list of folders.
This creates a LOT of overhead on your server, and the virus can be cleaned from the Client's Outlook.

The files which has viruses that you mention are in use by the Exchange Server Process that is why it can't be cleaned.

Hope this answers your question
Cheers
J
0
 

Author Comment

by:TorgN
ID: 12285484
I think so, thanks :)
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

12 Steps to a more secure Internet experience (http://tekblog.teksquisite.com/) Everyone who is a licensed driver initially had to pass a driving test that consisted of taking:    1. a written test    2. a road test    3. a vision test Le…
By the time you finish reading this article, you may have already lost all your money because you don't know the simple steps to securing your BitCoin wallet. BitCoin is an incredible invention. It is a decentralized currency system, which is the…
This Micro Tutorial hows how you can integrate  Mac OSX to a Windows Active Directory Domain. Apple has made it easy to allow users to bind their macs to a windows domain with relative ease. The following video show how to bind OSX Mavericks to …
Migrating to Microsoft Office 365 is becoming increasingly popular for organizations both large and small. If you have made the leap to Microsoft’s cloud platform, you know that you will need to create a corporate email signature for your Office 365…

920 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now