Applies to: Exchange Server 2013

Topic Last Modified: 2012-10-09

This topic provides frequently asked questions about malware filtering (scanning) in Microsoft Exchange Server 2013.

Q. Where does malware scanning occur?

A. Malware scanning is performed on messages sent to or received from a mailbox server. Malware scanning is not performed on a message accessed from a mailbox because it should have already been scanned. If a message is re-sent from a mailbox, it’s rescanned.

Q. Do I need Internet access in order to download engine and definition updates?

A. To download updates, you must be able to access the Internet and be able to establish a connection on TCP port 80 (HTTP). We strongly recommend that you manually download anti-malware engine and definition updates on your Exchange server prior to placing it in production. For more information, see Download Engine and Definition Updates.

Q. How often are the malware definitions updated?

A. Each server checks for new malware definitions every hour.

What are some advantages of pairing the built-in malware scanning feature with the FOPE cloud-hosted email filtering service (or the next version of this service, Exchange Online Protection (EOP)?

A. There are several advantages:

Q. Why did this malware make it past the filter?

A. There are two possible reasons why you may have received malware.

The first, and more likely scenario, is that the attachment received does not contain any active malicious code. In these situations, some anti-malware engines that run on computers may be more aggressive and stop messages with truncated payloads.

The second is that the malware you received is a new variant and our anti-malware engine has not yet released a pattern file for the service to deploy.

Q. How can I submit malware that made it past the filter to Microsoft?

A. If you have received malware such as a virus that made it past the filter, please save a copy of the email message with its attached virus, go to the Malware Protection Center and submit a sample using the detailed instructions on that page. When submitting the file, in the Product drop-down list select Other, select the I believe this file contains malware option, and in the Comments field specify Exchange Server 2013. After we receive the sample, we’ll investigate and if it’s determined that the sample contains malware, we’ll take corrective action to prevent the virus from going undetected.

Q. How can I submit a file that I believe was incorrectly detected as malware?

A. Similar to submitting malware, go to the Malware Protection Center and submit a sample using the detailed instructions on that page. When submitting the file, in the Product drop-down list select Other, select the I believe this file should not be detected as malware option, and in the Comments field specify Exchange Server 2013. After we receive the sample, we’ll investigate and if it’s determined that the sample is clean, we’ll take corrective action to prevent the file from being detected as malware.

Q. I received an email with an attachment that I am not familiar with. Is this malware or can I disregard this attachment?

A. We strongly advise that you do not open any attachments that you do not recognize. If you would like us to investigate the attachment, go to the Malware Protection Center and submit the possible malware to us as described previously.

Q. Where can I get the messages that have been deleted by the malware filter?

A. The messages contain active malicious code and therefore we do not allow access to these messages. They are simply deleted.

Q. I am not able to receive a specific attachment because it’s being falsely filtered by your malware filter. Can I allow this attachment through via Exchange transport rules?

A. No. Transport rules cannot be used to bypass the malware filter. If you would like this attachment to bypass the malware filter, send the attachment to the intended recipient within a password protected .zip file.

Q. Can I turn off the product’s built-in anti-malware protection?

A. The built-in anti-malware scanning can be permanently disabled or temporarily bypassed by following the steps in Disable or Bypass Anti-Malware Scanning.

For more information