Objective 7.4 Exchange 2010 Flashcards
Objective 7.4: Configure anti-virus and anti-spam.
The exam might expect you to know that you need to include directory, process, and file name extensions for both ______ and file-level scanning.
memory-resident
If you use a file-level scanner, this can impact the ______ of your Exchange environment. For example, a scanner might scan a file when the file is being used. This can cause the scanner to lock or quarantine the file. If the scanner locks an Exchange log or a database file while Exchange tries to use it, this could result in a severe failure.
performance
Exclusions help you to avoid many of the problems associated with ______ scanners.
file-level
You can configure your file-level scanner to ensure that the appropriate ______ are in place for both memory-resident and file-level scanning.
exclusions
If a Mailbox server is a member of a DAG, you should exclude the quorum disk and the %Winnt%\Cluster folder. Also on a witness server (typically a Hub Transport server), you should exclude the witness ______.
directory files
You can create a transport rule to prevent emails from being sent that contain specific words in the subject field. You can use the ______ cmdlet with the SubjectContains Words parameter to create a transport rule that prevents email messages with qualifying words from being sent. Optionally, you can specify exceptions, such as if the sender is the company CEO.
New-TransportRule
You can use a transport protection rule to ______ email messages with certain words in the subject.
IRM-protect
The following command creates a rule that applies the Do Not Forward template to messages with the word private in the subject field: ______.
New-TransportRule -Name “Internal Private” -SubjectContainsWords “private” -ApplyRightsProtectionTemplate “Do Not Forward”
The exam might test that you are aware that SCL has a value range of 0–9, with 0 indicating a ______ probability of spam, and 9 a ______ probability.
low,
very high
You can use the EMS ______ cmdlet to determine the action taken at specified SCL thresholds.
Set-ContentFilterConfig
The following EMS commands enable the delete action for an SCL threshold of 9 and the reject action for an SCL threshold of 7: ______.
Set-ContentFilterConfig -SCLDeleteEnabled $true -SCLDeleteThreshold 9
Set-ContentFilterConfig -SCLRejectEnabled $true -SCLRejectThreshold 7
You can also enable the ______ action for a specified SCL threshold. However, you first need to configure a mailbox as the ______ mailbox.
quarantine,
quarantine
You should be aware that a very large proportion of identity theft scams come from spoofed domains that have spoofed sender email addresses, and that The ______ is an industry initiative to counter spoofed domains by publishing SPF records.
Sender ID Federation
You should know that the ______ agent is an anti-spam agent that is enabled by default on Exchange 2010 servers that have the Edge Transport server role installed. The exam might check that you know that the Sender ID agent is designed to combat spoofing.
Sender ID
The Sender ID agent queries a sender’s DNS server. When an email message is received, the Edge Transport server queries the sender’s DNS server to verify that the ______ from which the message was received is authorized to send messages for the domain that is specified in the message headers.
IP address
You should know that the ______ option in Outlook permits a user to generate a list of senders from whom it is considered safe to receive email messages.
Safe Senders
The Blocked Senders (or Block Sender) list is also a client feature; it should not be confused with the ______ block list in Exchange.
real-time
Safelist aggregation is the combination of shared ______ functionality between Outlook and Exchange. It collects information from the anti-spam Safe Recipients list, Blocked Senders lists, Contact Data, and Safe Senders list. The aggregated data is made available to the Edge Transport server.
anti-spam
You should be aware that ______ IP block list providers are typically used by Exchange 2010 organizations.
third-party
The exam might check that you know that IP block and allow lists are also known as ______ and ______, respectively, and that block lists are also known as RBLs because they are queried each time mail arrives from a new IP address.
blacklists, and
whitelists
You can test the IP Block list providers by using the EMS ______ or the ______ cmdlets.
Test-IPAllowListProvider,
Test-IPBlockListProvider
The following tests the connectivity to the fictitious IP Block list provider FictitiousProviderName, and then issues a lookup request to that provider by using the IP address 192.168.10.1: ______.
Test-IPBlockListProvider -IPAddress 192.168.10.1 -Identity FictitousProviderName