Today, I arrived at my desk to find a link from one of my relatives waiting for me in an MSN window (sorry, Windows Live Messenger – old habits die hard).
This was unusual behaviour for the person involved, so I was instantly suspicious.
I used Mesh to sign into one of my home PCs, and sure enough, the same message was waiting for me there, under a different account.
Having just installed TMG and set up the new URL Filtering and Malware protection features, I was keen to see whether this would be caught by it (and also curious to know what it was).
Clicking the link, I saw the Forefront TMG block screen in new tasteful grey:
And then Internet Explorer’s SmartScreen Filter kicked in, and denied access to the page on top of the block message.
It’s nice to know that all the layers of protection are working together to try to ensure my safety, and finally, I have some runs on the board (er, well, one) for the Web Protection feature at home!
(for the extra curious, the high rate of URL Filtering is due to some experimental blocking strings I’m trying out).
That's good to hear !! By the way, are you aware of any 3rd party software to protect OWA users sending malware files into their company email servers. We used to use Interscan Webprotect for ISA on our previuos ISA2004 server. I cannot find any product for TMG.
As I understand it, TMG won't scan on Web Publishing rules; I'm not aware of any 3rd party products that do that directly at this point (it's very early days yet, though).
Right now, I'd be considering Forefront Security for Exchange to protect the OWA resource directly; that'll mitigate the scenario above, and different scan engines can be plugged in (TMG is MMPE only).