• Microsoft Scan engine failing to update

    Just as a heads up.

    We are seeing cases where the Microsoft scan engine is failing to update in Forefront Protection for Exchange with the following errors.

    6019 GetEngineFiles An error occurred while testing the scan engine.

    6012 GetEngineFiles An error occurred while loading the scan engine. Scan Engine: Microsoft. Error Code: 0x80004005.

    This only seems to be effecting FPE and not other products that the Microsoft engine is included with.

    We are working to resolve this issue and it should be resolved automatically once the cause is found. I will update this post if there is any change to how the fix will be delivered.

    The only Impact is that the engine fails to update. All other engines are updating correctly and this should not effect mail flow and the other engines should provide coverage for new viruses.

  • FOPE–Configuration and SPF checking

     

    We are in the process of adding this information to our setup documents.

    -When implementing FOPE or O365/Live@EDU and you have mail coming to your on premise servers, you need to turn off any SPF checking at your mail server/firewall. The connecting server will always be one of the Forefront Online servers and any domains with SPF configured hard fail will end up getting deleted. Forefront Online has its own spf check so you are still protected.

     

  • Hello Fope!

    My first FOPE centered blog.

    One common issue with FOPE (this also happens in FSS/Antigen) is the 0 day Virus’s that pretend to be a legitimate mail from other senders.

    These tend to be small emails asking you to open the file in a zip attached to the email. The file will look like a pdf but its really an executable named “delivery.pdf                    .exe”

    These exe files are not caught by any engine right away so some customers see them come through.

    There are multiple ways you can block these messages (SPF, policy rules) But I suggest the following.

    My first question is always “Do you have any reason to allow executable files via email?” I have yet found a customer that says they need exe’s in emails.  If your email policy allows blocking these message types then I suggest you set up two rules to lower your chances of getting any viruses.

    Inbound reject rule (deletes any inbound mail with a compressed file that contains executable attachments)

     

    image

    The 2nd rule is to block files not in compressed files that fit he header information that matches an executable type.

    image

  • FSSMC/FPFMC Error 500 when launching

    If you have issues logging into any of the Forefront Management Consoles with an Error 500 you most likely changed the service account password.

    To verify this is due to a password issue you can check the event logs for

    Event ID 10004, Distributed COM

    DCOM got error “1326” and was unable to logon <account name> in order to run the server:

    {9738A91E-222B-4F3F-8962-6B01144D6ACB}

     

    If that’s there you need to go into Com+ applications under component Services.

    Get the properties of the MFSMC.Services object and change the password on the Identity page.

     

    image

    That should resolve the error.

  • FPE issue where all spam is missed

    The most common reason we do not filter spam in FPE is that we honor the ms-exch-bypass-anti-spam permission on connectors.

    The most common scenario is that the bypass is enabled for anonymous connections.

    This is simple to fix with some PowerShell commands to remove the permissions from the connectors.

    In exchange PowerShell.

    Get-ReceiveConnector

    image
    Take the names you get and run
    Get-ReceiveConnector " Receive_Connector_name" | Get-ADPermission -User "NT Authority\Anonymous Logon"|fl

    You are looking for this

    image


    You can then remove the right for bypass by running the following on any connector with the bypass right
    Get-ReceiveConnector " Receive_Connector_name" | Remove-ADPermission -User "NT Authority\Anonymous Logon" -ExtendedRight ms-exch-bypass-anti-spam

    image

     

    Checking again with Get-ReceiveConnector " Receive_Connector_name" | Get-ADPermission -User "NT Authority\Anonymous Logon"|fl shows that bypass has been removed from the rights for anonymous.

    You can then do the same thing for each connector and recycle transport to make the changes take effect.