|
First
I want to thank all of you for responding to my initial query and say that it
has been very helpful. Now I want to offer MS perspective on the matter
and see how it fair's with you all for one final review.
I
spoke to a MS Premier Rapid Response Engineer and a Technical account
manager. The account manager says that MS position on infrastructure boxes
is not to run AV on them (File servers do have virus scanning, and E-mail
servers have scanning dedicated to the data stores and IMS), but to block at the
firewalls and the desktops. The PRRE says that he recommends that if you
implement Virus scanning on infrastructure boxes, to block scanning of the
directories that hold the associated files for the services, and the
SYSVOl.
Many
of you already concluded this through the discussion. So it appears MS
believes that if you can block at the entry points, you are better off leaving
Infrastructure boxes clean and optimized. If you can't then take necessary
procedures to protect the infrastructure.
Does
anyone have anything different to add?
Todd
|
Title: Message
- Re: [ActiveDir] MS weigh's in on AD and Network Cor... Myrick, Todd (NIH/CIT)
- Re: [ActiveDir] MS weigh's in on AD and Networ... Graham Turner
- RE: [ActiveDir] MS weigh's in on AD and Networ... Granatella Adam J
- RE: [ActiveDir] MS weigh's in on AD and Networ... Purviance, Chad
- RE: [ActiveDir] MS weigh's in on AD and Networ... Granatella Adam J
