CrossLinks CrossNodes article: Use Exmerge to remove messages and attachments from your Exchange Server CrossNodes article: Security update for Microsoft Outlook CrossNodes article: Using Isscan to scan Exchange Server for viruses CrossNodes article: Cleaning mailboxes in Microsoft Exchange CrossNodes article: Using the Exchange Administrator Directory Export/Import Utility Once you realize that your system is being […]
CrossLinks
|
Once you realize that your system is being attacked by an e-mail virus, there are several steps that you should take to prevent the virus from spreading and to clean up infected files. The first thing that you should do is to stop the flow of e-mail to and from the Internet. In this article, we
’
ll discuss how to clean your Exchange Server
’
s Internet Mail Service after it has been infected with a virus.
It is important that you have a good backup of your information store before making changes. You will want a way to restore your database if something goes wrong. You may already have an online backup routine in place; otherwise, you should perform an off-line backup by shutting down the Microsoft Exchange Service and copying the priv.edb, pub.edb, and dir.edb files to another directory or drive. This process can take several hours if have a multiple gigabyte information store.
It is possible to have more that one IMCDATA directory on your computer, but only one is the working directory. The working directory location can be found by looking in the Registry. Run Regedit (choose Start|Run and enter
“
Regedit
”
) and navigate to HKEY_LOCAL_MACHINE SYSTEMCurrentControlSetServicesMSExchangeIMCParameters. Many entries will appear in the details pane, but you want to look at the RootDir value. This is the location of the IMCDATA working directory. Now that you know the location of the working directory, you need to understand the directory structure within the IMCDATA directory. Messages are stored in six locations in the Internet Mail Connector (IMC):
The process to clean the IMCDATA subtree of infected messages is simply to find the messages that have the infection and move them out of the IMDATA folders. Once that process is complete, you will have to also clean the MTS-OUT and MTS-IN mailboxes. To do so, you will need some utilities that can be downloaded from
http://support.microsoft.com/support/exchange/love_letter.htm. The ILOVEYOUHLPI.ZIP file, when expanded, contains several utilities. We will focus on the utilities located in the
<
expand directory>imc directory. To start the cleaning process, perform the following steps:
After you complete these steps, the IMCDATA subtree should be cleared of infected files. And keep in mind you may have to repeat these steps several times to clear out the infected e-mails, because some viruses can change the subject of their messages.
Now that the infected files are not longer in the IMCDATA subtree, you must focus on the MTS-OUT and MTS-IN mentioned above. These queues cannot be cleaned using the Find method. Follow these steps:
Once you have finished these steps, your IMC should be cleared of infected messages. Before you restart the Microsoft Exchange Internet Mail Service, you need to make sure that you have a solution in place that will catch the incoming virus. This could include installing anti-virus software or updating signature files. If you restart the service before you automatically detect and remove the virus threat, you’re opening your system up to the same attack and will have to perform the procedure again. After the virus threat has passed and your system is online, you can delete the files that are in the temporary directory created in Step 3. Do not delete this directory until you are sure that your system is up and running. It is possible that you may have to restore some of those files in the event that your system will not start. //
Troy Thompson, MCSE+Internet, is a freelance consultant in the Louisville, Ky., area.
Enterprise Networking Planet aims to educate and assist IT administrators in building strong network infrastructures for their enterprise companies. Enterprise Networking Planet contributors write about relevant and useful topics on the cutting edge of enterprise networking based on years of personal experience in the field.
Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved
Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.