This document provides you with recommendations on how to fortify an Exchange environment against e-mail transmitted viruses and worms. Resources for the implementation details related to the recommendations are included. Suggestions are given on what to do when a virus attack occurs.
Read more
                                    
                                    
                                    
                                
                            Read more
 
                                 
                                 
                                