This document provides you with recommendations on how to fortify an Exchange environment against e-mail transmitted viruses and worms. Resources for the implementation details related to the recommendations are included. Suggestions are given on what to do when a virus attack occurs.
|