CoryEdwards writes: Symantec Corp. (Nasdaq: SYMC), the world leader in Internet security, today announced Symantec AntiVirus 2.5 for Lotus Notes/Domino for Linux is the first antivirus solution available for Lotus Domino for Linux. Symantec AntiVirus 2.5 for Lotus Notes/Domino for Linux now provides comprehensive, automatic virus protection to a full-range of Lotus Notes/Domino platforms, including Solaris, AIX, OS/400, OS/390, and now Linux.
It is possible to migrate into an NSF file while using the Lotus Notes client to connect to a Notes/Domino server, or the NSF file can be taken out of the Notes/Domino server environment and migrated directly. Usually, this will eliminate the need for an ID file and password. Microsoft Exchange/Outlook (PST) → Lotus Notes (NSF).
“Lotus software customers are increasingly extending the capabilities of their servers to take advantage of emerging e-business and Web technologies,” said Ken Bisconti, vice president of messaging, Lotus Software, IBM Software Group. “Incorporating an antivirus solution for Lotus Domino for Linux provides enterprises with additional security and confidence from malicious threats.” “Symantec continues to build its world-class virus protection, providing enterprises with multi-tier, multi-platform solutions,” said Gail Hamilton, executive vice president, Symantec Corporation. “Symantec AntiVirus 2.5 for Lotus Notes/Domino for Linux offers flexible and reliable security and is a powerful complement to the Linux platform.”
Symantec AntiVirus 2.5 for Lotus Notes/Domino for Linux features real-time alerting and logging capabilities, as well as a reporting component. Administrators are able to export data to Microsoft Excel, Crystal Reports, and other third-party reporting tools to monitor virus activity on the server. LiveUpdate software, together with Symantec?s NAVEX technology, allows administrators to download the latest virus definitions and deploy them throughout the Lotus Domino environment from one location without having to reinstall software, dramatically reducing cost of ownership.
Symantec AntiVirus 2.5 for Lotus Notes/Domino for Linux offers virus scanning efficiency, which allows for minimal performance impact. Administrators can use Symantec AntiVirus 2.5 for Lotus Notes/Domino for Linux to scan the body of messages — not just the attachment — for malicious code. The solution also offers improved protection by providing scan and repair capabilities for compressed file formats, including Arc Manager, BinHex, GZIP, RTF, TAR, and TNEF. Administrators have the option to set scan configurations from remote computers, choosing real-time, on-demand, or scheduled scanning, and can also specify to repair or delete any infected files that are found. For added protection, Symantec AntiVirus 2.5 for Lotus Notes/Domino is backed by Symantec Security Response ? the world?s leading Internet security research and support organization which proactively researches new threats and provides fast updates to protect against new attacks.
Symantec Enterprise Security
Symantec AntiVirus 2.5 for Lotus Notes/Domino is part of Symantec Enterprise Security, which provides the technology, global response, and services necessary to manage information security. Symantec?s comprehensive solutions offer best-of-breed products such as firewall security, virus protection, intrusion detection, vulnerability management, and virtual private networking (VPN). Symantec Security Response provides customers such with comprehensive, global, 24×7 Internet security expertise to guard against today?s blended Internet threats. Symantec Enterprise Security customers also are supported by one of the largest professional security organizations in the world, offering security consulting, security education, and managed security services. For more information, please visit Symantec?s enterprise web site at www.enterprisesecurity.symantec.com.
Availability
Symantec AntiVirus 2.5 for Lotus Notes/Domino is available through Symantec?s worldwide network of value-added resellers, distributors and systems integrators. Organizations seeking a reseller or distributor should contact Symantec at http://www.symantecpartner.com/var/var_locate.html
About Symantec
Symantec, the world leader in Internet security technology, provides a broad range of content and network security software and appliance solutions to individuals, enterprises and service providers. The company is a leading provider of client, gateway and server security solutions for virus protection, firewall and virtual private network, vulnerability management, intrusion detection, Internet content and e-mail filtering, remote management technologies and security services to enterprises and service providers around the world. Symantec?s Norton brand of consumer security products is a leader in worldwide retail sales and industry awards. Headquartered in Cupertino, Calif., Symantec has worldwide operations in 38 countries. For more information, please visit www.symantec.com.
Category:
- Linux
Applies to:
Windows Defender Antivirus on Windows Server 2016 computers automatically enrolls you in certain exclusions, as defined by your specified server role. See the end of this topic for a list of these exclusions.
These exclusions will not appear in the standard exclusion lists shown in the Windows Security app.
You can still add or remove custom exclusions (in addition to the server role-defined automatic exclusions) as described in these exclusion-related topics:
Custom exclusions take precedence over automatic exclusions.
Tip
Custom and duplicate exclusions do not conflict with automatic exclusions.
Windows Defender Antivirus uses the Deployment Image Servicing and Management (DISM) tools to determine which roles are installed on your computer.
Opt out of automatic exclusions
In Windows Server 2016, the predefined exclusions delivered by Security intelligence updates only exclude the default paths for a role or feature. If you installed a role or feature in a custom path, or you want to manually control the set of exclusions, you need to opt out of the automatic exclusions delivered in Security intelligence updates.
Warning
Opting out of automatic exclusions may adversely impact performance, or result in data corruption. The exclusions that are delivered automatically are optimized for Windows Server 2016 roles.
Note
This setting is only supported on Windows Server 2016. While this setting exists in Windows 10, it doesn't have an effect on exclusions.
Tip
Since the predefined exclusions only exclude default paths, if you move NTDS and SYSVOL to another drive or path different than the original one, you would have to manually add the exclusions using the information here .
You can disable the automatic exclusion lists with Group Policy, PowerShell cmdlets, and WMI.
Use Group Policy to disable the auto-exclusions list on Windows Server 2016
- On your Group Policy management computer, open the Group Policy Management Console, right-click the Group Policy Object you want to configure and click Edit.
- In the Group Policy Management Editor go to Computer configuration and click Administrative templates.
- Expand the tree to Windows components > Windows Defender Antivirus > Exclusions.
- Double-click Turn off Auto Exclusions and set the option to Enabled. Click OK.
Use PowerShell cmdlets to disable the auto-exclusions list on Windows Server 2016:
Use the following cmdlets:
See Use PowerShell cmdlets to configure and run Windows Defender Antivirus and Defender cmdlets for more information on how to use PowerShell with Windows Defender Antivirus.
Use Windows Management Instruction (WMI) to disable the auto-exclusions list on Windows Server 2016
Use the Set method of the MSFT_MpPreference class for the following properties:
See the following for more information and allowed parameters:
List of automatic exclusions
The following sections contain the exclusions that are delivered with automatic exclusions file paths and file types.
Default exclusions for all roles
This section lists the default exclusions for all Windows Server 2016 roles.
- Windows 'temp.edb' files:
- %windir%SoftwareDistributionDatastore*tmp.edb
- %ProgramData%MicrosoftSearchDataApplicationsWindows**.log
- Windows Update files or Automatic Update files:
- %windir%SoftwareDistributionDatastore*Datastore.edb
- %windir%SoftwareDistributionDatastore*edb.chk
- %windir%SoftwareDistributionDatastore*edb*.log
- %windir%SoftwareDistributionDatastore*Edb*.jrs
- %windir%SoftwareDistributionDatastore*Res*.log
- Windows Security files:
- %windir%Securitydatabase*.chk
- %windir%Securitydatabase*.edb
- %windir%Securitydatabase*.jrs
- %windir%Securitydatabase*.log
- %windir%Securitydatabase*.sdb
- Group Policy files:
- %allusersprofile%NTUser.pol
- %SystemRoot%System32GroupPolicyMachineregistry.pol
- %SystemRoot%System32GroupPolicyUserregistry.pol
- WINS files:
- %systemroot%System32Wins**.chk
- %systemroot%System32Wins**.log
- %systemroot%System32Wins**.mdb
- %systemroot%System32LogFiles
- %systemroot%SysWow64LogFiles
- File Replication Service (FRS) exclusions:
- Files in the File Replication Service (FRS) working folder. The FRS working folder is specified in the registry key
HKEY_LOCAL_MACHINESystemCurrentControlSetServicesNtFrsParametersWorking Directory
- %windir%Ntfrsjetsys*edb.chk
- %windir%Ntfrsjet*Ntfrs.jdb
- %windir%Ntfrsjetlog**.log
- FRS Database log files. The FRS Database log file folder is specified in the registry key
HKEY_LOCAL_MACHINESystemCurrentcontrolsetServicesNtfrsParametersDB Log File Directory
-%windir%Ntfrs*Edb*.log- The FRS staging folder. The staging folder is specified in the registry key
HKEY_LOCAL_MACHINESystemCurrentcontrolsetServicesNtFrsParametersReplica SetsGUIDReplica Set Stage
- %systemroot%Sysvol*Nntfrs_cmp*
- The FRS preinstall folder. This folder is specified by the folder
Replica_rootDO_NOT_REMOVE_NtFrs_PreInstall_Directory
- %systemroot%SYSVOLdomainDO_NOT_REMOVE_NtFrs_PreInstall_Directory*Ntfrs*
- The Distributed File System Replication (DFSR) database and working folders. These folders are specified by the registry key
HKEY_LOCAL_MACHINESystemCurrentcontrolsetServicesDFSRParametersReplication GroupsGUIDReplica Set Configuration File
NoteFor custom locations, see Opt out of automatic exclusions.- %systemdrive%System Volume InformationDFSR$db_normal$
- %systemdrive%System Volume InformationDFSRFileIDTable_*
- %systemdrive%System Volume InformationDFSRSimilarityTable_*
- %systemdrive%System Volume InformationDFSR*.XML
- %systemdrive%System Volume InformationDFSR$db_dirty$
- %systemdrive%System Volume InformationDFSR$db_clean$
- %systemdrive%System Volume InformationDFSR$db_lostl$
- %systemdrive%System Volume InformationDFSRDfsr.db
- %systemdrive%System Volume InformationDFSR*.frx
- %systemdrive%System Volume InformationDFSR*.log
- %systemdrive%System Volume InformationDFSRFsr*.jrs
- %systemdrive%System Volume InformationDFSRTmp.edb
- Process exclusions
- %systemroot%System32dfsr.exe
- %systemroot%System32dfsrs.exe
- Hyper-V exclusions:
- This section lists the file type exclusions, folder exclusions, and process exclusions that are delivered automatically when you install the Hyper-V role
- File type exclusions:
- *.vhd
- *.vhdx
- *.avhd
- *.avhdx
- *.vsv
- *.iso
- *.rct
- *.vmcx
- *.vmrs
- Folder exclusions:
- %ProgramData%MicrosoftWindowsHyper-V
- %ProgramFiles%Hyper-V
- %SystemDrive%ProgramDataMicrosoftWindowsHyper-VSnapshots
- %Public%DocumentsHyper-VVirtual Hard Disks
- Process exclusions:
- %systemroot%System32Vmms.exe
- %systemroot%System32Vmwp.exe
- SYSVOL files:
- %systemroot%SysvolDomain*.adm
- %systemroot%SysvolDomain*.admx
- %systemroot%SysvolDomain*.adml
- %systemroot%SysvolDomainRegistry.pol
- %systemroot%SysvolDomain*.aas
- %systemroot%SysvolDomain*.inf
- %systemroot%SysvolDomain*.Scripts.ini
- %systemroot%SysvolDomain*.ins
- %systemroot%SysvolDomainOscfilter.ini
Active Directory exclusions
This section lists the exclusions that are delivered automatically when you install Active Directory Domain Services.
- NTDS database files. The database files are specified in the registry key
HKEY_LOCAL_MACHINESystemCurrentControlSetServicesNTDSParametersDSA Database File
- %windir%Ntdsntds.dit
- %windir%Ntdsntds.pat
- The AD DS transaction log files. The transaction log files are specified in the registry key
HKEY_LOCAL_MACHINESystemCurrentControlSetServicesNTDSParametersDatabase Log Files
- %windir%NtdsEDB*.log
- %windir%NtdsRes*.log
- %windir%NtdsEdb*.jrs
- %windir%NtdsNtds*.pat
- %windir%NtdsEDB*.log
- %windir%NtdsTEMP.edb
- The NTDS working folder. This folder is specified in the registry key
HKEY_LOCAL_MACHINESystemCurrentControlSetServicesNTDSParametersDSA Working Directory
- %windir%NtdsTemp.edb
- %windir%NtdsEdb.chk
- Process exclusions for AD DS and AD DS-related support files:
- %systemroot%System32ntfrs.exe
- %systemroot%System32lsass.exe
DHCP Server exclusions
This section lists the exclusions that are delivered automatically when you install the DHCP Server role. The DHCP Server file locations are specified by the DatabasePath, DhcpLogFilePath, and BackupDatabasePath parameters in the registry key
HKEY_LOCAL_MACHINESystemCurrentControlSetServicesDHCPServerParameters
- %systemroot%System32DHCP**.mdb
- %systemroot%System32DHCP**.pat
- %systemroot%System32DHCP**.log
- %systemroot%System32DHCP**.chk
- %systemroot%System32DHCP**.edb
DNS Server exclusions
This section lists the file and folder exclusions and the process exclusions that are delivered automatically when you install the DNS Server role.
- File and folder exclusions for the DNS Server role:
- %systemroot%System32Dns**.log
- %systemroot%System32Dns**.dns
- %systemroot%System32Dns**.scc
- %systemroot%System32Dns*BOOT
- Process exclusions for the DNS Server role:
- %systemroot%System32dns.exe
File and Storage Services exclusions
This section lists the file and folder exclusions that are delivered automatically when you install the File and Storage Services role. The exclusions listed below do not include exclusions for the Clustering role.
- %SystemDrive%ClusterStorage
- %clusterserviceaccount%Local SettingsTemp
- %SystemDrive%mscs
Print Server exclusions
This section lists the file type exclusions, folder exclusions, and the process exclusions that are delivered automatically when you install the Print Server role.
- File type exclusions:
- *.shd
- *.spl
- Folder exclusions. This folder is specified in the registry key
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlPrintPrintersDefaultSpoolDirectory
- %system32%spoolprinters*
- Process exclusions:
- spoolsv.exe
Web Server exclusions
This section lists the folder exclusions and the process exclusions that are delivered automatically when you install the Web Server role.
- Folder exclusions:
- %SystemRoot%IIS Temporary Compressed Files
- %SystemDrive%inetpubtempIIS Temporary Compressed Files
- %SystemDrive%inetpubtempASP Compiled Templates
- %systemDrive%inetpublogs
- %systemDrive%inetpubwwwroot
- Process exclusions:
- %SystemRoot%system32inetsrvw3wp.exe
- %SystemRoot%SysWOW64inetsrvw3wp.exe
- %SystemDrive%PHP5433php-cgi.exe
Windows Server Update Services exclusions
This section lists the folder exclusions that are delivered automatically when you install the Windows Server Update Services (WSUS) role. The WSUS folder is specified in the registry key
HKEY_LOCAL_MACHINESoftwareMicrosoftUpdate ServicesServerSetup
- %systemroot%WSUSWSUSContent
- %systemroot%WSUSUpdateServicesDBFiles
- %systemroot%SoftwareDistributionDatastore
- %systemroot%SoftwareDistributionDownload