Microsoft Forefront Security for Exchange and SharePoint
Forefront Server as an integrated process inside Exchange and SharePoint is a good thing. These are the two locations where there is a vast amount of incoming data and where it would be a disaster should any malware or virus get uploaded. Unfortunately, deploying this as a point solution with no real integration and months before the management pack ships suggests either desperation to be seen doing something or a lack of thought.
Forefront Server as an integrated process inside Exchange and SharePoint is a good thing. These are the two locations where there is a vast amount of incoming data and where it would be a disaster should any malware or virus get uploaded.
Verdict
Forefront Server as an integrated process inside Exchange and SharePoint is a good thing. These are the two locations where there is a vast amount of incoming data and where it would be a disaster should any malware or virus get uploaded. Unfortunately, deploying this as a point solution with no real integration and months before the management pack ships suggests either desperation to be seen doing something or a lack of thought.
32-bit Trial
X86 architecture-based computer
64-bit Trial
x64 architecture-based computer with:
Intel Xeon or Intel Pentium Family processor that supports Intel Extended Memory 64 Technology (Intel EM64T)1 or
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
AMD Opteron or AMD Athlon 64 processor that supports AMD64 platform
Operating System
Microsoft Windows Server 2003
Memory
512MB of available memory (1GB recommended)
Hard Disk
300MB of available disk space
Microsoft Exchange
Microsoft Exchange Server 2007
-
CISA just published crucial new guidance on keeping Microsoft Exchange servers secureNews With a spate of attacks against Microsoft Exchange in recent years, CISA and the NSA have published crucial new guidance for organizations to shore up defenses.
By Emma Woollacott Published
-
US telco confirms hackers breached systems in stealthy state-backed cyber campaign – and remained undetected for nearly a yearNews The hackers remained undetected in the Ribbon Communications’ systems for months
By Emma Woollacott Published
-
Heavy workloads and botched digital initiatives are causing ‘transformation fatigue’ – and enterprises risk losing top talent if they don’t change their waysNews Digital transformation “fatigue” is becoming a real problem as enterprises look to modernize at rapid pace
By Ross Kelly Published