What are you folks out there doing about bugbear, klez and all the others that spoof a return address?
I'm using 3 layer protection here: at the SMTP gateway, at the servers (including internal mail servers) and at the desktop.
Problem is: the desktop team drops the ball and leaves antivirus off of our PC's sometimes and I'll end up with an infection. If the virus sends an infected email I'll catch it at the internal email server and I can dig through the logs to find out where it came from. There's a couple other ways to track down an unprotected/infected PC but these new viruses that spoof the return address are a b1tch.
I'm curious if anyone else out there has developed some method or practice for dealing with this crap. Or has figured out a way to find out where infected mails are coming from without having the headers on the original email.
I'm currently running a portscan to see if I can catch the backdoor program that bugbear leaves.
Any help or suggestions would be great, thanks!
I'm using 3 layer protection here: at the SMTP gateway, at the servers (including internal mail servers) and at the desktop.
Problem is: the desktop team drops the ball and leaves antivirus off of our PC's sometimes and I'll end up with an infection. If the virus sends an infected email I'll catch it at the internal email server and I can dig through the logs to find out where it came from. There's a couple other ways to track down an unprotected/infected PC but these new viruses that spoof the return address are a b1tch.
I'm curious if anyone else out there has developed some method or practice for dealing with this crap. Or has figured out a way to find out where infected mails are coming from without having the headers on the original email.
I'm currently running a portscan to see if I can catch the backdoor program that bugbear leaves.
Any help or suggestions would be great, thanks!