Not finding what you are looking for? View a video demo or contact us at service@directionsonmicrosoft.com

Diagrams the four major types of companies involved in the application service provider market and how they relate to the end-user


This report explains why e-mail-borne viruses are such a threat, describes trade-offs that organizations must understand and use when formulating plans, and offers specific recommendations that will help them


The problems posed by e-mail-borne viruses to Microsoft-based systems and strategies to help reduce the risks to reasonable levels


The danger is posed by a lack of understanding of the threat, and the existence of scripting engines and e-mail automation APIs on client PCs


The four underlying trade-offs one needs to understand before formulating strategies to combat e-mail viruses


Strategies for preventing a virus from ever getting on to a system, avoiding activation of a virus that does make it on to a system, limiting the permanent damage an activated virus can do, and preventing the virus from reproducing and spreading


The six points on a network where measures should be taken to protected against e-mail-borne viruses


Technologies that will help combat e-mail viruses in the future, such as public key infrastructures and digital signatures


Issued in response to the recent "LoveBug" virus, the patch for Outlook 98 and Outlook 2000 blocks many types of file attachments and restricts Outlook's programming interfaces


Additional sources of information about combating e-mail viruses