Best Practices for File Policies and Malware Detection

In addition to the items described below, follow the steps in How to Configure Malware Protection and referenced topics.