We have a program running on our SBS 2003 Server called NoSpamToday which as you may of guessed checks emails for Spam/RBL and if so configured viruses. The Eset command line scanner is invoked via NoSpamToday using the following options ... /all /mailbox+ /arch+ /scanboot- /scanmbr- /scanmem- /selfcheck- /sound- /quit+ /log=%ERR% %IN% This seems to work very well but occasionally it lets viruses/trojans through. However once it reaches the clients Outlook it is duly Quarantined as it should of been via the Server's NoSpamToday The email in question had an attachment which was another email which had an attached ZIP file. This ZIP file contained an executable (exe) which in itself was a trojan. My question is does the above command line options used by the NoSpamToday scan deep enough into the email or are there further options that need to be added. To clarify I also posted this on the NoSpamToday forums and they told me to contact Eset for further command line options.