A method and system for providing protection from exploits to devices
connected to a network. The system and method include a component for
determining whether an encapsulation has been applied to an attachment
and unencapsulating such encapsulated attachments, a component that
performs at least one decompression of the attachment when the attachment
is compressed, a component that determines whether a header, body, and/or
attachment of a message includes an exploit, and a component that holds
and optionally cleans messages that include exploits. A device that
receives messages that are directed to the network employs the components
above to provide exploit protection for at least one of the messages.