For the official Microsoft topic on this subject, see Configuring and scheduling updates on the Microsoft TechNet Library.
*********************************************
In FPE, you can configure update settings that are specific for each scan engine, as well as global settings that apply to all engines.
When you set a schedule to automatically check for new engine and definition update, you help protect your environment against new malware without having to check versions or manually update the files. It is recommended that you use the default schedule to update scan engines hourly. However, if you so choose, you can create your own schedules for performing updates.
Cloudmark downloads antispam updates directly from the cloud. This differs from the other scan engines, which receive updates directly from Microsoft. Cloudmark definition update checks are not configurable in the Forefront Protection 2010 for Exchange Server Administrator Console.
To configure and schedule updates for specific engines
In the Forefront Protection 2010 for Exchange Server Administrator Console, click Policy Management, and then under Global Settings, click Advanced Options.
In the Global Settings - Advanced Options pane, in the Intelligent Engine Management section, using the Engine management drop-down list, select Manual.
In the Update scheduling section, select the engine whose update settings you want to change.
The engines are grouped together by protection technology, for example under Antimalware and Antispam. If you select multiple engines, be sure that you want these engines to have the same update configuration.
Click the Edit Selected Engines button.
In the Edit Selected Engines dialog box, configure the following settings:
If you disable updates for an engine, it is recommended that you do not use that engine for scanning. When updates for an engine are disabled, the engine still continues to be used for scanning but as time passes and its definitions become out of date, its effectiveness diminishes. It is strongly recommended that you leave the default of having all engines enabled to update automatically.
Unicode update paths are not supported. Also, if the primary update path uses the default Internet path (http://forefrontdl.microsoft.com/server/scanengineupdate) in order to update its antimalware and antispam engines, that URL must be allowed in your firewall settings, even if the mail server generally does not have Internet access. In order to have full protection, your engines need to be updated on a regular basis. If antispam protection is enabled, because the antispam engine definition updates are downloaded directly from the cloud, the following URLs (and any subdomains under them) and the use of http and https must also be allowed through the firewall:
Unicode update paths are not supported. Also, if the secondary update path uses the default Internet path (http://forefrontdl.microsoft.com/server/scanengineupdate) in order to update its antimalware and antispam engines, that URL must be allowed in your firewall settings, even if the mail server generally does not have Internet access. In order to have full protection, your engines need to be updated on a regular basis. If antispam protection is enabled, because the antispam engine definition updates are downloaded directly from the cloud, the following URLs (and any subdomains under them) and the use of http and https must also be allowed through the firewall:
After you are done making changes, click Save.
If you are using Windows PowerShell commands to schedule updates, it is recommended that you do not schedule antispam updates with the antimalware updates.
To configure global update settings for all engines
In the Forefront Protection 2010 for Exchange Server Administrator Console, click Policy Management, and then under Global Settings, click Engine Options.
In environments where the Exchange server must access the Internet through a proxy server you must configure FPE to retrieve engine and definition updates through that server by performing the following steps:
To configure FPE to perform updates for enabled engines when the Microsoft Forefront Server Protection Controller Service starts, select Update engines on sever startup. This setting is disabled by default.
To configure the maximum number of seconds that an engine will attempt to download an update before timing out, specify a value, in seconds, in the Engine download timeout (seconds) field. If a timeout occurs, the download is retried at the next scheduled interval. The default value is 300 seconds. The minimum is 60 seconds and the maximum is 86400 seconds (24 hours).
Click Save.
Gud !