McAfee VIRUSSCAN ENTERPRISE Betriebsanweisung

Stöbern Sie online oder laden Sie Betriebsanweisung nach Antivirus-Sicherheitssoftware McAfee VIRUSSCAN ENTERPRISE herunter. McAfee VIRUSSCAN ENTERPRISE Product guide Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 166
  • Inhaltsverzeichnis
  • FEHLERBEHEBUNG
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen

Inhaltsverzeichnis

Seite 1 - Product Guide

McAfee VirusScan Enterprise 8.8 softwareProduct Guide

Seite 2

• The AntiSpyware Enterprise Module has been fully integrated into the VirusScan Enterprise8.8 software.• Support for Outlook 2010 email scanning.• Su

Seite 3 - Contents

Preventing MFEVTP from loading then rebootFollow these steps to prevent McAfee Validation Trust Protection Service (MFEVTP) from loadingand reboot the

Seite 4

• No — Go to the McAfee Technical Support ServicePortal at http://mysupport.mcafee.comand search for a solution, or contact McAfee Technical Support.S

Seite 5

Installation• Question: I just installed the software using the silent installation method, and there is noVirusScan Enterprise icon in the Windows sy

Seite 6 - Conventions

• Start the service manually from the Services Control Panel.• Select Start | Run, then type Net Start McShield.• Set the service to start automatical

Seite 7 - How this guide is organized

Access Protection tabConfigure access protection rules and prevent McAfee processes from being stopped.Option definitionsDefinitionOptionSelect Workst

Seite 8 - Finding product documentation

DefinitionOption• Block — Blocks the process that is specified in the Rule Details. Select Blockto enable the rule or deselect it to disable the rule.

Seite 9

Additional Alerting Options tabConfigure filter and local alerting options.Option definitionsDefinitionOptionSelect Workstation or Server from the dro

Seite 10 - Getting Started

Alerts tabSelect the components that you want to generate alerts and configure Alert Manager if it isinstalled.See theAlert Manager 4.7.1 Product Guid

Seite 11

Reports tabEnable logging to track activity on your network and record which settings you used to detectand respond to any potential threat that the s

Seite 12

Blocking tabBlock connections from remote computers that have files with potential threats or unwantedprograms in a shared folder.Option definitionsDe

Seite 13

McAfee HeadquartersMcAfee Headquarters, home to McAfee Labs and McAfee Technical Support, provides thefollowing VirusScan Enterprise services:• DAT up

Seite 14 - Using right-click features

Reports tabEnable logging to track detections on the local system of any code execution from heap or stackoverruns for certain processes.Option defini

Seite 15

Buffer Overflow Protection tabPrevent buffer overflow exploits from executing arbitrary code on your computer.Option definitionsDefinitionOptionSelect

Seite 16

Display Options tabConfigure which system tray options users can access and the preferred language.Option definitionsDefinitionOptionSelect Workstatio

Seite 17 - What to do first

Actions tabConfigure which actions to take when a threat or potentially unwanted program is detected.Option definitionsDefinitionOptionSelect Workstat

Seite 18 - Quarantined items

DefinitionOptionNo secondary action is allowed for this option.• Continue scanning — Continue scanning when an attachment with a threat isdetected.No

Seite 19 - Access protection

Alerts tabConfigure the alert settings for the on-delivery email scanner.Option definitionsDefinitionOptionSelect Workstation or Server from the drop-

Seite 20 - MyProgram.exe is not malware

Reports tabEnable logging to track activity on your network and record which settings you used to detectand respond to any potential threat that the s

Seite 21

Scan Items tabConfigure detection options for the email scanner.Option definitionsDefinitionOptionSelect Workstation or Server from the drop-down list

Seite 22

DefinitionOptionScan email message body — Scan the body of Microsoft Outlook email messages.Email message body (forMicrosoft Outlook only)Configure th

Seite 23 - VirusScan Console

Scan Items tabConfigure detection options for the on-demand email scanner.Option definitionsDefinitionOptionMessages to scan • All highlighted items —

Seite 24 - Protection level descriptions

Detection — finding threatsDevelop an effective strategy to detect intrusions when they occur. Configure these featuresto detect threats:• Update Task

Seite 25 - Types of user-defined rules

General tabConfigure general on-access scanning options.Option definitionsDefinitionOptionSelect Workstation or Server from the drop-down list.NOTE: T

Seite 26

DefinitionOptionSpecify one of the six sensitivity levels for Artemis between disabled and veryhigh.Default = very low.Artemis (Heuristic network chec

Seite 27

Messages tabConfigure message options for local users and users without administrative rights.Option definitionsDefinitionOptionSelect Workstation or

Seite 28

Notes Scanner Settings tabConfigure the Lotus Notes settings for the on-delivery email scanner.Lotus Notes password configurationWhen accessing a loca

Seite 29

Actions tabConfigure which actions to take when a threat or potentially unwanted program is detected. Ifyou are configuring different scanning policie

Seite 30

DefinitionOption• Deny access to files — Prevent users from accessing detected files andprograms.• Delete files automatically — Remove detected files

Seite 31 - Port blocking rule options

Exclusions tabSpecify what items to exclude from scanning. If you are configuring different scanning policiesfor default, low-risk, and high-risk proc

Seite 32

Reports tabEnable logging to track activity on your network and record which settings you used to detectand respond to any potential threat that the s

Seite 33 - Removing user-defined rules

Scan Items tabConfigure detection options. If you are configuring different scanning policies for default, low-risk,and high-risk processes, the optio

Seite 34

DefinitionOptionCompressed files • Scan inside archives — Examine archive (compressed) files and theircontents.• Decode MIME encoded files — Detect, d

Seite 35

high and low risk profile scanning, and when to disable scan on write can all improveperformance.CAUTION: Failure to enable When reading from disk sca

Seite 36

Actions tabConfigure which actions to take when a threat or potentially unwanted program is detected.Option definitionsDefinitionOptionPerform this ac

Seite 37

Exclusions tabSpecify what items to exclude from scanning.Option definitionsDefinitionOptionSelect the type of exclusion from the drop down list, then

Seite 38 - Configuring unwanted programs

Reports tabEnable logging to track activity on your network and record which settings you used to detectand respond to any potential threat that the s

Seite 39

Scan Items tabConfigure detection options.Option definitionsDefinitionOptionFile types to scan • All files — Scan all files regardless of extension.•

Seite 40

Task tabSpecify the platforms where this on-demand task runs.Option definitionsDefinitionOptionPlatforms where thistask will run• Run this task on ser

Seite 41

Password Options tabSet password security for the entire system or selected items. SeeHow setting a passwordaffects usersfor more information.Option d

Seite 42

Processes tabChoose whether to configure one scanning policy for all processes or different scanning policiesfor default, low-risk and high-risk proce

Seite 43 - DAT files and how they work

Processes tabSpecify the processes that you define as low-risk. This is a two-step process.Option definitions for step 1DefinitionOptionSelect Worksta

Seite 44

Processes tabSpecify the processes that you define as high-risk. This is a two step process.Option definitions for step 1DefinitionOptionSelect Workst

Seite 45

Scan Items tabSelect categories of potentially unwanted programs to detect and create exclusions for programsthat you do not want to detect.Option def

Seite 46 - Configuring the mirror task

• Delete the selected task.• Configure alerting properties.• Launch the event viewer.• Access the Information Library on the McAfee Labs website.• Con

Seite 47 - Framework

Quarantine Policy tabConfigure the quarantine location and the length of time to keep the quarantined items.Option definitionsDefinitionOptionSelect W

Seite 48 - Excluding scan items

Policy tabConfigure the quarantine location and the length of time to keep the quarantined items.Option definitionsDefinitionOptionSelect Workstation

Seite 49 - Using scheduled tasks

Manager tabSelect an item in the list , then right-click to access advanced options. You can rescan, checkfor false positive, restore, delete, or view

Seite 50 - Configuring the task schedule

Task tabSpecify account information for the user who has access to the restore location. If no accountis entered here, the restore task runs under the

Seite 51 - Scanning items on-access

Scan Locations tabConfigure the item types and locations to scan.Option definitionsDefinitionOptionSelect the locations to scan.Default = Memory for r

Seite 52 - Enabling on-network drives

DefinitionOptionWhen the On-Demand Scan Progress dialog appears, the locations to scan appearas a comma-separated string following Scanning in. As the

Seite 53 - How Artemis works

Performance tabSpecify scan deferral and system utilization options to improve performance.Option definitionsDefinitionOptionSelect the scan deferral

Seite 54 - Configuring general settings

DefinitionOptionsystems. Detections found with this level are presumed to be malicious, but theyhaven’t been fully tested to confirm that they are not

Seite 55

ScriptScan tabPrevent unwanted scripts from executing.SeeScript scanning and how it worksfor more information.Option definitionsDefinitionOptionSelect

Seite 56

User-Defined Detection tabSpecify individual files or programs to treat as unwanted programs.Option definitionsDefinitionOptionSelect Workstation or S

Seite 57

• Status — This icon does not change to indicate access protection trigger alerts or if on-accessscanning is disabled on ePolicy Orchestrator managed

Seite 58 - Configuring process settings

Repositories tabConfigure the repositories where you get updates.NOTE:This feature is not available from the ePolicy Orchestrator Console. Access this

Seite 59

Adding and editing repositoriesAdd new repositories or edit existing repositories.Option definitionsDefinitionOptionSpecify the name of the repository

Seite 60

DefinitionOptionon the repository, you ensure that the account has read permissions to the folderscontaining the update files.• Download credentials a

Seite 61

Proxy settings tabProxy servers are used as part of internet security to hide internet users’ computers from theinternet and improve access speed by c

Seite 62 - Scanning items on-demand

Mirror taskConfigure the mirror taskVirusScan Enterprise 8.8 Console — Option definitionsDefinitionOptionEnable activity logging.Log FileSelect the fo

Seite 63

AutoUpdate taskConfigure the AutoUpdate taskOption definitionsDefinitionOptionEnable activity logging.Log FileSelect the format of the log file.Defaul

Seite 64 - How system utilization works

Schedule tabSpecify the schedule frequency and other settings for this task.Option definitionsDefinitionOptionRun task Select the frequency for this t

Seite 65

DefinitionOptionThe number of minutes.NOTE:The number of minutes available for selection depends on which options you have selected.For example:Minute

Seite 66

DefinitionOptionThis option is only available when scheduling the task At Startup or At Logon.Specify the number of minutes that the computer is idle

Seite 67

Task tabEnable the schedule for this task and specify user account settings.Option definitionsDefinitionOptionSchedule the task to run at a specified

Seite 68

•"V" in a shield with circle and line — Indicates on-access scanning is disabled.•"V" in a shield with red outline — Indicates on-

Seite 69

Advanced schedule optionsConfigure the schedule parameters.Option definitionsDefinitionOptionSpecify the date to start this task.Start DateSpecify the

Seite 70

Global Scan Settings tabSet scan cache options to save scan data during a system reboot and allow on-demand scansto use that clean cache data to impro

Seite 71

IndexAaccess protectiondisabling during troubleshooting 98access violations 25anti-virus and common rules 26common rules 23detections and actions 73ex

Seite 72 - Detections and responses

common rulesaccess protection, configuring 26preconfigured access protection 23standard and maximum protection 23comon protection rulesconfiguring acc

Seite 73 - Unwanted program detections

Llog files, VirusScan Enterpriseaccess violations 25email scanning and 69on-demand scanning and 66See activity logs, VirusScan Enterprise 84low-risk p

Seite 74 - On-access scan detections

processesinclude and exclude 32Processes tab, VirusScan Enterpriseon-access scanning 58, 60processes, VirusScan Enterprisedefault, configuring 54in me

Seite 75 - Email scan detections

TtaskAutoUpdate 45mirror 45scheduling 50update 44Task list, VirusScan Console 13task scheduleconfiguring 50recommended on-demand interval 50Task tab,

Seite 76

• McAfee Agent Status Monitor — Displays the McAfee Security Status Monitor dialogbox.• About — Opens the About dialog box.What to do firstWhen the so

Seite 77 - Managing quarantined items

• Quarantine Manager Policy. Configure the location of the quarantine folder and thenumber of days to keep quarantined items before automatically dele

Seite 78 - Configuring alerts

Part I - Prevention: Avoiding ThreatsPrevention is the first step in a protection strategy, to keep threats from gaining access to yoursystem.Contents

Seite 79

COPYRIGHTCopyright © 2010 McAfee, Inc. All Rights Reserved.No part of this publication may be reproduced, transmitted, transcribed, stored in a retrie

Seite 80 - Access queries and dashboards

• Internet Relay Chat (IRC) messages — Files sent along with these messages can easilycontain malware as part of the message. For example, automatic s

Seite 81 - Configuring emergency DATs

DescriptionLog entryDate2/10/2010Time11:00AMAction takenBlocked by Access Protection ruleCredentialsTestDomain\TestUserProcess name that breeched the

Seite 82 - Downloading a SuperDAT file

Configure the General Options Policies user interface properties with these user interfaceconsoles.ePolicy Orchestrator 4.5 or 4.6Configure the Genera

Seite 83

a Click New Policy to open New Policy dialog box.b From the Create a new policy based on this existing policy list, select one of thesettings.c Type a

Seite 84 - Fine-Tuning Your Protection

Rule type descriptionsDescriptionRule typeThese preconfigured rules protect your computer from common behaviors of malwarethreats. You can enable, dis

Seite 85 - Running an example query

DescriptionProtection levelAnti-virus rules that block destructive code from accessing the computer until a DATfile is released. These rules are preco

Seite 86 - Analyzing your protection

Configuring access protection settingsUse Access Protection Policies to protect your system’s access points and prevent terminationof McAfee processes

Seite 87

ePolicy Orchestrator 4.5 or 4.6From the Access Protection Policies, configure the predefined access-protection rules.TaskFor option definitions, click

Seite 88

b From the Create a new policy based on this existing policy list, select one of thesettings.c Type a new policy name.d Click OK. The new policy appea

Seite 89 - Appendix

Edit an existing policya From the Category list, select the policy category.b From the Actions column, click Edit Setting to open the policy configura

Seite 90

ContentsPreface. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Seite 91 - SCAN32.EXE

a Click New Policy to open New Policy dialog box.b From the Create a new policy based on this existing policy list, select one of thesettings.c Type a

Seite 92

5 Click OK.The new user-defined rule appears in the right-hand pane in the Rules column. To modifythe new rule, select it and click Edit.Port blocking

Seite 93 - MCUPDATE

DefinitionOptionBlock files from being deleted from the specified folder.Files being deletedRegistry blocking rule optionsRegistry blocking rules prev

Seite 94 - Connecting to remote systems

DescriptionOptionAllow access to these processes. Use the exact process name. For example, specify theseexclusions: avtask.exe, cfgwiz,exe, fssm32.exe

Seite 95 - Troubleshooting

TaskFor option definitions, click ? or Help in the interface.1 Click Systems | Policy Catalog, then from the Product list select VirusScan Enterprise8

Seite 96 - Property

VirusScan Enterprise uses a Buffer Overflow and Access Protection DAT file to protectapproximately 30 applications, for example, Internet Explorer, Mi

Seite 97

ePolicy Orchestrator 4.5 or 4.6Configure the Buffer Overflow Protection Policies with this user interface consoles.TaskFor option definitions, click ?

Seite 98

2 Edit an existing policy or create a new policy:Edit an existing policya From the Category list, select the policy category.b From the Actions column

Seite 99

Restricting potentially unwanted programsVirusScan Enterprise protects your computer from potentially unwanted programs that are anuisance or present

Seite 100 - 8.8, Installation Guide

1 Click Menu | Policy | Policy Catalog, then from the Product list select VirusScanEnterprise 8.8.0. The Category list displays the policy categories

Seite 101 - Frequently asked questions

Update tasks and how they work. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44Mirror tasks

Seite 102 - 00000000.ie

3 From the Settings for list, select Workstation or Server.4 From the Unwanted Programs Policy page, click the Scan Items tab to configure:a Categorie

Seite 103 - CATALOG.Z

TaskFor option definitions, click ? in the interface.1 Click Menu | Policy | Policy Catalog, then from the Product list select VirusScanEnterprise 8.8

Seite 104 - Access Protection tab

c Type a new policy name.d Click OK. The new policy appears in the list of existing policies.3 From the Settings for list, select Workstation or Serve

Seite 105 - Configuring predefined rules

DAT files and how they workWhen the scanning engine searches through files looking for threats, it compares the contentsof the scanned files toknown t

Seite 106 - Option definitions

Requirements for an efficient update strategyAn efficient updating strategy generally requires at least one client or server in your organizationto re

Seite 107 - Alerts tab

an update. By default, detection for the new potentially unwanted program in the EXTRA.DATis ignored once the new detection definition is added to the

Seite 108 - Reports tab

The VirusScan Enterprise software relies on a directory structure to update itself. When mirroringa site, it is important to replicate the entire dire

Seite 109 - Blocking tab

Tab definitionsDefinitionsTabMirror • Specify the log file location and format.• Specify which executable to run after the mirror task has completed a

Seite 110

Tab definitionsDefinitionsTabRepositories • Specify the repositories where you get updates.• Configure the order to access the repositories.Specify wh

Seite 111

Specifying exclusionsSpecify files, folders, and drives to exclude from scanning operations. You can also remove anyexclusions you specified previousl

Seite 112 - Display Options tab

Unwanted program detections. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73On-access

Seite 113 - Actions tab

ContentsScheduling tasksConfiguring the task scheduleScheduling tasksYou have the option to schedule on-demand, AutoUpdate, and mirror tasks to run at

Seite 114

Part II - Detection: Finding ThreatsFinding threats is the second step in a protection strategy to detect malware attempting to gainaccess to your sys

Seite 115

2 If the file meets the scanning criteria, it is scanned by comparing the information in thefile to the known malware signatures in the currently load

Seite 116

When scanning Default + additional file types, the scanner examines a list of specific filesbased on the file types you select.• Default file types: T

Seite 117 - Scan Items tab

Determine the number of scanning policiesFollow this process to determine whether to configure more than one on-access scanning policy.How general and

Seite 118

Configure the on-access general settings using the following user interface consoles.ePolicy Orchestrator 4.5 or 4.6Configure the general settings tha

Seite 119

6 On the Blocking tab, configure blocking connections from remote computers that writefiles with potential threats or unwanted programs.NOTE: By defau

Seite 120 - General tab

5 On the ScriptScan tab, enable ScriptScan and configure any processes or URLs to excludefrom scanning.NOTE: With previous versions of VirusScan Enter

Seite 121 - Default = very low

4 On the Blocking tab, configure blocking connections from remote computers that writefiles with potential threats or unwanted programs.NOTE: By defau

Seite 122 - Messages tab

g From the Actions column of the new policy, click Edit Setting to open the policyconfiguration page.3 From the Settings for list, select Workstation

Seite 123 - Notes Scanner Settings tab

PrefaceTo use this document effectively you should understand who this document is written for, theconventions used, what's in it, and how to fin

Seite 124

4 From the On-Access Default, Low-Risk, or High-Risk Processes Policies page, configure theoptions on each tab. Refer toProcess setting tab options.Pr

Seite 125

ePolicy Orchestrator 4.5 or 4.6Enable on-network drives from the On-Access Default Processes Policies with this user interfaceconsole.TaskFor option d

Seite 126 - Exclusions tab

c Type a new policy name.d Click OK. The new policy appears in the list of existing policies.3 From the Settings for list, select Workstation or Serve

Seite 127

• The file has not been cached.• The file has not been excluded.• The file has not been previously scanned.NOTE: The on-demand scanner uses heuristics

Seite 128

storage to local storage. When you need to access a file on a volume managed by remotestorage, open the file as usual. If the data for the file is no

Seite 129

TaskFor option definitions, click ? in the interface.1 Click Menu | System | System Tree and select Client Task.2 From the Client Task page that appea

Seite 130

TaskFor option definitions, click Help in the interface.1 Open the On-Demand Scan Properties page for an existing or new task:• Select and right-click

Seite 131

DefinitionsTab• Secondary action to take on an unwanted program detection if the first actionfails.For allowed actions in the prompt dialog box, selec

Seite 132

Create a new policya Click New Policy to open New Policy dialog box.b From the Create a new policy based on this existing policy list, select one of t

Seite 133

VirusScan ConsoleConfigure the scan cache feature with this user interface console.TaskFor option definitions, click Help in the interface.1 Click Too

Seite 134 - Task tab

How this guide is organizedThis document is meant as a reference to use along with the VirusScan Console and ePolicyOrchestrator user interfaces. It a

Seite 135 - Password Options tab

1 Click Menu | Policy | Policy Catalog, then from the Product list select VirusScanEnterprise 8.8.0. The Category list displays the policy categories

Seite 136 - Processes tab

VirusScan ConsoleConfigure the On-Delivery Email Scan Policies using this user interface console.TaskFor option definitions, click ? in the interface.

Seite 137

Part III - Response: Handling ThreatsResponding to threats is the third step in a protection strategy to detect and clean malwarethat attempts to gain

Seite 138

System access point violationsWhen a system access point is violated, the action taken depends on how the rule wasconfigured.If the rule was configure

Seite 139

Review the information in the log file, then decide whether to take any of these additionalactions:• Fine-tune scanning items — This makes your scans

Seite 140 - Quarantine Policy tab

On-demand scan detectionsWhen an on-demand detection occurs, the scanner takes action according to how you configuredthe On-Demand Scan Properties, Ac

Seite 141 - Policy tab

TasksePolicy Orchestrator 4.5 or 4.6ePolicy Orchestrator 4.0VirusScan ConsoleePolicy Orchestrator 4.5 or 4.6Configure the Quarantine Manager Policies

Seite 142 - Manager tab

a From the Category list, select the policy category.b From the Actions column, click Edit to open the policy configuration page.Create a new policya

Seite 143

• View detection properties.3 A dialog box appears and describes the affect of your attempt.Configuring alerts and notificationsBeing notified when a

Seite 144 - Scan Locations tab

c From the Create a new policy based on this existing policy list, select one of thesettings.d Type a new policy name.e Type any notes, if required.f

Seite 145

Finding product documentationMcAfee provides the information you need during each phase of product implementation, frominstalling to using and trouble

Seite 146 - Performance tab

2 Configure the alert policy tabs. Refer toAlert policy tab configuration.Alert policy tab configurationConfigurationTaskAlerts Policies 1 From the Ac

Seite 147 - DefinitionOption

VSE: Top 10 Threats per Threat CategoryVSE: Spyware Detected in the Last 24 HoursVSE: Top 10 Users with the Most DetectionsVSE: Spyware Detected in th

Seite 148 - ScriptScan tab

EXTRA.DAT file, packaged in a SuperDAT (SDAT) executable file, is made available by McAfeeLabs until the normal VirusScan Enterprise DAT update is rel

Seite 149 - User-Defined Detection tab

TaskFor option definitions, click ? in the interface.1 To install the SuperDAT file on an ePolicy Orchestrator server, use one of the following:Steps.

Seite 150 - Repositories tab

Part IV - Monitoring, Analyzing, andFine-Tuning Your ProtectionAfter the initial configuration of your protection strategy, you should monitor, analyz

Seite 151

• For Microsoft Windows XP, Microsoft Vista, Microsoft 2000 Server, Microsoft 2003 Server,and Microsoft 2008 Server — C:\Documents and Settings\All Us

Seite 152

• A table with similar information and a total of the threats.NOTE: You can click on the bar chart or table information to open the ePolicy Orchestrat

Seite 153 - Proxy settings tab

ePolicy Orchestrator 4.5 or 4.6This example analysis is used as a framework for analyzing most VirusScan Enterprise protectionscenarios with ePolicy O

Seite 154 - Mirror task

Threat Source IP Address and target are shown to help you determine what actionsto take.•• Threat Name and Threat Type describe what malware was used

Seite 155 - AutoUpdate task

AppendixThere are more configuration and troubleshooting features you can use to improve the protectionprovided by VirusScan Enterprise. These feature

Seite 156 - Schedule tab

Getting StartedUnderstanding the components of McAfee®VirusScan®Enterprise 8.8 software, and the orderyou should use to configure the software helps y

Seite 157

Before you beginYou must have Administrator privileges to update the ePolicy Orchestrator configuration.TaskFor option definitions, click ? in the int

Seite 158

Using the command line with VirusScan EnterpriseYou can use the Command Prompt to run some basic VirusScan Enterprise processes. You caninstall, confi

Seite 159

Definition with optionsCommand-linevalueCleans the detected target file when a potentially unwanted program is found.CLEANCleans the detected file whe

Seite 160 - Advanced schedule options

Definition with optionsCommand-linevaluePrompts the user for action when an unwanted program is detected and the primary actionhas failed.PROMPTA2Sets

Seite 161 - Global Scan Settings tab

Connecting to remote systemsYou can connect to remote systems with VirusScan Enterprise installed to perform operationssuch as modifying, scheduling s

Seite 162

WebImmune1 From the VirusScan Console, select Help | Submit a Sample to access the website. Thewebsite is located at: https://www.webimmune.net/defaul

Seite 163

DefinitionOptionReinstalls the VirusScan Enterprise program files.CAUTION: Hotfixes, Patches, and Service Packs might be overwritten.Reinstall all pro

Seite 164 - (continued)

2 From the On-Access Scanner Properties dialog box, click the Reports tab and click ViewLog. The OnAccessScanLog.txt file appears in a Notepad window.

Seite 165

• Download and install the tool from: http://mer.mcafee.com.NOTE: An ePolicy Orchestrator deployable version is also available. This version uses thee

Seite 166

3 Is the original system problem fixed by disabling Access Protection:• Yes — Go to the McAfee Technical Support ServicePortal at http://mysupport.mca

Kommentare zu diesen Handbüchern

Keine Kommentare