McAfee VIRUSSCAN ENTERPRISE Betriebsanweisung Seite 11

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 166
  • Inhaltsverzeichnis
  • FEHLERBEHEBUNG
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 10
McAfee Headquarters
McAfee Headquarters, home to McAfee Labs and McAfee Technical Support, provides the
following VirusScan Enterprise services:
DAT updates Stored on a McAfee central database server, and using AutoUpdate, these
DAT update files are copied to the VirusScan Enterprise clients or optional DAT repositories
to provide information to fight known threats and new lists of known viruses as they are
found in real time.
Scan engine updates — Stored on a central database server, scan engine updates are
downloaded as needed to keep the VirusScan Enterprise scan engine up-to-date.
McAfee Labs — This threat library has detailed information on virus, Trojan, hoax, and
potentially unwanted program (PUP) threats where they come from, how they infect your
system, and how to handle them. The Artemis feature sends the fingerprint of the suspicious
file to McAfee Labs, where they analyze the file and determine what action to take.
Server
The optional server uses the following components to manage and update many client systems
remotely:
ePolicy Orchestrator — Centrally manages and enforces VirusScan Enterprise policies,
then uses queries and dashboards to track activity and detections.
NOTE: This document addresses using ePolicy Orchestrator 4.0, 4.5, and 4.6. For information
about ePolicy Orchestrator, see the product documentation for your version.
DAT repository Retrieves the DAT updates from the McAfee download site. From there,
DAT files can be replicated throughout your organization, providing access for all other
computers. This minimizes the amount of data transferred across your network by automating
the process of copying updated files to your share sites.
The importance of creating a security strategy
Protecting your client systems from viruses, worms, and Trojan files using VirusScan Enterprise
requires a well-planned strategy: defining threat prevention and detection, response to threats,
and ongoing analysis and tuning.
Prevention avoiding threats
Define your security needs to ensure that all of your data sources are protected, then develop
an effective strategy to stop intrusions before they gain access to your environment. Configure
these features to prevent intrusions:
User Interface Security — Set display and password protection to control access to the
VirusScan Enterprise user interface.
Access Protection — Use access protection rules to protect your computer from undesirable
behavior with respect to files, registry, and ports.
Buffer Overflow Protection — Prevent abnormal programs or threats from overrunning the
buffer's boundary and overwriting adjacent memory while writing data to a buffer. These
exploited buffer overflows can execute arbitrary code on your computer.
Unwanted Program Protection— Eliminate potentially unwanted programs such as spyware
and adware from your computer.
Getting Started
The importance of creating a security strategy
11McAfee VirusScan Enterprise 8.8 Product Guide
Seitenansicht 10
1 2 ... 6 7 8 9 10 11 12 13 14 15 16 ... 165 166

Kommentare zu diesen Handbüchern

Keine Kommentare