
DescriptionLog entry
Date2/10/2010
Time11:00AM
Action takenBlocked by Access Protection rule
CredentialsTestDomain\TestUser
Process name that breeched the ruleC:\Users\TestUser\Desktop\AnnoyMe.exe
Location the process tried to access\REGISTRY\MACHINE\SOFTWARE\Microsoft...
Access Protection rule that was triggeredPrevent programs registering to autorun
Similar information is available using ePolicy Orchestrator queries. For details, refer to
Access
queries and dashboards
.
Control access to the user interface
Setting security for the interface on client computers is an important part of protecting your
environment.
As an administrator, you can:
• Control the access users have to the VirusScan Enterprise interface.
• Set a password to prevent users from accessing or changing selected features.
• Lock and unlock the user interface as necessary.
Contents
How setting a password affects users
Configuring user interface security settings
How setting a password affects users
Set a user interface password to deter users with malicious intent.
When you password-protect the user interface on client computers, the following users are
affected:
• Non-administrators —
Users without administrator rights
. Non-administrators run all
VirusScan Enterprise applications in read-only mode. They can view some configuration
parameters, run saved scans, and run immediate scans and updates. They cannot change
any configuration parameters, create, delete, or modify saved scan or update tasks.
• Administrators —
Users with administrator rights
. Administrators must type the password
to access the protected tabs and controls in read/write mode. If a password is not provided
for a protected item, they view it in read-only mode.
Configuring user interface security settings
Use the General Options Policies user interface properties to configure the display and password
options available to the users.
CAUTION: Consider carefully the security ramifications before you make changes to these
properties. These options let you restrict or allow users to make changes to their security
configuration and could leave systems unprotected from numerous malware attacks.
Part I - Prevention: Avoiding Threats
Access protection
21McAfee VirusScan Enterprise 8.8 Product Guide
Kommentare zu diesen Handbüchern