Product guide
In... Define...
Scanning
• Enable Scanning — Enable or disable scanning.
File types to
scan
• All files — Scans all files.
• Default + specified file types — Scans default and specified files.
You can add more file types by typing the file extensions separated by spaces.
• Include files with no extension — Scans files that do not contain an extension.
• Also scan for macros in all files — Scans for macros added in the file.
• Specified file types only — Scans only files you specify.
You can add more file types by typing the file extensions separated by spaces.
• Include files with no extension — Scans files that do not contain an extension.
Options
• Detect unwanted programs — Scans for unwanted programs installed on the server.
• Decode MIME encoded files — Decodes the MIME encoded files.
• Scan inside archives (e.g. .ZIP) and compressed executables — Scans the compressed and
archived executable file for threats.
Heuristics
• Find unknown unwanted programs and Trojans — Scans for unwanted programs and Trojans
on the server.
• Find unknown macro threats — Scans for unknown macro threats.
6
On the Performance tab, configure the scanning duration options to improve performance.
In... Define...
Maximum scan time (seconds)
• Maximum scan time (seconds) — Sets the maximum time in seconds for
scanning a file.
Number of anti-virus scan threads
• Number of anti-virus scan threads — Sets the maximum number of scan
threads.
7
On the Actions tab, define the primary and secondary action to perform when a threat is detected:
In... Define...
When a threat is
found
• In Perform this action first,
• Cleans File Automatically — Cleans the item that contains a threat then Continue
Scanning as secondary action.
• Continue Scanning — Continues scanning without taking any action when a
threat is found.
If the first action fails, then perform this action — Select the next action you want the
scanner to take if the first action fails. .
• Continue Scanning — Continue scanning when a threatened file is detected.
When an unwanted
program is found
• In Perform this action first,
• Cleans File Automatically — Cleans the item that contains threat then Continue
Scanning as secondary action.
• Continue Scanning — Continues scanning without taking any action when a
threat is found.
Manage the software from ePolicy Orchestrator
Create an ICAP server scan policy
4
McAfee VirusScan Enterprise for Storage 1.1.0 Product Guide
29