Product guide
• Large-size files — Files that are larger in size should be scanned using on-demand scanning
because it requires more system resources. This is evident in an ICAP on-access scanning
solution, where the entire file must be copied to the scanner before the scan is initiated.
McAfee recommends that you schedule an on-demand scan to scan these files.
Scanning these files with the on-access scanning solution increases the frequency of scan
timeout. If the filer is set to deny access to files that were not scanned, sometimes users are
denied access to files.
What are the dependencies that exist for VirusScan Enterprise for Storage and what are
the impacts?
VirusScan Enterprise for Storage uses the black-box approach to manage dependencies because
it is not a server or network management suite. If you encounter any dependency issues when
VirusScan Enterprise for Storage functions as expected, contact respective vendors, in addition
to McAfee support.
For more information on dependency stack, contact McAfee support.
Is NetApp scanning configuration complicated?
The NetApp ONTAP design involves these protocols with their dependencies:
• Active Directory • NetBIOS over TCP/IP
• CIFS/SMB • RPC
• Named Pipes
These designs choices:
• Confer certain benefits over other designs such as ICAP.
• Require comprehensive prerequisites that must be met by the operating system and
VirusScan Enterprise for Storage product.
• Require that the vendor scanner server meets the mandatory prerequisites for VirusScan
Enterprise for Storage and all NetApp mandatory prerequisites.
Why are read-only filer volumes not supported?
Any volume on a NetApp filer that has read-only permission (For example, SnapMirror volume
or, a Snapshot volume) should be excluded from VirusScan Enterprise for Storage on-access
scanning.
For more information, see McAfee KnowledgeBase article KB60568.
What is the importance of the scan thread configuration and how does it affect the scanner
count?
Consider a scenario where you have Y number of physical filers and Z number of discrete filer IP
addresses that send scan requests.
To deploy ICAP as 2 X Y scanners, you must configure each scanner's ICAP scan thread count as
20 X Z threads.
**
** The value must be provided by the filer vendor based on how many outstanding scan
requests the filer’s operating system issues from the discrete filer IP address.
A
Frequently asked questions
32
McAfee VirusScan Enterprise for Storage 1.1.0 Product Guide