User Guide

Default Vulnerable and Compressed File Extensions
268 McAfee VirusScan
Select one of the extensions shown, then click Remove to delete it
from the list.
•Click Default to restore the original extension entries. This removes
any extensions you have added to the list.
4. When you have finished changing the list, click OK to save your changes
and close the dialog box. Click Cancel to close the dialog box without
saving your changes.
Current list of vulnerable file name extensions
In this list, ? symbols represent wildcards—VirusScan software substitutes
any character for the ? so that it scans more than one file type with similar
extensions. For example, the software will use the .XL? wildcard to look for
viruses in Microsoft Excel spreadsheet (.XLS) and template (.XLT) files.
NOTE: McAfee VirusScan Software recommends that you scan your
system thoroughly during your first scan operation, or periodically
thereafter, without limiting the scope of the scan operation to these file
types. This ensures that your system starts in a virus-free condition. You
can then use this list of extensions to limit the scope of later scan
operations.
Table 10-1. Vulnerable file name extensions
Extension File Type File Description
<BLANK> Any Files with no extension.
.??_ Compressed Windows compressed files.
.ARC Macro/script LH ARC files, older version
.ARJ Archive Robert Jung .ARJ compressed archive files.
.ASP Macro/script Microsoft Active Server Pages files. These files
contain script commands for use with Microsoft
Internet Information Server.
.BAT Program DOS batch files.
.CAB Compressed Windows Compressed Application Binary or
"cabinet" files.
.CDR Macro Corel Draw document file. Later versions of
Corel Draw include a scripting language that can
generate macro viruses.
.CLA Program Java class files (truncated from .CLASS)