User Guide
Index
User’s Guide 305
encrypted viruses, xi
Enterprise SecureCast
, 281
features of
, 282
setting up
, 293
support resources for
, 293
system requirements for
, 283
troubleshooting
, 293
unsubscribing from
, 293
Eudora and Eudora Pro
as e-mail clients supported in
VShield
, 84
Excel files, as agents for virus
transmission
, xii
Exchange
as e-mail client supported in VShield
, 84
exclusion options, choosing
for System Scan module
, 108 to 111
for VirusScan in Console
, 216 to 219
executable programs
as agents for virus transmission
, x
extensions, use of to identify scan targets
, 268
F
false detections, understanding, 58
file information, viewing
, 68 to 70
File menu
View Activity Log
, 216
file name extensions
use of to identify vulnerable files
, 268
file-infecting viruses
definition and behavior of
, x
setting heuristic scanning options
for
, 99 to 100, 115, 128 to 129, 207, 228,
242
files
choosing as scan targets
, 205 to 206,
228 to 230, 240 to 242
infected
cleaning
, 101 to 104, 117 to 119, 130,
132, 210to 211, 230 to 232
cleaning by yourself when VirusScan
cannot
, 55
deleting
, 101 to 104, 117 to 119, 130,
132, 210to 211, 230 to 232
moving
, 101 to 104, 117 to 119, 130,
132, 210to 211, 230 to 232
MAILSCAN.TXT, as E-Mail program
component log
, 236
SCREENSCAN ACTIVITY LOG.TXT, as
ScreenScan log
, 245
VSCLOG.TXT, as VirusScan
log
, 213 to 237
VSHLOG.TXT, as VShield log
, 106 to 107
WEBEMAIL.TXT, as VShield log
, 123
WEBFLTR.TXT, as VShield
log
, 144 to 145
WEBINET.TXT, as VirusScan log
, 133
floppy disks
role in spreading viruses
, ix to x
folders
choosing as scan targets
, 205 to 228,
240 to 242
H
Help
opening from the Console
, 191
Help Topics
in Help menu
, 191
heuristic scanning
definition of
, 21, 99 to 100, 115, 128 to 129,
207, 228, 242
history of viruses
, vii to xiv