Product guide
DescriptionRule type
Three rule examples are:
• Prevent modification of McAfee files and settings.
• Protect Mozilla and Firefox files and settings, Internet Explorer settings, and network
settings.
• Prevent installation of Browser Helper Objects and automatically running programs
from the Temp folder.
These protection levels apply to common rules.
• Standard Protection
• Maximum Protection
These preconfigured rules prevent termination of VMWare processes and modification
of VMWare files. You can enable, disable, and change the configuration, but you cannot
delete these rules.
Virtual Machine
Protection
Rule examples are:
• Prevent termination of VMWAre Processes.
• Prevent modification of VMWare workstation, server, or virtual machine files.
These custom rules supplement the protection provided by the Anti-virus and
Common rules.
User-defined
If you installed the AntiSpyware Enterprise Module, you have additional rules to protect
you from spyware-related threats.
Anti-spyware
Rule examples are:
• Prevent Internet Explorer favorites and settings.
• Prevent programs from running and execution of scripts from the Temp folder.
Protection level descriptions
DescriptionProtection Level
Anti-virus and common rules that protect some critical settings and files from being
modified, but generally allow you to install and execute legitimate software.
Standard
Anti-virus and common rules that protect most critical settings and files from being
modified. This level provides more protection than Standard, but might prevent you
Maximum
from installing legitimate software. If you cannot install software, we recommend that
you disable the Access Protection feature first, then enable it again after installation.
Anti-virus rules that block destructive code from accessing the computer until a DAT
file is released. These rules are preconfigured to block access to shares during an
outbreak.
Outbreak control
Access point violations and how VirusScan
Enterprise responds
When an access point violations occur:
• Information is recorded in the log file if you selected the Report option for the rule that
detected the violation.
Protecting Your System Access Points
Access point violations and how VirusScan Enterprise responds
McAfee VirusScan Enterprise 8.7i14