Product guide

Introducing VirusScan Enterprise
VirusScan Enterprise offers easily scalable protection, fast performance, and mobile design to
protect your environment from viruses, worms, and Trojan horses. It also protects your system
from access point violations, exploited buffer overflows, and potentially unwanted code and
programs. It detects threats, then takes the actions you configured to protect your environment.
See the VirusScan Enterprise Release Notes for information about what’s new in this release.
This guide describes how to configure and use VirusScan Enterprise.
You can configure VirusScan Enterprise as a standalone product or you can use ePolicy
Orchestrator versions 3.6.1 and 4.0 to centrally manage and enforce VirusScan Enterprise
policies, then use queries and dashboards to track activity and detections.
NOTE: This document addresses using ePolicy Orchestrator 4.0. For information about using
either version of ePolicy Orchestrator, see its product documentation.
Contents
Using VirusScan Enterprise
Getting started
What to do first
Where to find product information
Using VirusScan Enterprise
Use the VirusScan Enterprise software to protect your environment from potential threats.
When installed, VirusScan Enterprise is configured to use the detection definition (DAT) file that
was packaged with the product and provide general security for your environment. We
recommend that you define the policies and needs of your environment and configure the
product accordingly, then update the product’s detection definitions before you begin using the
product or deploy it to client computers.
Each VirusScan Enterprise component or feature plays a part in protecting your environment.
Prevention
Define your security needs to ensure that all of your data sources are protected, then develop
an effective strategy to stop intrusions before they gain access to your environment. Configure
these features to prevent intrusions:
User Interface Security — Set display and password protection to control access to the user
interface.
Access Protection — Use access protection rules to protect your computer from undesirable
behavior with respect to files, registry, and ports. If you installed the AntiSpyware Enterprise
McAfee VirusScan Enterprise 8.7i6