Product guide

Index
A
access protection 6, 13, 14, 15, 16, 17, 18, 45
about 6
access violations 14
anti-virus and common rules 16
common rules 13
detections and actions 45
excluding processes 18
file/folder blocking rules 17
getting started 13
port blocking rules 16
preconfigured rules 13
protocols, restricting 15
registry blocking rules 17
removing unused rules 18
standard and maximum protection 14
types of rules 14
user-defined rules 14, 15, 16
virtual machine protection 14
access protection, configuring 15
actions
unwanted programs 46
Actions tab, VirusScan Enterprise 37
actions, VirusScan Enterprise
access protection 45
access violations 14
buffer overflow detections 46
email scanning 48
on-access scanning 45, 47
on-demand scanning 37, 47
quarantined items 48
responding to a threat 44
activity logs
unwanted programs 46
activity logs, VirusScan Enterprise
access violations 14
buffer overflow reports 19
email scanning and 39, 48
on-access scanning 33
on-demand scanning and 37, 47
reviewing 47
adware (See unwanted programs) 21
Alert Manager
access violations 14
configuring alerts 43
events 15
alerts, VirusScan Enterprise
about 6
configuring 43
email scanning 39
on-demand scanning 37
overview 43
anti-virus rules
configuring access protection 16
anti-virus rules
(continued)
preconfigured access protection 13
AutoUpdate
process overview 24
repositories, connecting to 25
strategies for VSE updates 23
B
bandwidth
updating strategies and 23
best practices
removing EXTRA.DAT files from repositories 25
strategies for VSE updates 23
updating DAT files and engine 8
Blocking tab, VirusScan Enterprise 33
buffer overflow protection
about 6
configuring 19
detections and actions 46
exploits, overview 19
C
CATALOG.Z file, encrypted update 24
command line, using it to configure the product 52
common rules
access protection, configuring 16
preconfigured access protection 13
standard and maximum protection 14
configuring process settings 33
CPU usage
risk assignment and Windows Task Manager 31
D
dashboards
monitoring activity 44
predefined, accessing 44
DAT file updating
getting started 8
strategies 23
update tasks, about 24
DAT files
detection definitions 23
detections and defined actions 45
EXTRA.DAT files, updating 24
scheduling rollouts 23
script scanning and 30
deployment
scheduling VSE update tasks 23
detection definitions (See DAT files) 23
detections
access protection 45
actions in response to 45
buffer overflow 46
configuring general settings 33
61McAfee VirusScan Enterprise 8.7i