Product guide
Module, you have additional rules to protect you from potentially unwanted spyware-related
threats.
• Buffer Overflow Protection — Prevent exploited buffer overflows from executing arbitrary
code on your computer.
• Unwanted Program Protection — Eliminate potentially unwanted programs such as spyware
and adware from your computer.
Detection
Develop an effective strategy to detect intrusions when they occur. Configure these features
to detect threats:
• Update Task — Get automatic updates of detection definitions and scanning engine from
the McAfee download website.
• On-Access Scanning — Detect potential threats from any possible source as files are read
from or written to disk. If you installed the AntiSpyware Enterprise Module, you can also
scan for potentially unwanted cookies in the cookies folder.
• On-Demand Scan Tasks — Detect potential threats using immediate and scheduled scan
tasks. If you installed the AntiSpyware Enterprise Module, you can also scan for potentially
unwanted cookies and spyware-related registry entries that were not previously cleaned.
• On-Delivery and On-Demand Email Scanning — Detect potential threats on Microsoft Outlook
email clients using on-delivery scanning of messages, attachments, and public folders. Detect
potential threats on Lotus Notes email clients when messages are accessed.
• Quarantine Manager Policy — Specify the quarantine location and the length of time to keep
quarantined items. Restore quarantined items as necessary.
Notification
Alerts and Notifications — Configure alerts to notify you when detections occur.
Response
Use product log files, automatic actions, and other notification features to decide the best way
to handle detections.
• Log files — Monitor product log files to view a history of detected items.
• Queries and Dashboards — Use ePolicy Orchestrator queries and dashboards to monitor
scanning activity and detections.
• Actions — Configure features to take action on detections.
Supplemental Information
Refer to these topics for additional information:
• Accessing user interface options — Access the standalone version of the product in a number
of ways.
• Adding and Excluding Scan Items — Fine-tune the list of file types scanned for each of the
scanners.
• Scheduling tasks — Schedule on-demand scan, update, and mirror tasks to run at specific
dates and times, or intervals.
• Configuring command-line options — Configure on-demand scan and update tasks from the
command line.
Introducing VirusScan Enterprise
Using VirusScan Enterprise
7McAfee VirusScan Enterprise 8.7i