Product guide
Scan Items tab
Configure detection options. If you are configuring different scanning policies for default, low-risk,
and high-risk processes, the options on this tab must be configured for each process type.
Option definitions
DefinitionOption
Select Workstation or Server from the drop-down list.
NOTE: This option is only available via ePolicy Orchestrator.
Settings for
Scan files • When writing to disk — Scan all files as they are written to or modified
on the computer or other data storage device.
CAUTION: Failure to enable When writing to disk leaves your system
unprotected from numerous malware attacks.
If you are copying or moving files from one computer to another, it is
important that all computers be configured identically so that a file with
a potential threat can’t be copied from or written to a computer.
• When reading from disk — Scan all files as they are read from the
computer or other data storage device.
CAUTION: Failure to enable When reading from disk leaves your system
unprotected from numerous malware attacks.
• On network drives — Scan resources on mapped network drives.
Scanning network resources might affect performance.
• Opened for backup — Examine files that are open for backup operations.
File types to scan • All files — Scan all files regardless of extension.
CAUTION: Failure to enable All files leaves your system unprotected from
numerous malware attacks.
• Default + additional file types — Scan the default list of extensions
plus any additions you specify. The default list is defined by the current
DAT file.
Also scan for macros in all files — If you selected this optopn, you
can also search for known macro threats in all files.
• Specified file types only — Create a list of user-specified extensions to
be scanned. You can also remove any extensions you added previously.
Select this option, then enter file extensions separated by spaces in the
text box.
Artemis (Heuristic network check
for suspicious files)
• Find unknown program threats and Trojans — Use Artemis scanning
to detect executable files that have code resembling malware.
• Find unknown macro threats — Use Artemis scanning to detect
unknown macro viruses.
CAUTION: Failure to enable Artemis leaves your system unprotected from
numerous malware attacks.
McAfee VirusScan Enterprise 8.8 Product Guide128










