Product guide

Index
A
access protection
disabling during troubleshooting 98
access violations 25
anti-virus and common rules 26
common rules 23
detections and actions 73
excluding processes 32
file and folder blocking rules 31
getting started 23
log report example 20
overview 19, 23
policies, overview 26
port blocking rules 31
preconfigured rules 23
protocols, restricting 25
registry blocking rules 32
removing unused rules 33, 34
standard and maximum protection 23
threat example 20
types of rules 23
user-defined rules 23, 25, 28, 29, 30
virtual machine protection 23
AccessProtectionLog.txt, activity log 84
Actions tab, VirusScan Enterprise
on-access scanning 58, 60
on-delivery email scanning 69, 71
on-demand scanning 66
actions, VirusScan Enterprise
access protection 73
access violations 25
buffer overflow detections 73
email scanning 75
on-access scanning 72, 74
on-demand scanning 66, 75
quarantined items 75
responding to a threat 80, 84
unwanted programs 73
activity logs, VirusScan Enterprise
access violations 25
email scanning and 69, 75
on-demand scanning and 66, 75
reviewing 74
unwanted programs 73
using 84
viewing 96
adware (See unwanted programs) 38
Alert Manager
access violations 25
configuring alerts 78
events 25
Alerts tab, VirusScan Enterprise
on-delivery email scanning 69, 71
alerts, VirusScan Enterprise
configuring 78
email scanning 69
on-access scanning 51
on-demand scanning 66
overview 78
All files option, VirusScan Enterprise 52
anti-spyware rules
configuring access protection 26
anti-virus rules
configuring access protection 26
preconfigured access protection 23
Artemis
heuristic network check for suspicions files 10
overview 53
VirusScan Enterprise component overview 10
audience for this guide 6
AutoUpdate
configuring 45
process overview 44
repositories, connecting to 44
repository list 47
requirements 44
strategies for VSE updates 43
B
bandwidth and updating strategies 43
best practices
removing EXTRA.DAT files from repositories 44
strategies for VSE updates 43
Blocking tab, VirusScan Enterprise
on-access scanning 54
buffer overflow protection
disabling during troubleshooting 98
alerts and notifications 78
blocking exploits 34
detections and actions 73
exploits, overview 35
BufferOverflowProtectionLog.txt, activity log 84
C
cache
configuring using ePolicy Orchestrator 4.0 68
configuring using ePolicy Orchestrator 4.5 or 4.6 67
configuring using the VirusScan Console 69
overview 67
cache, configuring 67
CATALOG.Z file
troubleshooting 101
encrypted update 44
client system, VirusScan Enterprise component 10
command line
on-demand scanning options 91
update task options 93
using it to configure the product 91
McAfee VirusScan Enterprise 8.8 Product Guide162