Product guide

common rules
access protection, configuring 26
preconfigured access protection 23
standard and maximum protection 23
comon protection rules
configuring access protection 26
components
illustration 10
of VirusScan Enterprise 10
VirusScan Console 13
conventions used in this guide 6
D
dashboards
monitoring activity 80, 84
predefined, accessing 80
DAT files
detection definitions 43
detections and defined actions 72
EXTRA.DAT files, updating 44
overview 42
rolling back, configuring 48
rolling back, overview 48
scheduling rollouts 43
script scanning and 53
update tasks, about 44
updating importance 43
updating strategies 43
VirusScan Enterprise component overview 10
DAT repository
VirusScan Enterprise component overview 10
Default + additional file types option, VirusScan Enterprise 52
Defer at most option, VirusScan Enterprise 64
deployment
scheduling VSE update tasks 43
update requirements 44
detections
access protection 73
actions in response to 72
buffer overflow 73
email scanning 69, 75
on-access scanning 74
on-demand scanning 66, 75
responding to 80, 84
dialers (See unwanted programs) 38
documentation
organization 7
typographical conventions 6
documentation for products, finding 8
E
email scanning
configuring 69
detections and actions 75
unwanted programs, enabling using ePolicy Orchestrator 4.0 41
unwanted programs, enabling using ePolicy Orchestrator 4.5 or
4.6 40
unwanted programs, enabling using the VirusScan Console 42
unwanted programs, overview 40
emergency DATs
overview 81
engine updating
AutoUpdate, process overview 44
importance 43
strategies 43
ePolicy Orchestrator
retrieving DAT files 42
versions supported 9
server tasks, configuring example 89
server tasks, overview 89
VirusScan Enterprise component 10
ePolicy Orchestrator 4.0
accessing queries and dashboards 80
analyzing threat protection example 87
configuring AutoUpdate task 45
configuring mirror task 46
configuring on-demand scan tasks 65
ePolicy Orchestrator 4.5 and 4.6
accessing queries and dashboards 80
analyzing threat protection example 87
configuring AutoUpdate task 45
configuring mirror task 46
configuring on-demand scan tasks 64
events, VirusScan Enterprise
access violations 25
Alert Manager 25
exclusions
identifying processes for 73
on-demand scanning 66
unwanted programs 38, 39
using wildcards to specify scan items 49
what to exclude 49
Exclusions tab, VirusScan Enterprise
on-access scanning 58, 60
on-demand scanning 66
EXTRA.DAT files (See emergency DATs 44
EXTRA.DAT files (See emergency DATs) 81
F
false positives
creating exclusions to reduce 73
file type extensions
what to exclude 49
files and folders
blocking options 31
restricting access 25
frequently asked questions 101
G
General tab, VirusScan Enterprise
on-access scanning 54
Global Scan Settings option, VirusScan Enterprise 67
H
heuristics to check for suspicious files (See Artemis) 53
high-risk processes
configuring VirusScan Enterprise 54
settings 54
I
icons, system tray 14
K
KnowledgeBase, Technical Support ServicePortal 8
Index
163McAfee VirusScan Enterprise 8.8 Product Guide