Product guide

a Click New Policy to open New Policy dialog box.
b From the Create a new policy based on this existing policy list, select one of the
settings.
c Type a new policy name.
d Click OK. The new policy appears in the list of existing policies.
3 From the Settings for list, select Workstation or Server.
4 Select the User-defined Rules category in the left pane, then click New to open the
Select the new rule type dialog box.
5 Select the rule type and click OK. Refer to
Types of user-defined rules
for details.
The access rule dialog box that appears depends on the rule type selected.
6 Configure these access rule details.
Network Port Access Protection Rule — Refer to the options table in
Port blocking
rule options
.
File/Folder Access Protection Rule — Refer to the options table in
File and folder
blocking rule options
.
Registry Access Protection Rule — Refer to the options table in
Registry blocking
rule options
.
NOTE: To configure which processes to include and exclude, refer to
Include or exclude
specific process options
.
7 Click OK.
The new user-defined rule appears in the right-hand pane under Block/Report/Rules. To
modify the new rule, select it and click Edit.
VirusScan Console
From the Access Protection properties, configure the user-defined access-protection rules.
Task
For option definitions, click ? in the interface.
1 From the Task list, right-click Access Protection, then click Properties to open the
dialog box.
2 Select the User-defined Rules category in the left pane, then click New to open the
Select New Type Rule dialog box.
3 Select the rule type and click OK. Refer to
Types of user-defined rules
for details.
The access rule dialog box that appears depends on the rule type selected.
4 Configure these access rule details.
Network Port Access Protection Rule — Refer to the options table in
Port blocking
rule options
.
File/Folder Access Protection Rule — Refer to the options table in
File and folder
blocking rule options
.
Registry Access Protection Rule — Refer to the options table in
Registry blocking
rule options
.
NOTE: To configure which processes to include and exclude, refer to
Include or exclude
specific process options
.
Part I - Prevention: Avoiding Threats
Protecting your system access points
McAfee VirusScan Enterprise 8.8 Product Guide30