Product guide
Task
For option definitions, click ? or Help in the interface.
1 Click Systems | Policy Catalog, then from the Product list select VirusScan Enterprise
8.8.0. The Category list displays the policy categories for VirusScan Enterprise 8.8.0.
2 Edit an existing policy or create a new policy:
Edit an existing policy
a From the Category list, select the policy category.
b From the Actions column, click Edit to open the policy configuration page.
Create a new policy
a Click New Policy to open New Policy dialog box.
b From the Create a new policy based on this existing policy list, select one of the
settings.
c Type a new policy name.
d Click OK. The new policy appears in the list of existing policies.
3 From the Settings for list, select Workstation or Server.
4 Select the User-defined Rules category in the left pane, then select the rule you want
to remove in the right pane.
5 Click Delete.
NOTE: To disable a rule without deleting it, deselect the Block and Report actions. You
can enable the rule again if necessary.
VirusScan Console
From the Access Protection properties, remove rules that you created but no longer use.
Remove the user-defined rules using one of these user interface consoles.
Task
For option definitions, click ? or Help in the interface.
1 From the Task list, right-click Access Protection, then click Properties to open the
dialog box.
2 Select the User-defined Rules category in the left pane, then select the rule you want
to remove in the right pane.
3 Click Delete.
NOTE: To disable a rule without deleting it, deselect the Block and Report actions. You
can enable the rule again if necessary.
Blocking buffer overflow exploits
Buffer overflow protection prevents exploited buffer overflows from executing arbitrary code
on your computer. It monitors user-mode API calls and recognizes when they are called as a
result of a buffer overflow.
When a detection occurs, information is recorded in the activity log and displayed in the
On-Access Scan Messages dialog box, if you configured those options to do so.
Part I - Prevention: Avoiding Threats
Blocking buffer overflow exploits
McAfee VirusScan Enterprise 8.8 Product Guide34