Product guide
2 Configure the alert policy tabs. Refer to
Alert policy tab configuration
.
Alert policy tab configuration
ConfigurationTask
Alerts Policies 1 From the Actions column, select Edit Settings to open the Alerts Policies
page.
2 Configure the Components that generate alerts and Alert Manager
options.
Buffer Overflow Protection
Policies
1 From the Actions column, select Edit Settings to open the Buffer Overflow
Protection page.
2 Next to Client system warning, click Show the messages dialog box
when a buffer overflow is detected.
On-Delivery Email Scan
Policies
1 From the Actions column, select Edit Settings to open the Buffer On-Delivery
Email Scan Policies page.
2 Click Alerts and configure Email alert for user and Prompt for action
message.
Access queries and dashboards
Use queries and dashboards to monitor activity and help you determine which action to take
on detections. You can use the predefined queries and dashboards, and create additional ones
to meet your needs. For information about queries and dashboards, see the ePolicy Orchestrator
product documentation.
Queries
Depending on your ePolicy Orchestrator version, navigate to the Queries using:
ePolicy Orchestrator 4.5 and 4.6
1 Click Menu | Reporting | Queries and the Queries page appears.
2 In the Queries pane, type VSE: in Quick find and click Apply. Only the VirusScan Enterprise
queries appear in the list.
ePolicy Orchestrator 4.0
1 Click Reporting | Queries and the Queries page appears.
2 In the Queries list, in the right-hand pane, scroll down to find the queries beginning with
"VSE:".
These predefined queries are available:
VSE: Threats Detected Over the Previous 2 QuartersVSE: Compliance Over the Last 30 Days
VSE: Threats Detected per WeekVSE: Computers with Threats Detected per Week
VSE: Top 10 Access Protection Rules BrokenVSE: Current DAT Adoption
VSE: Top 10 Buffer Overflows DetectedVSE: DAT Adoption Over the Last 24 Hours
VSE: Top 10 Computers with the Most DetectionsVSE: DAT Deployment
VSE: Top 10 Detected ThreatsVSE: Detection Response Summary
VSE: Top 10 Threat SourcesVSE: Number of Detections by Tag
Part III - Response: Handling Threats
Access queries and dashboards
McAfee VirusScan Enterprise 8.8 Product Guide80