Product guide

ePolicy Orchestrator 4.5 or 4.6
This example analysis is used as a framework for analyzing most VirusScan Enterprise protection
scenarios with ePolicy Orchestrator 4.5 or 4.6.
Before you begin
You must have direct or remote access to a VirusScan Enterprise protected system to perform
this example analysis.
Task
For option definitions, click ? in the interface.
1 Determine where and when the attacks occurred:
a Click Menu | Reporting | Queries to open the Queries pane.
b Type Malware in the Quick find search and click Apply. The Malware Detection History
query appears in the Queries list.
c Select the query and click Actions | Run. The query returns the number of recent
attacks.
2 To determine which malware was used in the attack, click Menu | Reporting | Threat
Event Log to display the Threat Event Log.
3 Double-click the log event to display the details page in the pane. From the log event you
can determine:
Threat Source IP Address and target are shown to help you determine what actions
to take.
Threat Name and Threat Type describe what malware was used in the attack.
Threat Event Descriptions describe how the attack affected the system and what
actions were taken on the threat.
ePolicy Orchestrator 4.0
This example analysis is used as a framework for analyzing most VirusScan Enterprise protection
scenarios with ePolicy Orchestrator 4.0.
Before you begin
You must have direct or remote access to a VirusScan Enterprise protected system to perform
this example analysis.
Task
For option definitions, click ? in the interface.
1 Determine where and when the attacks occurred:
a Click Reporting | Queries to open the Queries list.
b From the Public Queries list, select ePO: Malware Detection History and click More
Actions | Run. The Malware Detection History query appears in the Queries list.
2 To view the event that triggered the malware detection, click Reporting | Event Log,
the query returns the number of recent attacks.
3 Double-click the log event to display the details page in the pane. From the log event you
can determine:
Part IV - Monitoring, Analyzing, and Fine-Tuning Your Protection
Analyzing your protection
87McAfee VirusScan Enterprise 8.8 Product Guide