McAfee VirusScan Enterprise Help
Documentation Home
Introducing VirusScan Enterprise
Using VirusScan Enterprise
Getting started
What to do first
Where to find product information
Controlling Access to the User Interface
How setting a password affects users
Configuring user interface security settings
Protecting Your System Access Points
How access protection rules are defined
Access point violations and how VirusScan Enterprise responds
Types of user-defined rules
Configuring access protection settings
Configuring anti-virus and common rules
Configuring user-defined rules
Configuring port blocking rules
Configuring file/folder blocking rules
Configuring registry blocking rules
Including or excluding specific processes
Removing user-defined rules
Blocking Buffer Overflow Exploits
How buffer overflow exploits are defined
Configuring buffer overflow protection
Restricting Potentially Unwanted Programs
How potentially unwanted programs are defined
Configuring the unwanted programs policy
Updating Detection Definitions
How an update strategy is determined
Update tasks and how they work
Configuring the AutoUpdate task
Mirror tasks and how they work
Configuring the mirror task
How the AutoUpdate repository works
Configuring the repository list
How rolling back DAT files works
Rolling back DAT files
Scanning Items On-Access
On-access scanning and how it works
Scanning comparison: writing to disk vs. reading from disk
Scanning comparison: scanning all files vs. scanning default + additional file types
Script scanning and how it works
Determining the number of scanning policies
Determining which risk to assign to a process
How general and process settings are configured
Configuring general settings
Configuring process settings
Scanning Items On-Demand
On-demand scanning methods and how they are defined
How scanning of remote storage works
How scan deferral works
How heuristic network check for suspicious files works
How system utilization works
Configuring on-demand scan tasks
Scanning Email On-Delivery and On-Demand
How heuristic network check for suspicious files works
Configuring email scan properties
Defining the Quarantine Policy
Configuring the quarantine policy and restoring items
Configuring Alerts and Notifications
Configuring alerts
Accessing Queries and Dashboards
Responding to Detections
How actions are taken on detections
System access point violations
Buffer overflow detections
Unwanted program detections
On-access scan detections
On-demand scan detections
Email scan detections
Quarantined items
Supplemental Information
Accessing user interface options
VirusScan Console and how it works
Using right-click features
System tray icon and how it works
Start menu and how it works with VirusScan Enterprise
Command line and using it to configure VirusScan Enterprise
Adding and excluding scan items
Specifying scan items
Specifying exclusions
Using wildcards to specify scan items
Scheduling tasks
Configuring the task schedule
Configuring command-line options
Configuring on-demand scanning command-line options
Configuring update task command-line options
Connecting to remote systems
Accessing remote systems with VirusScan Enterprise installed
Submitting threat samples for analysis
Accessing the Avert Labs Threat Library
Troubleshooting
Repairing the product installation
Frequently asked questions
McAfee VirusScan Enterprise for Offline Virtual Images 2.0
McAfee VirusScan Enterprise for Offline Virtual Images 1.0
McAfee VirusScan Enterprise for Storage 1.0
McAfee VirusScan Enterprise for use with the SAP NetWeaver platform 1.0
Documentation Home
English-to-Russian translation