Use the VirusScan Enterprise software to protect
your environment from potential threats.
When installed, VirusScan Enterprise is configured
to use the detection definition (DAT) file that was packaged with
the product and provide general security for your environment. We
recommend that you define the policies and needs of your
environment and configure the product accordingly, then update the
product’s detection definitions before you begin using the product
or deploy it to client computers.
Each VirusScan Enterprise component or feature
plays a part in protecting your environment.
Define your security needs to ensure that all of
your data sources are protected, then develop an effective strategy
to stop intrusions before they gain access to your environment.
Configure these features to prevent intrusions:
Interface Security — Set display and password protection to control
access to the user interface.
- Access Protection — Use access protection rules to protect your
computer from undesirable behavior with respect to files, registry,
and ports. If you installed the AntiSpyware Enterprise
Module, you have additional rules to protect you from
potentially unwanted spyware-related threats.
Overflow Protection — Prevent exploited buffer overflows from
executing arbitrary code on your computer.
Program Protection — Eliminate potentially unwanted programs such
as spyware and adware from your computer.
Develop an effective strategy to detect intrusions
when they occur. Configure these features to detect threats:
Task — Get automatic updates of detection definitions and scanning
engine from the McAfee download website.
Scanning — Detect potential threats from any possible source as
files are read from or written to disk. If you installed the
AntiSpyware Enterprise Module, you can also scan for
potentially unwanted cookies in the cookies folder.
Scan Tasks — Detect potential threats using immediate and scheduled
scan tasks. If you installed the AntiSpyware Enterprise
Module, you can also scan for potentially unwanted cookies
and spyware-related registry entries that were not previously
- On-Delivery and On-Demand Email Scanning — Detect potential
threats on Microsoft Outlook email clients using on-delivery
scanning of messages, attachments, and public folders. Detect
potential threats on Lotus Notes email clients when messages are
Manager Policy — Specify the quarantine location and the length of
time to keep quarantined items. Restore quarantined items as
Alerts and Notifications — Configure alerts to notify you when
Use product log files, automatic actions, and other
notification features to decide the best way to handle
Refer to these topics for additional information:
Accessing user interface options — Access the standalone version
of the product in a number of ways.
- Adding and Excluding Scan Items — Fine-tune the list of file
types scanned for each of the scanners.
Scheduling tasks — Schedule on-demand scan, update, and mirror
tasks to run at specific dates and times, or intervals.
Configuring command-line options — Configure on-demand scan and
update tasks from the command line.
Connecting to remote system — Connect to remote systems with
VirusScan Enterprise installed to perform actions such
as modify and schedule scanning or update tasks or to enable and
disable the on-access scanner.
Submitting threat samples for analysis — Submit samples of
undetected potential threats to Avert Labs through WebImmune.
Accessing the Avert Labs Threat Library — Access the information
in the Avert Labs Threat Library.
Troubleshooting — Get information about how to repair the
product installation and frequently asked questions.