Using VirusScan Enterprise

Use the VirusScan Enterprise software to protect your environment from potential threats.

When installed, VirusScan Enterprise is configured to use the detection definition (DAT) file that was packaged with the product and provide general security for your environment. We recommend that you define the policies and needs of your environment and configure the product accordingly, then update the product’s detection definitions before you begin using the product or deploy it to client computers.

Each VirusScan Enterprise component or feature plays a part in protecting your environment.

Prevention

Define your security needs to ensure that all of your data sources are protected, then develop an effective strategy to stop intrusions before they gain access to your environment. Configure these features to prevent intrusions:
  • User Interface Security — Set display and password protection to control access to the user interface.
  • Access Protection — Use access protection rules to protect your computer from undesirable behavior with respect to files, registry, and ports. If you installed the AntiSpyware Enterprise Module, you have additional rules to protect you from potentially unwanted spyware-related threats.
  • Buffer Overflow Protection — Prevent exploited buffer overflows from executing arbitrary code on your computer.
  • Unwanted Program Protection — Eliminate potentially unwanted programs such as spyware and adware from your computer.

Detection

Develop an effective strategy to detect intrusions when they occur. Configure these features to detect threats:
  • Update Task — Get automatic updates of detection definitions and scanning engine from the McAfee download website.
  • On-Access Scanning — Detect potential threats from any possible source as files are read from or written to disk. If you installed the AntiSpyware Enterprise Module, you can also scan for potentially unwanted cookies in the cookies folder.
  • On-Demand Scan Tasks — Detect potential threats using immediate and scheduled scan tasks. If you installed the AntiSpyware Enterprise Module, you can also scan for potentially unwanted cookies and spyware-related registry entries that were not previously cleaned.
  • On-Delivery and On-Demand Email Scanning — Detect potential threats on Microsoft Outlook email clients using on-delivery scanning of messages, attachments, and public folders. Detect potential threats on Lotus Notes email clients when messages are accessed.
  • Quarantine Manager Policy — Specify the quarantine location and the length of time to keep quarantined items. Restore quarantined items as necessary.

Notification

Alerts and Notifications — Configure alerts to notify you when detections occur.

Response

Use product log files, automatic actions, and other notification features to decide the best way to handle detections.
  • Log files — Monitor product log files to view a history of detected items.

  • Queries and Dashboards — Use ePolicy Orchestrator queries and dashboards to monitor scanning activity and detections.
  • Actions — Configure features to take action on detections.

Supplemental Information

Refer to these topics for additional information:


  • Accessing user interface options — Access the standalone version of the product in a number of ways.

  • Adding and Excluding Scan Items — Fine-tune the list of file types scanned for each of the scanners.
  • Scheduling tasks — Schedule on-demand scan, update, and mirror tasks to run at specific dates and times, or intervals.

  • Configuring command-line options — Configure on-demand scan and update tasks from the command line.

  • Connecting to remote system — Connect to remote systems with VirusScan Enterprise installed to perform actions such as modify and schedule scanning or update tasks or to enable and disable the on-access scanner.

  • Submitting threat samples for analysis — Submit samples of undetected potential threats to Avert Labs through WebImmune.

  • Accessing the Avert Labs Threat Library — Access the information in the Avert Labs Threat Library.

  • Troubleshooting — Get information about how to repair the product installation and frequently asked questions.