McAfee VIRUSSCAN ENTERPRISE Product guide

McAfee VirusScan Enterprise 8.8 software
Product Guide
COPYRIGHT
Copyright © 2010 McAfee, Inc. All Rights Reserved.
No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form
or by any means without the written permission of McAfee, Inc., or its suppliers or affiliate companies.
TRADEMARK ATTRIBUTIONS
AVERT, EPO, EPOLICY ORCHESTRATOR, FOUNDSTONE, GROUPSHIELD, INTRUSHIELD, LINUXSHIELD, MAX (MCAFEE SECURITYALLIANCE
EXCHANGE), MCAFEE, NETSHIELD, PORTALSHIELD, PREVENTSYS, SECURITYALLIANCE, SITEADVISOR, TOTAL PROTECTION, VIRUSSCAN,
WEBSHIELD are registered trademarks or trademarks of McAfee, Inc. and/or its affiliates in the US and/or other countries. McAfee Red in
connection with security is distinctive of McAfee brand products. All other registered and unregistered trademarks herein are the sole property
of their respective owners.
LICENSE INFORMATION
License Agreement
NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED,
WHICH SETS FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH
TYPE OF LICENSE YOU HAVE ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTS
THAT ACCOMPANY YOUR SOFTWARE PACKAGING OR THAT YOU HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET,
A FILE ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEBSITE FROM WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF YOU
DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN
THE PRODUCT TO MCAFEE OR THE PLACE OF PURCHASE FOR A FULL REFUND.
2
McAfee VirusScan Enterprise 8.8 Product Guide
Contents
Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Audience. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Conventions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
How this guide is organized. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Finding product documentation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Getting Started. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Introducing VirusScan Enterprise. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Components and how they interact. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
The importance of creating a security strategy. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
VirusScan Console and ways to access it. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
VirusScan Console and how it works. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Using right-click features. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
System tray icons and how they work. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
What to do first. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Part I - Prevention: Avoiding Threats. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Access protection. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
How access threats are stopped. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Control access to the user interface. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Protecting your system access points. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
How access protection rules are defined. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Access point violations and how VirusScan Enterprise responds. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Types of user-defined rules. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Configuring access protection settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Blocking buffer overflow exploits. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
How buffer overflow exploits occur. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Configuring buffer overflow protection. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Restricting potentially unwanted programs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Configuring unwanted programs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Updating detection definitions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
DAT files and how they work. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
The importance of an update strategy. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
McAfee VirusScan Enterprise 8.8 Product Guide
3
Contents
Update tasks and how they work. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Mirror tasks and how they work. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
How the AutoUpdate repository works. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
How rolling back DAT files works. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
Excluding scan items. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
Specifying exclusions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
How to use wildcards to specify scan items. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Using scheduled tasks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Scheduling tasks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Configuring the task schedule. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Part II - Detection: Finding Threats. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Scanning items on-access. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
On-access scanning and how it works. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Scanning comparison: writing to disk vs. reading from disk. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
Scanning comparison: scanning all files vs. scanning default + additional file types. . . . . . . . . . . . . 52
Script scanning and how it works. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
How Artemis works. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
Determine the number of scanning policies. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
How general and process settings are configured. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
Scanning items on-demand. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
On-demand scanning and how it works. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
On-demand scanning methods and how they are defined. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
How scanning of remote storage works. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
How scan deferral works. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
How system utilization works. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
Configuring on-demand scan tasks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
Configuring global system cache. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
Scanning email on-delivery and on-demand. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
ePolicy Orchestrator 4.5 or 4.6. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
ePolicy Orchestrator 4.0. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
VirusScan Console. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
On delivery email scan policies tab definitions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Part III - Response: Handling Threats. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
Detections and responses. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
What happens when a detection occurs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
System access point violations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
Buffer overflow detections. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
4
McAfee VirusScan Enterprise 8.8 Product Guide
Contents
Unwanted program detections. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
On-access scan detections. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
On-demand scan detections. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
Email scan detections. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
Quarantined items. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
Configuring alerts and notifications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
Configuring alerts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
Access queries and dashboards. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
Configuring emergency DATs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
About emergency DATs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
Downloading a SuperDAT file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
Installing the SuperDAT files on an ePolicy Orchestrator repository. . . . . . . . . . . . . . . . . . . . . . . . . . 82
Installing the EXTRA.DAT file on a client system. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
Part IV - Monitoring, Analyzing, and Fine-Tuning Your Protection. . . . . . . . . . . . . . . . . 84
Monitoring activity in your environment. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
Tools for monitoring activity. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
Analyzing your protection. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
The importance of analysis. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
Analyzing protection examples. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
Appendix. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
Configuring ePolicy Orchestrator server tasks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
Configuring example server task. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
Using the command line with VirusScan Enterprise. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
On-demand scanning command-line options. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
Update task command-line options. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
Connecting to remote systems. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
Accessing remote systems with VirusScan Enterprise installed. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
Submit threat samples for analysis. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
Access the McAfee Labs Threat Library. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
Troubleshooting. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
Repairing the product installation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
Viewing the on-access activity log file. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
Using the MER tool during troubleshooting. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
Disabling VirusScan Enterprise during troubleshooting. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
Suggested support and troubleshooting tools. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
Frequently asked questions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
McAfee VirusScan Enterprise 8.8 Product Guide
5
Preface
To use this document effectively you should understand who this document is written for, the
conventions used, what's in it, and how to find other reference documentation.
Contents
Audience
Conventions
How this guide is organized
Finding product documentation
Audience
McAfee documentation is carefully researched and written for the target audience.
The information in this guide is intended primarily for:
• Administrators — People who implement and enforce the company's security program.
• Users — People who are responsible for configuring the product options on their systems,
or for updating their systems.
Conventions
This guide uses the following typographical conventions.
6
Book title or Emphasis
Title of a book, chapter, or topic; introduction of a new
term; emphasis.
Bold
Text that is strongly emphasized.
User input or Path
Commands and other text that the user types; the path
of a folder or program.
Code
A code sample.
User interface
Words in the user interface including options, menus,
buttons, and dialog boxes.
Hypertext blue
A live link to a topic or to a website.
Note
Additional information, like an alternate method of
accessing an option.
Tip
Suggestions and recommendations.
Important/Caution
Valuable advice to protect your computer system, software
installation, network, business, or data.
Warning
Critical advice to prevent bodily harm when using a
hardware product.
McAfee VirusScan Enterprise 8.8 Product Guide
Preface
How this guide is organized
How this guide is organized
This document is meant as a reference to use along with the VirusScan Console and ePolicy
Orchestrator user interfaces. It also describes, in order, how you should approach protecting
your system from malware using VirusScan Enterprise. To describe that process, this document
is separated into four major parts, plus an appendix:
• Part I — Prevention: Avoiding Threats — The best way to protect your system is to
keep any malware from ever gaining access to your system. This part of the document
describes the following:
• Protecting your systems' access points, memory from overflow errors, and unwanted
programs.
• Detection definitions and how they are used to protect your system and the importance
of updating these definitions on a regular basis.
• Excluding files, folders, and disks from scanning.
• Using scheduled task to periodically scan your system and update the files used by
VirusScan Enterprise.
• Part II — Detecting: Finding Threats — Files that are opened or copied from other file
systems or the Internet might provide access to your system. Also, application programming
interface (API) calls and scripts can pose a threat to your system. These threats are found
during the following VirusScan Enterprise scan processes:
• On-access scanning — Scans a file for malware when the file is read or written to disk,
it also protects boot sectors, scans memory of processes already running, detects cookies,
and protects against unwanted programs.
• On-demand scanning — Scans the entire system for threats on a scheduled basis or as
needed when started from the VirusScan Console.
• Email on-delivery and on-demand scanning — Protects against malware arriving through
email in Microsoft Outlook and Lotus Notes.
• Buffer overflow protection — Analyzes API calls made by certain processes, to confirm
they do not attempt to overwrite adjacent data in the memory buffer.
• ScriptScan — Finds threats from browsers or other applications accessed that use the
Windows Script Host.
• Part III — Response: Handling Threats — VirusScan Enterprise can be configured to
perform any of the following steps, when a threat is found:
• Deny Access to the threat or take no further action.
• Delete or Clean the threat. When either of these actions is taken a copy of the original
file is stored in the Quarantine folder.
NOTE: For any detection, you can configure VirusScan Enterprise to notify the user or not.
• Part IV — Monitoring, Analyzing, and Fine-Tuning Your Protection — Once your
protection is up and running, you should monitor your system using ePolicy Orchestrator
queries and reports. Then you could decide to make changes to your security settings in
order to increase or reduce the amount of system protection. Alternatively, you might also
use VirusScan Console logs and Simple Network Management Protocol (SNMP) traps to
monitor your systems.
• Appendix — Describes some additional features you should be aware of when using
VirusScan Enterprise. For example, VirusScan Enterprise command-line options, connecting
to remote systems through VirusScan Enterprise, and more.
McAfee VirusScan Enterprise 8.8 Product Guide
7
Preface
Finding product documentation
Finding product documentation
McAfee provides the information you need during each phase of product implementation, from
installing to using and troubleshooting. After a product is released, information about the product
is entered into the McAfee online KnowledgeBase.
1
Go to the McAfee Technical Support ServicePortal at http://mysupport.mcafee.com.
2
Under Self Service, access the type of information you need:
To access...
Do this...
User documentation
1
Click Product Documentation.
2
Select a Product, then select a Version.
3
Select a product document.
KnowledgeBase
8
•
Click Search the KnowledgeBase for answers to your product questions.
•
Click Browse the KnowledgeBase for articles listed by product and
version.
McAfee VirusScan Enterprise 8.8 Product Guide
Getting Started
®
®
Understanding the components of McAfee VirusScan Enterprise 8.8 software, and the order
you should use to configure the software helps you protect your system from threats.
Contents
Introducing VirusScan Enterprise
Components and how they interact
The importance of creating a security strategy
VirusScan Console and ways to access it
What to do first
Introducing VirusScan Enterprise
As soon as the VirusScan Enterprise software is installed, it begins protecting your system from
threats. You can increase your protection if you understand what the software does, what is
new in this release, and its major components.
What it is and does
VirusScan Enterprise offers easily scalable protection, fast performance, and a mobile design
to protect your environment from the following:
• Viruses, worms and Trojan horses
• Access point violations and exploited buffer overflows
• Potentially unwanted code and programs
It detects threats, then takes the actions you configured to protect your environment.
®
You can configure the software as a standalone product or you can use McAfee ePolicy
®
Orchestrator software version 4.0 and later, to manage and enforce VirusScan Enterprise
policies, then use queries and dashboards to track activity and detections.
NOTE: This document addresses using ePolicy Orchestrator 4.0, 4.5, and 4.6. For information
about using these versions of ePolicy Orchestrator, see that version's product documentation.
What is new
This release includes the following new features:
• Enhanced performance.
• Allows ePolicy Orchestrator 4.5 and 4.6 to manage your VirusScan Enterprise systems.
• A new ScriptScan URL exclusion feature allows you to configure exclusions instead of manually
editing the registry.
McAfee VirusScan Enterprise 8.8 Product Guide
9
Getting Started
Components and how they interact
• The AntiSpyware Enterprise Module has been fully integrated into the VirusScan Enterprise
8.8 software.
• Support for Outlook 2010 email scanning.
• Support for Lotus Notes 8.0x through 8.5.1 email scanning.
Components and how they interact
As an administrator and user of VirusScan Enterprise, you should be familiar with its components
and connections. The following figure shows these components for a basic environment.
Figure 1: VirusScan Enterprise components
Client system
This is where VirusScan Enterprise and optional McAfee Agent are installed and configured.
• DAT files — Detection definition files, also called malware signatures, work with the scanning
engine to identify and take action on threats.
• Scan engine — Used to scan the files, folders, and disks on the client computer and
compares them to the information in the DAT files for known viruses.
NOTE: DAT files and scan engine are updated as needed using the Internet connection to
McAfee Headquarters, or using the optional connections over the Enterprise Intranet to a
designated server.
• Artemis (Heuristic network check for suspicious files) — Looks for suspicious programs
and DLLs running on client systems that are protected by VirusScan Enterprise. When the
real-time malware defense detects a suspicious program, it sends a DNS request containing
a fingerprint of the suspicious file to a central database server hosted by McAfee Labs.
• McAfee Agent (optional) — Provides secure communication between McAfee managed
products and McAfee ePolicy Orchestrator server. The agent also provides local services like
updating, logging, reporting events and properties, task scheduling, communication, and
policy storage.
10
McAfee VirusScan Enterprise 8.8 Product Guide
Getting Started
The importance of creating a security strategy
McAfee Headquarters
McAfee Headquarters, home to McAfee Labs and McAfee Technical Support, provides the
following VirusScan Enterprise services:
• DAT updates — Stored on a McAfee central database server, and using AutoUpdate, these
DAT update files are copied to the VirusScan Enterprise clients or optional DAT repositories
to provide information to fight known threats and new lists of known viruses as they are
found in real time.
• Scan engine updates — Stored on a central database server, scan engine updates are
downloaded as needed to keep the VirusScan Enterprise scan engine up-to-date.
• McAfee Labs — This threat library has detailed information on virus, Trojan, hoax, and
potentially unwanted program (PUP) threats — where they come from, how they infect your
system, and how to handle them. The Artemis feature sends the fingerprint of the suspicious
file to McAfee Labs, where they analyze the file and determine what action to take.
Server
The optional server uses the following components to manage and update many client systems
remotely:
• ePolicy Orchestrator — Centrally manages and enforces VirusScan Enterprise policies,
then uses queries and dashboards to track activity and detections.
NOTE: This document addresses using ePolicy Orchestrator 4.0, 4.5, and 4.6. For information
about ePolicy Orchestrator, see the product documentation for your version.
• DAT repository — Retrieves the DAT updates from the McAfee download site. From there,
DAT files can be replicated throughout your organization, providing access for all other
computers. This minimizes the amount of data transferred across your network by automating
the process of copying updated files to your share sites.
The importance of creating a security strategy
Protecting your client systems from viruses, worms, and Trojan files using VirusScan Enterprise
requires a well-planned strategy: defining threat prevention and detection, response to threats,
and ongoing analysis and tuning.
Prevention — avoiding threats
Define your security needs to ensure that all of your data sources are protected, then develop
an effective strategy to stop intrusions before they gain access to your environment. Configure
these features to prevent intrusions:
• User Interface Security — Set display and password protection to control access to the
VirusScan Enterprise user interface.
• Access Protection — Use access protection rules to protect your computer from undesirable
behavior with respect to files, registry, and ports.
• Buffer Overflow Protection — Prevent abnormal programs or threats from overrunning the
buffer's boundary and overwriting adjacent memory while writing data to a buffer. These
exploited buffer overflows can execute arbitrary code on your computer.
• Unwanted Program Protection— Eliminate potentially unwanted programs such as spyware
and adware from your computer.
McAfee VirusScan Enterprise 8.8 Product Guide
11
Getting Started
The importance of creating a security strategy
Detection — finding threats
Develop an effective strategy to detect intrusions when they occur. Configure these features
to detect threats:
• Update Task — Get automatic updates of DAT and scanning engine from the McAfee download
website.
• On-Access Scanner— Detect potential threats from any possible source as files are read
from or written to disk. You can also scan for potentially unwanted cookies in the cookies
folder.
• On-Demand Scan Tasks — Detect potential threats using immediate and scheduled scan
tasks. You can also scan for potentially unwanted cookies and spyware-related registry
entries that were not previously cleaned.
• On-Delivery and On-Demand Email Scanner — Detect potential threats on Microsoft Outlook
email clients using on-delivery scanning of messages, attachments, and public folders. Detect
potential threats on Lotus Notes email clients when messages are accessed.
• Quarantine Manager Policy — Specify the quarantine location and the length of time to keep
quarantined items. Restore quarantined items as necessary.
Response — handling threats
Use product log files, automatic actions, and other notification features to decide the best way
to handle detections.
• Actions — Configure features to take action on detections.
• Log files — Monitor product log files to view a history of detected items.
• Queries and dashboards — Use ePolicy Orchestrator queries and dashboards to monitor
scanning activity and detections.
Tuning — monitoring, analyzing, and fine-tuning your protection
After initially configuring VirusScan Enterprise, it is always a good practice to monitor and
analyze your configuration. This can improve your system and network performance, plus
enhance your level of virus protection, if needed. For example, the following VirusScan Enterprise
tools and features can be modified as part of your monitoring, analyzing, and fine-tuning
processes:
• Log files (VirusScan Console) — View a history of detected items. Analyzing this information
could tell you if you need to enhance your protection or change the configuration to improve
system performance.
• Queries and dashboards (ePolicy Orchestrator console) — Monitor scanning activity and
detections. Analyzing this information could tell you if you need to enhance your protection
or change the configuration to improve system performance.
• Scheduled tasks — Modify tasks (like AutoUpdate) and scan times to improve performance
by running them during off-peak times.
• DAT repositories — Reduce network traffic over the enterprise Internet or intranet by moving
these source files closer to the clients needing the updates.
• Modifying the scanning policies — Increase performance or virus protection depending on
your analysis of the log files or queries. For example, configuring exclusions, when to use
12
McAfee VirusScan Enterprise 8.8 Product Guide
Getting Started
VirusScan Console and ways to access it
high and low risk profile scanning, and when to disable scan on write can all improve
performance.
CAUTION: Failure to enable When reading from disk scanning leaves your system
unprotected from numerous malware attacks.
VirusScan Console and ways to access it
The VirusScan Console is the interface for the standalone version of the program's activities.
You use it to configure, monitor, and update the product.
NOTE: This information applies only to the standalone version of the product, not the managed
ePolicy Orchestrator version.
VirusScan Console and how it works
After you understand what VirusScan Enterprise does and its components, you need to
understand how to access its features. Use one of these methods to open the VirusScan
Enterprise 8.8 Console:
• From the Start menu, select Programs | McAfee | VirusScan Console.
• Right-click the VirusScan Enterprise shield icon in the system tray, then select VirusScan
Console.
Menu bar
Use the menu items to create tasks, configure properties, and access additional information.
• Task — Create and configure tasks such as scanning for threats or updating the DAT files.
• Edit — Copy, paste, delete, or rename the selected task.
• View — Display the Toolbar and Status bar and refresh the display.
• Tools — Configure interface options for users, lock or unlock user interface security, configure
alerts, access the event viewer, open a remote console if you have administrator rights,
import or edit the repository list, and roll back the DAT files.
• Help — Access online Help topics, the Threat Library on the McAfee Labs website, the Submit
a Sample website, and the Technical Support website. You can also repair the product
installation and view the About dialog box for copyright information and which versions of
the product, license, definition files, scanning engine, extra driver, and patch are installed.
NOTE: Each item on the menu has an associated shortcut key. On some operating systems,
these shortcut keys might not be available unless you use F10 or ALT to access the menus.
Toolbar
Use the icons to access these commonly used commands:
• Display properties of the selected task.
• Start the selected task.
• Stop the selected task.
• Copy the selected task.
• Paste the selected task.
McAfee VirusScan Enterprise 8.8 Product Guide
13
Getting Started
VirusScan Console and ways to access it
• Delete the selected task.
• Configure alerting properties.
• Launch the event viewer.
• Access the Information Library on the McAfee Labs website.
• Connect to a remote computer if you have administrator rights.
• Create a new on-demand scan.
Task list
Displays the default tasks and any new tasks that you create, as well as the status and last
result for each task.
Status bar
Displays the status of the current activity.
Using right-click features
Use right-click features for quick access to commonly used actions such as creating new tasks,
viewing task statistics and logs, opening task property pages, scanning a specific file or folder,
or performing an immediate update task.
Feature descriptions
Location
Description
Examples
The Console
Right-click the VirusScan Console to display right-click •
features. These features vary depending on whether
you selected a task in the task list and which task you
select.
•
Windows
Explorer
The system tray
Right-click a selected file or folder to perform an
immediate Scan for threats. You can select an
action for the scan:
•
Clean — Report and clean the detected item.
•
Continue -— Report the detection and continue
scanning.
In the console, right-click a task to
access its properties. Depending on
which task you select, you might also be
able to start, stop, enable or disable it,
and view statistics and the activity log.
In some cases, you can also rename or
delete a task.
Right-click a blank area in the console
to create a new scan or update task.
Perform an immediate scan on a file or
folder that you suspect is threatened.
When you start the scan, the on-demand
scanner is invoked directly with all scan
settings enabled. Select the action option.
You cannot customize any other scan
settings.
See System tray icons and how they work for VirusScan Enterprise icon right-click descriptions.
System tray icons and how they work
Once VirusScan Enterprise is installed, one of the following icons appears in the Windows system
tray, if you configured this feature during the installation process.
"M" in a shield icon
Appears on ePolicy Orchestrator managed systems using McAfee Agent version 4.5 or later. It
displays:
14
McAfee VirusScan Enterprise 8.8 Product Guide
Getting Started
VirusScan Console and ways to access it
• Status — This icon does not change to indicate access protection trigger alerts or if on-access
scanning is disabled on ePolicy Orchestrator managed clients with McTray version 2.x or
later (with McAfee Agent 4.5 or later). The status changes are shown as tool tips.
• Tool tips — The icon tool tips include:
• McAfee Status: OK — Normal. Options indicate:
• View Security Status — Displays a check mark.
• Quick Settings | On access Virus Scanning - On — Displays a check mark.
• McAfee Status: Issue Detected — On-access scan disabled. Options indicate:
• View Security Status — Displays an exclamation point.
NOTE: Click View Security Status to display the McAfee Security Status dialog box
with Issue — "On-Access Scan disabled" in the Status column.
• Quick Settings | On access Virus Scanning - Off — No check mark is displayed.
• McAfee Status: Issue Detected — Access protection event triggered. Options indicate:
• View Security Status — Displays an exclamation point.
NOTE: Click View Security Status to display the McAfee Security Status dialog box
with Issue — "Please see Access Protection Log" in the Status column.
• Quick Settings | On access Virus Scanning - On — Displays a check mark.
• Menu options — The right-click menu options include:
• Update Security — Updates the DAT files and any other changes.
• Quick settings — Displays:
• On-Access Scan Properties — Opens the on-access scanner properties.
• On-Access Scanning on or off — Toggles the on-access scanner.
• On-Access Scan Properties — Opens the on-access scanner properties.
• On-Access Scan Messages — Opens the on-access scan statistics or messages.
• Open On-Access Protection Log File — Opens the log file.
• Manage Features | VirusScan Enterprise — Opens the VirusScan Console.
• Scan Computer for | Threats — Starts an immediate scan.
• View Security Status — Displays the McAfee Security Status dialog box.
• McAfee Agent Status Monitor — Displays the McAfee Security Status Monitor dialog
box.
• About — Opens the About dialog box.
"M" in a box
Appears on standalone systems using McTray 1.0 and on ePolicy Orchestrator managed systems
using McAfee Agent version 4.0 that use McTray 1.0. It displays:
• Status — Displays include:
•
•
"M" in a box — Normal status.
"M" in a box with an exclamation point — Access protection violation event is triggered
or on-access scanning is disabled. Right-click menu options indicate:
McAfee VirusScan Enterprise 8.8 Product Guide
15
Getting Started
VirusScan Console and ways to access it
•
"V" in a shield with circle and line — Indicates on-access scanning is disabled.
•
"V" in a shield with red outline — Indicates on-access scanning is enabled, but
see the Access Protection log file.
• Tool tip — Displays "McAfee".
• Menu options — The right-click menu options include:
• VirusScan Console — Opens the VirusScan Console.
• Disable or Enable On-Access Scanner — Toggles the on-access scanner.
• On-Access Scan Properties — Opens the on-access scanner properties.
• On-Access Scan Statistics — Opens the on-access scan statistics.
• On-Access Scan Messages — Opens the on-access scan statistics or messages.
• On-Demand Scan — Creates a one-time configurable on-demand scan.
• Update Now — Performs an immediate update task.
• About VirusScan Enterprise — Opens the About dialog box.
"V" in a shield icon
Appears on standalone systems that do not have McTray 1.0. It displays:
• Status — Displays include:
•
"V" in a shield — Normal.
•
"V" in a shield with circle and line — Indicates on-access scanning is disabled.
•
A "V" in a shield with red outline — Indicates on-access scanning is enabled, but see
Access Protection log file.
• Tool tips — The tool tips include:
•
"V" in a shield — McAfee OAS: enabled, normal.
•
"V" in a shield with circle and line — McAfee OAS: disabled.
•
"V" in a shield with red outline — McAfee OAS: enabled, see the Access Protection
Log.
• Menu options — The right-click menu options include:
• Update Security — Updates DAT files and any other changes.
• Quick settings — Displays:
• On-Access Scan Properties — Opens the on-access scanner properties.
• On-Access Scanning on or off — Toggles the on-access scanner.
• On-Access Scan Messages — Opens the on-access scan statistics or messages.
• Open On-Access Protection Log File — Opens the log file.
• Manage Features | VirusScan Enterprise — Opens the VirusScan Console.
• Scan Computer for | Threats — Starts an immediate scan.
• View Security Status — Displays the McAfee Security Status dialog box.
16
McAfee VirusScan Enterprise 8.8 Product Guide
Getting Started
What to do first
• McAfee Agent Status Monitor — Displays the McAfee Security Status Monitor dialog
box.
• About — Opens the About dialog box.
What to do first
When the software is installed, it uses the DAT files packaged with the product, which provide
general security for your environment. McAfee recommends you get the latest DAT files and
customize the configuration to meet your requirements before you deploy the product to client
systems.
Take these actions immediately after installing the product.
1
Set user interface security. Configure the display and password options to prevent users
from accessing specific components or the entire VirusScan Enterprise user interface. See
Controlling Access to the User Interface for more information.
2
Update DAT files. Perform an Update Now task to ensure that you have the most current
DAT files. See Updating detection definitions for more information.
3
Prevent intrusions. Configure these features to prevent potential threats from accessing
your systems:
• Access Protection. Configure access protection rules to prevent unwanted changes
to your computer and enable the option to prevent McAfee processes from being
terminated. See Protecting your system access points for more information.
• Buffer Overflow Protection. Enable buffer overflow detection and specify exclusions.
See Blocking buffer overflow exploits for more information.
• Unwanted Programs Policy. Configure the policy that the on-access, on-demand,
and email scanners use to detect potentially unwanted programs. Select unwanted
program categories to detect from a predefined list, then define additional programs to
detect or exclude. See Restricting potentially unwanted programs for more information.
4
Detect intrusions. Configure these features to detect potential threats on your systems,
then notify you and take action when detections occur:
• AutoUpdate. Configure update tasks to get the most current DAT files, scanning engine,
and product upgrades. See Updating detection definitions for more information.
• On-Access Scanner. Configure the scanner to detect and take action on potential
threats as the threats are accessed in your environment. Enable scanning of unwanted
programs and scan for cookies in the cookies folder. See Scanning items on-access for
more information.
• On-Demand Scanner. Configure scan tasks to detect and take action on potential
threats in your environment. Enable scanning of unwanted programs and scan for
cookies in the cookies folder and potentially unwanted spyware-related registry entries
that were not previously cleaned. See Scanning items on-demand for more information.
• Email Scanners. Configure the on-delivery and on-demand scanning of Microsoft
Outlook and Lotus Notes email clients. Enable scanning of unwanted programs. See
Scanning email on-delivery and on-demand for more information.
5
Send alerts and quarantine threats. Configure these features to alert you when
detections occur and manage quarantined items:
• Alerts and Notifications. Configure how and when you receive detection notifications
and alerts. See Configuring alerts and notifications for more information.
McAfee VirusScan Enterprise 8.8 Product Guide
17
Getting Started
What to do first
• Quarantine Manager Policy. Configure the location of the quarantine folder and the
number of days to keep quarantined items before automatically deleting them. See
Quarantined items for more information.
18
McAfee VirusScan Enterprise 8.8 Product Guide
Part I - Prevention: Avoiding Threats
Prevention is the first step in a protection strategy, to keep threats from gaining access to your
system.
Contents
Access protection
Protecting your system access points
Blocking buffer overflow exploits
Restricting potentially unwanted programs
Updating detection definitions
Excluding scan items
Using scheduled tasks
Access protection
Preventing threat access to your client system is your first line of defense against malware. The
Access Protection feature of VirusScan Enterprise compares an action being requested against
a list of configured rules. Each rule can be configured to block or report, or block and report
access violations when they occur.
Access protection prevents unwanted changes to your computer by restricting access to specified
ports, files, shares, registry keys, and registry values. It also protects McAfee processes by
preventing users from stopping them. This protection is critical before and during outbreaks.
This feature uses predefined rules and user-defined rules to specify which items can and cannot
be accessed. Each rule can be configured to block or report, or block and report access violations
when they occur. Predefined rules and categories can be updated from the McAfee update sites.
NOTE: The on-access scanner, which detects access violations, must be enabled to detect
attempts to access ports, files, shares, and registry keys and registry values.
How threats gain access
The most common ways threats gain access to your system include:
• Macros — As part of word processing documents and spreadsheet applications.
• Executable files — Seemingly benign programs can include viruses along with the expected
program. For example, some common file extensions are .EXE, .COM, .VBS, .BAT, .HLP and
.DLL.
• Email — Jokes, games, and images as part of email messages with attachments.
• Scripts — Associated with web pages and emails, scripts such as ActiveX and JavaScript,
if allowed to run, can include viruses.
McAfee VirusScan Enterprise 8.8 Product Guide
19
Part I - Prevention: Avoiding Threats
Access protection
• Internet Relay Chat (IRC) messages — Files sent along with these messages can easily
contain malware as part of the message. For example, automatic startup processes can
contain worms and Trojan threats.
• Browser and application Help files — Downloading these Help files exposes the system
to embedded viruses and executables.
• Combinations of all these — Sophisticated malware creators combine all of these delivery
methods and even embed one piece of malware within another to try and access your
computer.
Contents
How access threats are stopped
Control access to the user interface
How access threats are stopped
By enabling or changing the configuration of the Access Protection feature you can configure
anti-spyware protection, anti-virus protection, common protection, virtual machine protection,
and define your own rules of protection. Following is the basic process VirusScan Enterprise
uses to provide access protection.
Steps taken when a threat occurs
1
A user or process tries to take an action.
2
That action is examined by Access Protection according to the defined rules.
3
When a rule is broken, the action requested by the user or process is managed using the
information in the rules configured. For example, the action causes nothing to happen, it
is blocked, or it is blocked and a report is sent.
4
The Access Protection log file is updated, and an event is generated for the ePolicy
Orchestrator Global Administrator.
Example of an access threat
1
A user downloads a program, MyProgram.exe, from the Internet.
NOTE: For this example, MyProgram.exe is not malware.
2
The user launches the program and it seems to launch as expected.
3
MyProgram.exe then launches a child process called AnnoyMe.exe and it attempts to modify
the operating system to ensure it always loads on startup.
4
Access Protection processes the request and matches it against an existing rule that is
configured to block and report.
5
AnnoyMe.exe is denied access when it attempts to modify the operating system, Access
Protection logs the details of the attempt, and it generates an alert to the ePolicy
Orchestrator Global Administrator.
Log report and alerts generated
This is an example of an Access Protection log entry.
2/10/2010 11:00AM Blocked by Access Protection rule TestDomain\TestUser C:\Users\TestUser\Desktop\AnnoyMe.exe
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Window\CurrentVersion\Run\ Prevent programs registering to autorun
This table describes the data in the previous Access Protection log entry:
20
McAfee VirusScan Enterprise 8.8 Product Guide
Part I - Prevention: Avoiding Threats
Access protection
Log entry
Description
2/10/2010
Date
11:00AM
Time
Blocked by Access Protection rule
Action taken
TestDomain\TestUser
Credentials
C:\Users\TestUser\Desktop\AnnoyMe.exe
Process name that breeched the rule
\REGISTRY\MACHINE\SOFTWARE\Microsoft...
Location the process tried to access
Prevent programs registering to autorun
Access Protection rule that was triggered
Similar information is available using ePolicy Orchestrator queries. For details, refer to Access
queries and dashboards.
Control access to the user interface
Setting security for the interface on client computers is an important part of protecting your
environment.
As an administrator, you can:
• Control the access users have to the VirusScan Enterprise interface.
• Set a password to prevent users from accessing or changing selected features.
• Lock and unlock the user interface as necessary.
Contents
How setting a password affects users
Configuring user interface security settings
How setting a password affects users
Set a user interface password to deter users with malicious intent.
When you password-protect the user interface on client computers, the following users are
affected:
• Non-administrators — Users without administrator rights. Non-administrators run all
VirusScan Enterprise applications in read-only mode. They can view some configuration
parameters, run saved scans, and run immediate scans and updates. They cannot change
any configuration parameters, create, delete, or modify saved scan or update tasks.
• Administrators — Users with administrator rights. Administrators must type the password
to access the protected tabs and controls in read/write mode. If a password is not provided
for a protected item, they view it in read-only mode.
Configuring user interface security settings
Use the General Options Policies user interface properties to configure the display and password
options available to the users.
CAUTION: Consider carefully the security ramifications before you make changes to these
properties. These options let you restrict or allow users to make changes to their security
configuration and could leave systems unprotected from numerous malware attacks.
McAfee VirusScan Enterprise 8.8 Product Guide
21
Part I - Prevention: Avoiding Threats
Access protection
Configure the General Options Policies user interface properties with these user interface
consoles.
ePolicy Orchestrator 4.5 or 4.6
Configure the General Options Policies user interface properties.
Task
For option definitions, click ? on each tab.
1
Click Menu | Policy | Policy Catalog, then from the Product list select VirusScan
Enterprise 8.8.0. The Category list displays the policy categories for VirusScan Enterprise
8.8.0.
2
Edit an existing policy or create a new policy:
Edit an existing policy
a From the Category list, select the policy category.
b From the Actions column, click Edit Setting to open the policy configuration page.
Create a new policy
a Click Actions | New Policy to open New Policy dialog box.
b From the Category list, select an existing policy.
c From the Create a new policy based on this existing policy list, select one of the
settings.
d Type a new policy name.
e Type any notes, if required.
f
Click OK. The new policy appears in the list of existing policies.
g From the Actions column of the new policy, click Edit Setting to open the policy
configuration page.
3
From the Settings for list, select Workstation or Server.
4
On the Display Options tab, configure which VirusScan Enterprise system tray icons the
users see, if they can connect to remote systems, and the user's language option settings.
5
On the Password Options tab, configure which VirusScan Enterprise tasks and user
interface options the users can change with the correct password.
ePolicy Orchestrator 4.0
Configure the General Options Policies user interface properties.
Task
For option definitions, click ? on each tab.
1
Click Systems | Policy Catalog, then from the Product list select VirusScan Enterprise
8.8.0. The Category list displays the policy categories for VirusScan Enterprise 8.8.0.
2
Edit an existing policy or create a new policy:
Edit an existing policy
a From the Category list, select the policy category.
b From the Actions column, click Edit to open the policy configuration page.
Create a new policy
22
McAfee VirusScan Enterprise 8.8 Product Guide
Part I - Prevention: Avoiding Threats
Protecting your system access points
a Click New Policy to open New Policy dialog box.
b From the Create a new policy based on this existing policy list, select one of the
settings.
c Type a new policy name.
d Click OK. The new policy appears in the list of existing policies.
3
From the Settings for list, select Workstation or Server.
4
On the Display Options tab, configure which VirusScan Enterprise system tray icons the
users see, if they can connect to remote systems, and the user's language option settings.
5
On the Password Options tab, configure which VirusScan Enterprise tasks and user
interface options the users can change with the correct password.
VirusScan Console
Configure the General Options user interface properties.
Task
For option definitions, click Help on each tab.
1
Click Tools | General Options to open the General Options configuration dialog box.
2
On the Display Options tab, configure which VirusScan Enterprise system tray icons the
users see, if they can connect to remote systems, and the user's language option settings.
3
On the Password Options tab, configure which VirusScan Enterprise tasks and user
interface options the users can change with the correct password.
Protecting your system access points
Access protection prevents unwanted changes to your computer by restricting access to specified
ports, files, shares, registry keys, and registry values. It also protects McAfee processes by
preventing users from stopping them. This protection is critical before and during outbreaks.
This feature uses predefined rules and categories and user-defined rules to specify which items
can and cannot be accessed. Each rule can be configured to block and report access point
violations when they occur. Predefined rules and categories are subject to content updates via
the McAfee update sites.
Contents
How access protection rules are defined
Access point violations and how VirusScan Enterprise responds
Types of user-defined rules
Configuring access protection settings
How access protection rules are defined
Rules are separated into these types and provide these levels of protection.
McAfee VirusScan Enterprise 8.8 Product Guide
23
Part I - Prevention: Avoiding Threats
Protecting your system access points
Rule type descriptions
Rule type
Anti-virus
Description
These preconfigured rules protect your computer from common behaviors of malware
threats. You can enable, disable, and change the configuration, but you cannot delete
these rules.
Two rule examples are:
•
Prevent disabling or changing of critical processes, remote creation or modification
of executable files, hijacking of executable files, Windows Process spoofing, and
mass mailing worms from sending mail.
•
Protect phone book files from password and email stealers.
These protection levels apply to anti-virus rules:
Common
•
Standard Protection
•
Maximum Protection
•
Outbreak Control
These preconfigured rules prevent modification of commonly used files and settings.
You can enable, disable, and change the configuration, but you cannot delete these
rules.
Three rule examples are:
•
Prevent modification of McAfee files and settings.
•
Protect Mozilla and Firefox files and settings, Internet Explorer settings, and network
settings.
•
Prevent installation of Browser Helper Objects and automatically running programs
from the Temp folder.
These protection levels apply to the common rules:
Virtual Machine
Protection
•
Standard Protection
•
Maximum Protection
These preconfigured rules prevent termination of VMWare processes and modification
of VMWare files. You can enable, disable, and change the configuration, but you cannot
delete these rules.
Rule examples are:
•
Prevent termination of VMWare Processes.
•
Prevent modification of VMWare workstation, server, or virtual machine files.
User-defined
These custom rules supplement the protection provided by the Anti-virus and
Common rules.
Anti-spyware
Rule examples are:
•
Prevent Internet Explorer favorites and settings.
•
Prevent programs from running and execution of scripts from the Temp folder.
Protection level descriptions
Protection level
24
Description
Standard
Anti-virus and common rules that protect some critical settings and files from being
modified, but generally allow you to install and execute legitimate software.
Maximum
Anti-virus and common rules that protect most critical settings and files from being
modified. This level provides more protection than Standard, but might prevent you
from installing legitimate software. If you cannot install software, we recommend that
you disable the Access Protection feature first, then enable it again after installation.
McAfee VirusScan Enterprise 8.8 Product Guide
Part I - Prevention: Avoiding Threats
Protecting your system access points
Protection level
Outbreak control
Description
Anti-virus rules that block destructive code from accessing the computer until a DAT
file is released. These rules are preconfigured to block access to shares during an
outbreak.
Access point violations and how VirusScan Enterprise responds
An access violation occurs when a restricted user or process tries to start, stop, or access
restricted components of your computer.
When an access point violation occurs:
• Information is recorded in the log file, if you selected the Report option for the rule that
detected the violation.
• The event is recorded in the local event log and to SNMP, if you configured Alert Properties
to do so.
• The event is reported to Alert Manager and ePolicy Orchestrator, if those products are
configured to do so.
• A Block and Report action for a rule determine what happens when a rule detects a
violation.
• On the standalone client system, a red frame surrounds the system tray icon and remains
visible for 30 minutes, unless you reset it.
NOTE: To reset the icon, open the Access Protection Log File from the system tray icon.
Opening the log file by any other method does not reset the icon to its normal state.
Types of user-defined rules
When you configure a new access protection user-defined rule you are allowed to create port
blocking, file and folder blocking, and registry blocking rules.
The following table describes these rules.
Rule descriptions
Rule
Description
Port Blocking Rule
Blocks incoming or outgoing network traffic on specific ports or ranges of ports.
NOTE: When you block a port, Transmission Control Protocol (TCP) and User Datagram
Protocol (UDP) accesses are blocked.
NOTE: When you block a port any protocol using that port or range of ports is blocked.
For example, Transmission Control Protocol (TCP) and User Datagram Protocol (UDP)
accesses are blocked.
File/Folder Blocking Rule Blocks write access to files and folders, file execution, plus new file creation and file
deletion.
NOTE: Once you restrict access to a file or folder, the restriction remains in place until
the administrator removes it. This helps prevent intrusions and stops them from spreading
during an outbreak.
Registry Blocking Rule
Protects registry keys or values by blocking these actions: write to, create, or delete.
McAfee VirusScan Enterprise 8.8 Product Guide
25
Part I - Prevention: Avoiding Threats
Protecting your system access points
Configuring access protection settings
Use Access Protection Policies to protect your system’s access points and prevent termination
of McAfee processes.
CAUTION: Failure to enable access protection to prevent McAfee services from being stopped
leaves your system unprotected from numerous malware attacks.
There are two types of access-protection rules you can configure.
• Predefined rules — Allow you to:
• Open the access-protection rule category in one of the user interface consoles.
• Select the block and report action to take if the rule is broken.
• User-defined rules — Allow you to:
• Create the user-defined rule category with one of the user interface consoles.
• Choose which type of blocking the rule enforces: port blocking, file and folder blocking,
or registry blocking.
• Configure the rule details.
• Save the rule and modify it in the future, if needed.
Tasks
Configuring predefined rules
Configuring user-defined rules
Port blocking rule options
File and folder blocking rule options
Registry blocking rule options
Include or exclude specific process options
Removing user-defined rules
Configuring predefined rules
Use predefined rules to protect your computer from unwanted changes. These rules can be
enabled and edited, but they cannot be deleted.
The predefined access protection rules include:
• Anti-spyware Standard Protection
• Anti-spyware Maximum Protection
• Anti-virus Standard Protection
• Anti-virus Maximum Protection
• Anti-virus Outbreak Control
• Common Standard Protection
• Common Maximum Protection
• Virtual Machine Protection
Refer to How access protection rules are defined for details about these predefined access
protection rules.
Configure the predefined access protection rules using one of these user interface consoles.
26
McAfee VirusScan Enterprise 8.8 Product Guide
Part I - Prevention: Avoiding Threats
Protecting your system access points
ePolicy Orchestrator 4.5 or 4.6
From the Access Protection Policies, configure the predefined access-protection rules.
Task
For option definitions, click ? in the interface.
1
Click Menu | Policy | Policy Catalog, then from the Product list select VirusScan
Enterprise 8.8.0. The Category list displays the policy categories for VirusScan Enterprise
8.8.0.
2
Edit an existing policy or create a new policy:
Edit an existing policy
a From the Category list, select the policy category.
b From the Actions column, click Edit Setting to open the policy configuration page.
Create a new policy
a Click Actions | New Policy to open New Policy dialog box.
b From the Category list, select an existing policy.
c From the Create a new policy based on this existing policy list, select one of the
settings.
d Type a new policy name.
e Type any notes, if required.
f
Click OK. The new policy appears in the list of existing policies.
g From the Actions column of the new policy, click Edit Setting to open the policy
configuration page.
3
From the Settings for list, select Workstation or Server.
4
From the Access Protection Policy page, click the Access Protection tab to display the
Access Protection Rules.
5
Select the one of the predefined rule categories in the left pane, then select the specific
rule in the right pane.
6
Configure the Block or Report options, or both Block and Report.
7
Click Edit to configure Rule Details.
ePolicy Orchestrator 4.0
From the Access Protection Policies, configure the predefined access-protection rules.
Task
For option definitions, click ? in the interface.
1
Click Systems | Policy Catalog, then from the Product list select VirusScan Enterprise
8.8.0. The Category list displays the policy categories for VirusScan Enterprise 8.8.0.
2
Edit an existing policy or create a new policy:
Edit an existing policy
a From the Category list, select the policy category.
b From the Actions column, click Edit to open the policy configuration page.
Create a new policy
a Click New Policy to open New Policy dialog box.
McAfee VirusScan Enterprise 8.8 Product Guide
27
Part I - Prevention: Avoiding Threats
Protecting your system access points
b From the Create a new policy based on this existing policy list, select one of the
settings.
c Type a new policy name.
d Click OK. The new policy appears in the list of existing policies.
3
From the Settings for list, select Workstation or Server.
4
From the Access Protection Policy page, click the Access Protection tab to display the
Access Protection Rules.
5
Select the one of the predefined rule categories in the left pane, then select the specific
rule in the right pane.
6
Configure the Block or Report options, or both Block and Report.
7
Click Edit to configure Rule Details.
VirusScan Console
From the Access Protection properties, configure the predefined access-protection rules.
Task
For option definitions, click Help in the interface.
1
From the Task list, right-click Access Protection, then click Properties to open the
dialog box.
2
From the Access Protection Policy dialog box, click the Access Protection tab to display
the Access Protection Rules.
3
Select the one of the predefined rule categories in the left pane, then select the specific
rule in the right pane.
4
Configure the Block or Report options, or both Block and Report.
5
Click Edit to configure Rule Details.
Configuring user-defined rules
Create and edit user-defined rules to supplement the protection provided by the predefined
rules.
Refer to How access protection rules are defined for details about the predefined access
protection rules.
Create and edit the user-defined rules access protection rules using one of these user interface
consoles.
ePolicy Orchestrator 4.5 or 4.6
From the Access Protection Policies, configure the user-defined access-protection rules.
Task
For option definitions, click ? in the interface.
28
1
Click Menu | Policy | Policy Catalog, then from the Product list select VirusScan
Enterprise 8.8.0. The Category list displays the policy categories for VirusScan Enterprise
8.8.0.
2
Edit an existing policy or create a new policy:
McAfee VirusScan Enterprise 8.8 Product Guide
Part I - Prevention: Avoiding Threats
Protecting your system access points
Edit an existing policy
a From the Category list, select the policy category.
b From the Actions column, click Edit Setting to open the policy configuration page.
Create a new policy
a Click Actions | New Policy to open New Policy dialog box.
b From the Category list, select an existing policy.
c From the Create a new policy based on this existing policy list, select one of the
settings.
d Type a new policy name.
e Type any notes, if required.
f
Click OK. The new policy appears in the list of existing policies.
g From the Actions column of the new policy, click Edit Setting to open the policy
configuration page.
3
From the Settings for list, select Workstation or Server.
4
Select the User-defined Rules category in the left pane, then click New to open the
Select the new rule type dialog box.
5
Select the rule type and click OK. Refer to Types of user-defined rules for details.
The access rule dialog box that appears depends on the rule type selected.
6
Configure these access rule details.
• Network Port Access Protection Rule — Refer to the options table in Port blocking
rule options.
• File/Folder Access Protection Rule — Refer to the options table in File and folder
blocking rule options.
• Registry Access Protection Rule — Refer to the options table in Registry blocking
rule options.
NOTE: To configure which processes to include and exclude, refer to Include or exclude
specific process options.
7
Click OK.
The new user-defined rule appears in the right-hand pane under Block/Report/Rules. To
modify the new rule, select it and click Edit.
ePolicy Orchestrator 4.0
From the Access Protection Policies, configure the user-defined access-protection rules.
Task
For option definitions, click ? in the interface.
1
Click Systems | Policy Catalog, then from the Product list select VirusScan Enterprise
8.8.0. The Category list displays the policy categories for VirusScan Enterprise 8.8.0.
2
Edit an existing policy or create a new policy:
Edit an existing policy
a From the Category list, select the policy category.
b From the Actions column, click Edit to open the policy configuration page.
Create a new policy
McAfee VirusScan Enterprise 8.8 Product Guide
29
Part I - Prevention: Avoiding Threats
Protecting your system access points
a Click New Policy to open New Policy dialog box.
b From the Create a new policy based on this existing policy list, select one of the
settings.
c Type a new policy name.
d Click OK. The new policy appears in the list of existing policies.
3
From the Settings for list, select Workstation or Server.
4
Select the User-defined Rules category in the left pane, then click New to open the
Select the new rule type dialog box.
5
Select the rule type and click OK. Refer to Types of user-defined rules for details.
The access rule dialog box that appears depends on the rule type selected.
6
Configure these access rule details.
• Network Port Access Protection Rule — Refer to the options table in Port blocking
rule options.
• File/Folder Access Protection Rule — Refer to the options table in File and folder
blocking rule options.
• Registry Access Protection Rule — Refer to the options table in Registry blocking
rule options.
NOTE: To configure which processes to include and exclude, refer to Include or exclude
specific process options.
7
Click OK.
The new user-defined rule appears in the right-hand pane under Block/Report/Rules. To
modify the new rule, select it and click Edit.
VirusScan Console
From the Access Protection properties, configure the user-defined access-protection rules.
Task
For option definitions, click ? in the interface.
1
From the Task list, right-click Access Protection, then click Properties to open the
dialog box.
2
Select the User-defined Rules category in the left pane, then click New to open the
Select New Type Rule dialog box.
3
Select the rule type and click OK. Refer to Types of user-defined rules for details.
The access rule dialog box that appears depends on the rule type selected.
4
Configure these access rule details.
• Network Port Access Protection Rule — Refer to the options table in Port blocking
rule options.
• File/Folder Access Protection Rule — Refer to the options table in File and folder
blocking rule options.
• Registry Access Protection Rule — Refer to the options table in Registry blocking
rule options.
NOTE: To configure which processes to include and exclude, refer to Include or exclude
specific process options.
30
McAfee VirusScan Enterprise 8.8 Product Guide
Part I - Prevention: Avoiding Threats
Protecting your system access points
5
Click OK.
The new user-defined rule appears in the right-hand pane in the Rules column. To modify
the new rule, select it and click Edit.
Port blocking rule options
Port blocking rules stop users from accessing specified inbound and outbound ports, and they
prevent other computers from accessing the computer.
Option definitions
Option
Definition
Rule Name
Type the name for this rule.
Processes to include
Restrict access to the specified processes.
Processes to exclude
Allow access to the specified processes.
Starting Port
Specify the first port number. This can be a single port or the starting number of a range
of ports.
NOTE: If you block access to a port that is used by the McAfee Agent, or the Host
Intrusion Prevention Agent, the agent’s processes are trusted and are allowed to
communicate with the blocked port. All other traffic not related to these agent processes
is blocked.
Ending Port
Specify the last port number in a range of ports.
Inbound
Prevent systems on the network from accessing the specified ports.
Outbound
Prevent local processes from accessing the specified ports on the network.
File and folder blocking rule options
File and folder blocking rules prevent unauthorized users from altering, opening or deleting
specified files or folders.
Option definitions
Option
Definition
Rule name
Type the name for this rule.
Processes to include
Restrict access to the specified processes.
Processes to exclude
Allow access to the specified processes.
File or folder name to
block
Block access to the specified file or folder.
Browse file
Navigate to the file.
Browse folder
Navigate to the folder.
Read access to files
Block read access to the specified files.
Write access to files
Block write access to the specified files.
Files being executed
Block files from being executed in the specified folder.
New files being created
Block new files from being created in the specified folder.
McAfee VirusScan Enterprise 8.8 Product Guide
31
Part I - Prevention: Avoiding Threats
Protecting your system access points
Option
Definition
Files being deleted
Block files from being deleted from the specified folder.
Registry blocking rule options
Registry blocking rules prevent users and unauthorized programs from altering, opening, or
deleting specified registry keys and values.
NOTE: When creating a registry blocking rule, use the best matching hive registry subtree
abbreviation. For example, to block HKLM\System\CurrentControlSet\Services\MyService, choose
the HKCCS hive rather than HKLM.
Option definitions
Option
Definition
Rule Name
Specify the name for this rule.
Processes to include
Restrict access to the specified processes.
Processes to exclude
Allow access to the specified processes.
Registry key or value to
protect
Protect this registry key or value:
•
Select a root key or value from the drop-down list.
• Type a key or value in the text box.
Selecting the root key or value from the drop-down list is optional. Use either of these
methods to specify the key or value:
Rule type
•
Select the root key or value from the drop-down list, then type the remaining path
to the key or value in the text box.
•
Type the full path to the key or value in the text box.
Select the type of rule:
•
Key — This rule protects the specified key.
•
Value — This rule protects the specified value.
Write to key or value
Block writing to the specified key or value.
Create key or value
Block creating the specified key or value.
Delete key or value
Block deleting the specified key or value.
Include or exclude specific process options
To change the rule details, such as the name, and which process to include or exclude, use
Access Protection and click Edit.
Option definitions
32
Option
Description
Rule Name
The name of this rule. For example, Prevent registry editor and Task Manager from
being disabled.
Processes to include
Restrict access to these processes. Use the exact process name or use a wildcard to
specify a broad range of processes such as *.EXE, then add exclusions for specific
processes that are legitimate, such as SETUP.EXE. For example, specify * to include all
processes.
McAfee VirusScan Enterprise 8.8 Product Guide
Part I - Prevention: Avoiding Threats
Protecting your system access points
Option
Description
Processes to exclude
Allow access to these processes. Use the exact process name. For example, specify these
exclusions: avtask.exe, cfgwiz,exe, fssm32.exe, giantantispywar*, kavsvc.exe, mmc.exe,
navw32.exe, nmain.exe, rtvscan.exe.
Removing user-defined rules
Remove rules that you created but no longer use.
Remove the user-defined rules using one of these user interface consoles.
ePolicy Orchestrator 4.5 or 4.6
From the Access Protection Policies, remove rules that you created but no longer use.
Task
For option definitions, click ? or Help in the interface.
1
Click Menu | Policy | Policy Catalog, then from the Product list select VirusScan
Enterprise 8.8.0. The Category list displays the policy categories for VirusScan Enterprise
8.8.0.
2
Edit an existing policy or create a new policy:
Edit an existing policy
a From the Category list, select the policy category.
b From the Actions column, click Edit Setting to open the policy configuration page.
Create a new policy
a Click Actions | New Policy to open New Policy dialog box.
b From the Category list, select an existing policy.
c From the Create a new policy based on this existing policy list, select one of the
settings.
d Type a new policy name.
e Type any notes, if required.
f
Click OK. The new policy appears in the list of existing policies.
g From the Actions column of the new policy, click Edit Setting to open the policy
configuration page.
3
From the Settings for list, select Workstation or Server.
4
Select the User-defined Rules category in the left pane, then select the rule you want
to remove in the right pane.
5
Click Delete.
NOTE: To disable a rule without deleting it, deselect the Block and Report actions. You
can enable the rule again if necessary.
ePolicy Orchestrator 4.0
From the Access Protection Policies, remove rules that you created but no longer use.
McAfee VirusScan Enterprise 8.8 Product Guide
33
Part I - Prevention: Avoiding Threats
Blocking buffer overflow exploits
Task
For option definitions, click ? or Help in the interface.
1
Click Systems | Policy Catalog, then from the Product list select VirusScan Enterprise
8.8.0. The Category list displays the policy categories for VirusScan Enterprise 8.8.0.
2
Edit an existing policy or create a new policy:
Edit an existing policy
a From the Category list, select the policy category.
b From the Actions column, click Edit to open the policy configuration page.
Create a new policy
a Click New Policy to open New Policy dialog box.
b From the Create a new policy based on this existing policy list, select one of the
settings.
c Type a new policy name.
d Click OK. The new policy appears in the list of existing policies.
3
From the Settings for list, select Workstation or Server.
4
Select the User-defined Rules category in the left pane, then select the rule you want
to remove in the right pane.
5
Click Delete.
NOTE: To disable a rule without deleting it, deselect the Block and Report actions. You
can enable the rule again if necessary.
VirusScan Console
From the Access Protection properties, remove rules that you created but no longer use.
Remove the user-defined rules using one of these user interface consoles.
Task
For option definitions, click ? or Help in the interface.
1
From the Task list, right-click Access Protection, then click Properties to open the
dialog box.
2
Select the User-defined Rules category in the left pane, then select the rule you want
to remove in the right pane.
3
Click Delete.
NOTE: To disable a rule without deleting it, deselect the Block and Report actions. You
can enable the rule again if necessary.
Blocking buffer overflow exploits
Buffer overflow protection prevents exploited buffer overflows from executing arbitrary code
on your computer. It monitors user-mode API calls and recognizes when they are called as a
result of a buffer overflow.
When a detection occurs, information is recorded in the activity log and displayed in the
On-Access Scan Messages dialog box, if you configured those options to do so.
34
McAfee VirusScan Enterprise 8.8 Product Guide
Part I - Prevention: Avoiding Threats
Blocking buffer overflow exploits
VirusScan Enterprise uses a Buffer Overflow and Access Protection DAT file to protect
approximately 30 applications, for example, Internet Explorer, Microsoft Outlook, Outlook
Express, Microsoft Word, and MSN Messenger.
Contents
How buffer overflow exploits occur
Configuring buffer overflow protection
How buffer overflow exploits occur
Attackers use buffer overflow exploits to run executable code by overflowing the fixed-size
memory buffers reserved for an input process. This code lets the attacker take over the target
computer or compromise its data.
There are two types of buffer overflow exploits:
• Heap based attacks — They flood the memory space reserved for a program, but they
are difficult to perform and rare.
• Stack based attacks — They use the stack memory objects to store user input and are
the most common.
The following process describes stack-based buffer overflow attacks:
1
Normal stack memory process — The fixed-size stack memory object is usually empty
and waiting for user input. When a program receives input from the user, such as their
name, the data is stored on top of the stack and assigned a return memory address. When
the stack is processed, the user's input is sent to the return address specified by the
program.
2
Overflowing the stack — When the program is written, a specific amount of memory
space is reserved for the data. The stack overflows if the data written is larger than the
space reserved for it within the memory stack. This is only a problem when combined with
malicious input.
3
Exploiting the overflow — If the program is waiting for a user to enter their name, but
the attacker enters an executable command that exceeds the stack size, that command is
saved outside of the reserved space.
4
Running the malicious code — The command is not automatically run just because it
exceeds the stack buffer space. But it could be if a return address that points to the malicious
command is provided by the attacker. Initially the program starts to crash because of the
buffer overflow, but the program tries to recover by using the return address provided by
the attacker. If the return address is a valid address, the malicious command is executed.
5
Exploiting the permissions — Since programs usually run either in kernel mode or with
permissions inherited from a service account, the malicious code is now running with the
same permissions as the application that was compromised. This could mean the attacker
can gain full control of the operating system.
Configuring buffer overflow protection
To prevent applications from executing arbitrary code on your computer you must configure
the Buffer Overflow Protection Policies.
Configure the Buffer Overflow Protection Policies with the following user interface consoles.
McAfee VirusScan Enterprise 8.8 Product Guide
35
Part I - Prevention: Avoiding Threats
Blocking buffer overflow exploits
ePolicy Orchestrator 4.5 or 4.6
Configure the Buffer Overflow Protection Policies with this user interface consoles.
Task
For option definitions, click ? in the interface.
1
Click Menu | Policy | Policy Catalog, then from the Product list select VirusScan
Enterprise 8.8.0. The Category list displays the policy categories for VirusScan Enterprise
8.8.0.
2
Edit an existing policy or create a new policy:
Edit an existing policy
a From the Category list, select the policy category.
b From the Actions column, click Edit Setting to open the policy configuration page.
Create a new policy
a Click Actions | New Policy to open New Policy dialog box.
b From the Category list, select an existing policy.
c From the Create a new policy based on this existing policy list, select one of the
settings.
d Type a new policy name.
e Type any notes, if required.
f
Click OK. The new policy appears in the list of existing policies.
g From the Actions column of the new policy, click Edit Setting to open the policy
configuration page.
3
From the Settings for list, select Workstation or Server.
4
From the Buffer Overflow Protection Policies page, click the Buffer Overflow Protection
tab and configure the following:
a Enable Buffer overflow settings and the protection mode used. Configure the
protection mode to either block the exploit or simply send a message and log the event.
b Enable the Client system warnings that are sent when a buffer overflow exploit
occurs.
c Configure Buffer overflow exclusions for specific application programming interface
(API) values, plus the optional processes and module names to exclude.
5
Click the Reports tab, enable the scanning activity log files, where they are stored, their
size, and format.
NOTE: These log files are very helpful when you diagnose security threats and help
determine what actions to take against these threats.
ePolicy Orchestrator 4.0
Configure the Buffer Overflow Protection Policies with this user interface console.
Task
For option definitions, click ? in the interface.
1
36
Click Systems | Policy Catalog, then from the Product list select VirusScan Enterprise
8.8.0. The Category list displays the policy categories for VirusScan Enterprise 8.8.0.
McAfee VirusScan Enterprise 8.8 Product Guide
Part I - Prevention: Avoiding Threats
Blocking buffer overflow exploits
2
Edit an existing policy or create a new policy:
Edit an existing policy
a From the Category list, select the policy category.
b From the Actions column, click Edit to open the policy configuration page.
Create a new policy
a Click New Policy to open New Policy dialog box.
b From the Create a new policy based on this existing policy list, select one of the
settings.
c Type a new policy name.
d Click OK. The new policy appears in the list of existing policies.
3
From the Settings for list, select Workstation or Server.
4
From the Buffer Overflow Protection Policies page, click the Buffer Overflow Protection
tab and configure the following:
5
1
Enable Buffer overflow settings and the protection mode used. Configure the
protection mode to either block the exploit or simply send a message and log the
event.
2
Enable the Client system warnings that are sent when a buffer overflow exploit
occurs.
3
Configure Buffer overflow exclusions for specific application programming interface
(API) values, plus the optional processes and module names to exclude.
Click the Reports tab, enable the scanning activity log files, where they are stored, their
size, and format.
NOTE: These log files are very helpful when you diagnose security threats and help
determine what actions to take against these threats.
VirusScan Console
Configure the Buffer Overflow Protection Policies with this user interface console.
Task
For option definitions, click ? in the interface.
1
From the Task list, right-click Buffer Overflow Protection, then click Properties to
open the dialog box.
2
From the Buffer Overflow Protection Properties page, click the Buffer Overflow Protection
tab and configure the following:
a Enable Buffer overflow settings and the protection mode used. Configure the
protection mode to either block the exploit or simply send a message and log the event.
b Enable the Client system warnings that are sent when a buffer overflow exploit
occurs.
c Configure Buffer overflow exclusions for specific application programming interface
(API) values, plus the optional processes and module names to exclude.
3
Click the Reports tab, enable the scanning activity log files, where they are stored, their
size, and format.
NOTE: These log files are very helpful when you diagnose security threats, and help
determine what actions to take against these threats.
McAfee VirusScan Enterprise 8.8 Product Guide
37
Part I - Prevention: Avoiding Threats
Restricting potentially unwanted programs
Restricting potentially unwanted programs
VirusScan Enterprise protects your computer from potentially unwanted programs that are a
nuisance or present a security risk. One common unwanted program policy is configured, but
you can individually enable or disable the policy and specify actions for each of the VirusScan
Enterprise scanners.
Potentially unwanted programs (PUPs) are defined as software programs written by legitimate
companies that can alter the security state, or the privacy policy of the computer on which they
are installed. This software can, but does not necessarily, include spyware, adware, and dialers.
These embedded PUPs can be downloaded with a program that you actually want.
Security-minded users recognize such programs and, in some cases, remove them.
Configuring unwanted programs
To protect your computer from potentially unwanted programs you must configure categories
of unwanted programs to detect in your environment.
Configuration is a two-step process:
1
Configure the Unwanted Programs Policy to define which potentially unwanted programs
to detect and exclude:
• Select whole categories of programs or specific programs within a category from a
predefined list which comes from the current DAT file.
• Specify exclusions.
• Create a list of user-defined programs to detect.
2
Enable unwanted program detection in the on-access, email, and on-demand scanners,
then configure which actions to take when an unwanted program is detected.
NOTE: Detecting unwanted programs is enabled for the on-demand scanner differently because
the on-demand scan is a task not a policy. See Configuring on-demand scan tasks for details.
Tasks
Accessing the unwanted programs policies
Enabling unwanted program detection in the on-access and email scanners
Accessing the unwanted programs policies
Configure the unwanted program policies by selecting the categories of unwanted programs to
detect. For example, spyware and adware. You can also specify exclusions for programs not to
detect.
Access the unwanted programs policies using the following user interface consoles.
ePolicy Orchestrator 4.5 or 4.6
Configure the Unwanted Programs Policies with this user interface console.
Task
For option definitions, click ? in the interface.
38
McAfee VirusScan Enterprise 8.8 Product Guide
Part I - Prevention: Avoiding Threats
Restricting potentially unwanted programs
1
Click Menu | Policy | Policy Catalog, then from the Product list select VirusScan
Enterprise 8.8.0. The Category list displays the policy categories for VirusScan Enterprise
8.8.0.
2
Edit an existing policy or create a new policy:
Edit an existing policy
a From the Category list, select the policy category.
b From the Actions column, click Edit Setting to open the policy configuration page.
Create a new policy
a Click Actions | New Policy to open New Policy dialog box.
b From the Category list, select an existing policy.
c From the Create a new policy based on this existing policy list, select one of the
settings.
d Type a new policy name.
e Type any notes, if required.
f
Click OK. The new policy appears in the list of existing policies.
g From the Actions column of the new policy, click Edit Setting to open the policy
configuration page.
3
From the Settings for list, select Workstation or Server.
4
From the Unwanted Programs Policy page, click the Scan Items tab to configure:
a Categories of unwanted programs to detect — For example, spyware and adware.
These categories are defined by the current DAT file.
b Exclusions — You must specify the exact detection name that you want to exclude,
not the file name.
5
Click the User-Defined Detections tab and specify the individual files or programs to
treat as unwanted programs. Specify each item by file name and provide a description for
each item.
ePolicy Orchestrator 4.0
Configure the Unwanted Programs Policies with this user interface console.
Task
For option definitions, click ? in the interface.
1
Click Systems | Policy Catalog, then from the Product list select VirusScan Enterprise
8.8.0. The Category list displays the policy categories for VirusScan Enterprise 8.8.0.
2
Edit an existing policy or create a new policy:
Edit an existing policy
a From the Category list, select the policy category.
b From the Actions column, click Edit to open the policy configuration page.
Create a new policy
a Click New Policy to open New Policy dialog box.
b From the Create a new policy based on this existing policy list, select one of the
settings.
c Type a new policy name.
d Click OK. The new policy appears in the list of existing policies.
McAfee VirusScan Enterprise 8.8 Product Guide
39
Part I - Prevention: Avoiding Threats
Restricting potentially unwanted programs
3
From the Settings for list, select Workstation or Server.
4
From the Unwanted Programs Policy page, click the Scan Items tab to configure:
a Categories of unwanted programs to detect — For example, spyware and adware.
These categories are defined by the current DAT file.
b Exclusions — You must specify the exact detection name that you want to exclude,
not the file name.
5
Click the User-Defined Detections tab and specify the individual files or programs to
treat as unwanted programs. Specify each item by file name and provide a description for
each item.
VirusScan Console
Configure the Unwanted Programs properties using this user interface console.
Task
For option definitions, click Help in the interface.
1
From the Task list, right-click Unwanted Programs Policy, then click Properties to
open the Unwanted Programs Policy dialog box.
2
From the Unwanted Programs Policy page, click the Scan Items tab to configure:
a Categories of unwanted programs to detect — For example, spyware and adware.
These categories are defined by the current DAT file.
b Exclusions — You must specify the exact detection name that you want to exclude,
not the file name.
3
Click the User-Defined Detections tab and specify the individual files or programs to
treat as unwanted programs. Specify each item by file name and provide a description for
each item.
Enabling unwanted program detection in the on-access and email scanners
For the on-access and email scanners to detect unwanted programs you must enable the feature
from the Scan Items tab.
Enable on-access and email scanners to detect unwanted programs using the following user
interface consoles.
NOTE: To enable the on-demand scanner to detect unwanted programs, refer to Configuring
on-demand scan tasks.
ePolicy Orchestrator 4.5 or 4.6
Enable on-access and email scanners to detect unwanted programs using the ePolicy Orchestrator
4.5 or 4.6 console.
The process used to enable unwanted program detection for on-access and email scanners is
essentially the same. The only difference is which policy you select in the policy catalog for step
2. To enable unwanted program detection for:
• On-access scanning — Select On-Access Scan Policies.
• Email scanning — Select On-Delivery Email Policies.
40
McAfee VirusScan Enterprise 8.8 Product Guide
Part I - Prevention: Avoiding Threats
Restricting potentially unwanted programs
Task
For option definitions, click ? in the interface.
1
Click Menu | Policy | Policy Catalog, then from the Product list select VirusScan
Enterprise 8.8.0. The Category list displays the policy categories for VirusScan Enterprise
8.8.0.
2
Edit an existing policy or create a new policy:
Edit an existing policy
a From the Category list, select the policy category.
b From the Actions column, click Edit Setting to open the policy configuration page.
Create a new policy
a Click Actions | New Policy to open New Policy dialog box.
b From the Category list, select an existing policy.
c From the Create a new policy based on this existing policy list, select one of the
settings.
d Type a new policy name.
e Type any notes, if required.
f
Click OK. The new policy appears in the list of existing policies.
g From the Actions column of the new policy, click Edit Setting to open the policy
configuration page.
3
From the Settings for list, select Workstation or Server.
4
From the On-Access Scan Policies or On-Delivery Email Policies page, click the Scan
Items tab and select Detect unwanted programs.
ePolicy Orchestrator 4.0
Enable on-access and email scanners to detect unwanted programs using the ePolicy Orchestrator
4.0 console.
The process used to enable unwanted program detection for on-access and email scanners is
essentially the same. The only difference is which policy you select in the policy catalog for step
2. To enable unwanted program detection for:
• On-access scanning — Select On-Access Scan Policies.
• Email scanning — Select On-Delivery Email Policies.
Task
For option definitions, click ? in the interface.
1
Click Systems | Policy Catalog, then from the Product list select VirusScan Enterprise
8.8.0. The Category list displays the policy categories for VirusScan Enterprise 8.8.0.
2
Edit an existing policy or create a new policy:
Edit an existing policy
a From the Category list, select the policy category.
b From the Actions column, click Edit to open the policy configuration page.
Create a new policy
a Click New Policy to open New Policy dialog box.
b From the Create a new policy based on this existing policy list, select one of the
settings.
McAfee VirusScan Enterprise 8.8 Product Guide
41
Part I - Prevention: Avoiding Threats
Updating detection definitions
c Type a new policy name.
d Click OK. The new policy appears in the list of existing policies.
3
From the Settings for list, select Workstation or Server.
4
From the On-Access Scan Policies or On-Delivery Email Policies page, click the Scan
Items tab and select Detect unwanted programs.
VirusScan Console
Enable on-access and email scanners to detect unwanted programs using the VirusScan Console.
The process used to enable unwanted program detection for on-access and email scanners is
essentially the same. The only difference is which task you select in the VirusScan Console for
step 2. To enable unwanted program detection for:
• On-access scanning — Select On-Access Scan Policies.
• Email scanning — Select On-Delivery Email Scanner.
Task
For option definitions, click Help in the interface.
1
From the Task list, right-click one of the following, then click Properties to open its dialog
box:
• On-Access Scan Policies — For on-access scanning.
• On-Delivery Email Scanner — For email scanning.
2
From the On-Access Scan Policies or On-Delivery Email Policies page, click the Scan
Items tab and select Detect unwanted programs.
Updating detection definitions
The VirusScan Enterprise software depends on the scanning engine and the information in the
detection definition (DAT) files to identify and take action on threats. New threats appear on a
regular basis. To meet this challenge, McAfee releases new DAT files every day that incorporate
the results of its ongoing threat research. The update task retrieves the most current DAT files
from the external McAfee update site and installs them.
NOTE: An ePolicy Orchestrator-managed environment can also retrieve the most current DAT
files, EXTRA.DAT file, scanning engine, Service Packs, and Patches.
Contents
DAT files and how they work
The importance of an update strategy
Update tasks and how they work
Mirror tasks and how they work
How the AutoUpdate repository works
How rolling back DAT files works
42
McAfee VirusScan Enterprise 8.8 Product Guide
Part I - Prevention: Avoiding Threats
Updating detection definitions
DAT files and how they work
When the scanning engine searches through files looking for threats, it compares the contents
of the scanned files to known threat information stored in the detection definition (DAT) files.
The known threat information, called signatures, is information McAfee Labs has found and
added to the DAT files.
Besides the signatures, the DAT files also includes how to clean and counteract the damage
created by the detected virus. That is why it is so important to download the most recent version
of DAT file used by VirusScan Enterprise.
CAUTION: If the signature of a certain virus is not contained in any of the DAT files you have
installed, that virus will not be detected by the scanning engine. Also, the scanning engine must
be the latest version to be able to fully utilize the latest DAT files.
VirusScan Enterprise also uses heuristics, called Artemis, to check for suspicious files along with
the DAT files. Refer to How Artemis works for more information.
The various DAT files are stored at the following path:
\Program Files\Common Files\McAfee\Engine
The importance of an update strategy
The importance of an update strategy cannot be overstated. Without the latest DAT files and
scanning engine installed on your system, it is not fully protected from the latest viruses. There
has been an unprecedented rise in the number, propagation rate, and prevalence of new
malware. In addition, the growing amount of adware and spyware requires more consistent
and available detection and removal.
McAfee Labs releases DAT file updates at about 6:00 PM (GMT) almost every day. Naturally,
outbreaks will still occur at awkward times and require emergency releases. When a daily DAT
is released early, to pre-empt a potential outbreak, no second DAT is released that day at the
normally scheduled time, unless another emergency situation requires one.
How an update strategy is determined
You can update the DAT files and scanning engine, used by VirusScan Enterprise, using many
methods. You can use AutoUpdate tasks, manual updates, login scripts, or schedule updates
with management tools.
Using an update task allows you to:
• Schedule network-wide DAT file rollouts — You might stagger your update tasks, or
set a schedule that phases in DAT file updates to different parts of the network at convenient
times and with minimal intervention from administrators or network users.
• Split duties for rollout administration — To increase network bandwidth efficiency, use
different servers or domain controllers, among different regions of wide-area networks, or
across other network divisions to keep update traffic primarily internal. This can also reduce
the potential for network security breaches.
• Reduce the waiting time required to download new DAT or upgraded engine files
— Traffic on McAfee computers increases dramatically on regular DAT file publishing dates
and whenever new product versions are available. Avoiding the competition for network
bandwidth enables you to deploy your new software with minimal interruptions.
McAfee VirusScan Enterprise 8.8 Product Guide
43
Part I - Prevention: Avoiding Threats
Updating detection definitions
Requirements for an efficient update strategy
An efficient updating strategy generally requires at least one client or server in your organization
to retrieve updates from the McAfee download site. From there, the files can be replicated
throughout your organization, providing access for all other computers. Ideally, you should
minimize the amount of data transferred across your network by automating the process of
copying the updated files to your share sites.
The main factors to consider for efficient updating are the number of clients and the number
of sites. You might also consider the number of systems at each remote site and how remote
sites access the Internet. The basic concepts of using a central repository to retrieve updates
and scheduling update tasks to keep your environment up-to-date apply to any size organization.
For deploying software and update information, see the appropriate ePolicy Orchestrator product
guide.
Update tasks and how they work
Use the update task to get the most current DAT files, scanning engine, and service packs and
patches.
VirusScan Enterprise includes a default update task which runs every day at 5:00 p.m. with
one-hour randomization. You can create additional update tasks as needed.
Update task activities
These activities occur when you run an update task:
• A connection is made to the first enabled repository (update site) in the repository list. If
this repository is not available, the next site is contacted, and so on until a connection is
made, or until the end of the list is reached.
• An encrypted CATALOG.Z file downloads from the repository. The file contains the
fundamental data required to update. This data is used to determine which files and updates
are available.
• The software versions in the file are checked against the versions on the computer. If new
software updates are available, they are downloaded.
Update task interruption
If the update task is interrupted for any reason during the update:
• A task updating from an HTTP, UNC, or local site resumes where it left off the next time the
update task starts.
• A task updating from an FTP site does not resume if interrupted during a single file download.
However, if the task is downloading several files and is interrupted, the task resumes before
the file that was being downloaded at the time of the interruption.
Update using EXTRA.DAT
An EXTRA.DAT file can be used as a temporary measure in an emergency. The EXTRA.DAT is
downloaded from the repository on each update. This ensures that if you modify and re-check
in the EXTRA.DAT in as a package, all VirusScan Enterprise clients download and use the same
updated EXTRA.DAT package. For example, you may use the EXTRA.DAT as an improved
detector for the same potentially unwanted program or additional detection for other new
potentially unwanted programs. VirusScan Enterprise supports using only one EXTRA.DAT file.
TIP: When you have finished using the EXTRA.DAT file, you should remove it from the master
repository and run a replication task to ensure it is removed from all distributed repository sites.
This stops VirusScan Enterprise clients from attempting to download the EXTRA.DAT file during
44
McAfee VirusScan Enterprise 8.8 Product Guide
Part I - Prevention: Avoiding Threats
Updating detection definitions
an update. By default, detection for the new potentially unwanted program in the EXTRA.DAT
is ignored once the new detection definition is added to the daily DAT files.
Configuring the AutoUpdate task
To update DAT files and scan engines automatically for all McAfee products, you must configure
the AutoUpdate properties and schedule.
Task
For option definitions, click ? or Help on the tab.
1
To access the AutoUpdate properties use:
• ePolicy Orchestrator 4.5 or 4.6 — Click Menu | Systems | System Tree and
select Client Tasks.
NOTE: Refer to the McAfee ePolicy Orchestrator 4.5 Product Guide for detailed
instructions on creating a new scheduled client task.
• ePolicy Orchestrator 4.0 — Click Systems | System Tree | Client Task and select
an existing update task or to create a new task, click New Task.
NOTE: Refer to the McAfee ePolicy Orchestrator 4.0 Product Guide for detailed
instructions on creating a new scheduled client task.
• VirusScan Console — Select an existing update task (right-click and select Properties),
or create a new task (select Task | New Update Task, select the new task in the
list).
TIP: When you create a new client task, we recommend renaming the task with a
descriptive name.
2
Specify the log file location and format.
3
Configure whether to get newer DATs, newer engine, and other available updates such as
service packs, and product upgrades.
4
Specify which executable to run after the update task has completed and whether to run
it only after a successful update.
5
Click Schedule to configure when and how often the task should run. Refer to, Using
scheduled tasks for details.
6
Click Update Now, the task runs immediately.
Mirror tasks and how they work
The mirror task replicates the update files from the first accessible repository defined in the
repository list, to a mirror site on your network. The most common use of this task is to mirror
the contents of the McAfee download site to a local server.
After you replicate the McAfee site that contains the update files, computers on your network
can download the files from the mirror site. This approach is practical because it allows you to
update any computer on your network, whether or not it has Internet access; and efficient
because your systems are communicating with a server that is probably closer than a McAfee
Internet site, economizing access and download time.
McAfee VirusScan Enterprise 8.8 Product Guide
45
Part I - Prevention: Avoiding Threats
Updating detection definitions
The VirusScan Enterprise software relies on a directory structure to update itself. When mirroring
a site, it is important to replicate the entire directory structure.
NOTE: This directory structure also supports previous versions of VirusScan Enterprise and
NetShield, as long as the entire directory structure is replicated in the same location that
VirusScan Enterprise 8.8 uses for updating.
Configuring the mirror task
To store DAT files and scan engines in a designated location for use by other computers,
configure the location and schedule using mirror task properties.
Task
For option definitions, click ? or Help on the tab.
1
To access the Mirror task properties use:
• ePolicy Orchestrator 4.5 or 4.6 — Click Menu | Systems | System Tree and
select Client Tasks.
NOTE: Refer to the McAfee ePolicy Orchestrator 4.5 Product Guide for detailed
instructions on creating a new scheduled client task.
• ePolicy Orchestrator 4.0 — Click Systems | System tree | Client Task and select
an existing update task or to create a new task, click New Task.
NOTE: Refer to the McAfee ePolicy Orchestrator 4.0 Product Guide for detailed
instructions on creating a new scheduled client task.
• VirusScan Console, perform one of the following:
• Select an existing mirror task, right-click and select Properties. The Mirror Task
dialog box appears.
• To create a new mirror task, select Task | New Mirror Task and a New Update
Task appears in the Task list. Click the new task to open the Mirror Task dialog box.
NOTE: Change the task name to something more descriptive by right-clicking the
task and selecting Rename.
2
VirusScan Console — Select an existing update task (right-click and select Properties),
or create a new task (select Task | New Mirror Task, select the new task in the list).
TIP: When you create a new client task, we recommend renaming the task with a descriptive
name.
46
3
Specify the log file location and format.
4
Configure whether to get newer detection definitions, newer engine and DATs, and other
available updates such as service packs, and product upgrades.
5
Specify which executable to run after the update task has completed and whether to run
it only after a successful update.
6
Click Mirror Location to configure the mirror server destination.
7
Click Schedule to configure when and how often the task should run. Refer to, Using
scheduled tasks for details.
8
Click Mirror Now to run the task immediately.
9
Configure the options on the tab. For option definitions, click ? or Help on the tab.
McAfee VirusScan Enterprise 8.8 Product Guide
Part I - Prevention: Avoiding Threats
Updating detection definitions
Tab definitions
Tab
Definitions
Mirror
•
Specify the log file location and format.
•
Specify which executable to run after the mirror task has completed and whether to
run it only after a successful mirror.
How the AutoUpdate repository works
The AutoUpdate repository list (SITELIST.XML) specifies the configuration information necessary
to perform an AutoUpdate task.
The AutoUpdate repository list includes:
• Repository information and location
• Repository order preference
• Proxy settings, where required
• Encrypted credentials required to access each repository
When an AutoUpdate task is performed, a connection is made to the first enabled repository
(update site) in the repository list. If this repository is not available, the next repository is
contacted, and so on until a connection is made, or until the end of the list is reached.
If your network uses a proxy server, you can specify which proxy settings to use, the address
of the proxy server, and whether to use authentication. Proxy information is stored in the
AutoUpdate repository list. The proxy settings you configure apply to all repositories in the
repository list.
The location of the AutoUpdate repository list depends on your operating system.
• For Microsoft Windows XP, Microsoft Vista, Microsoft 2000 Server, Microsoft 2003 Server,
and Microsoft 2008 Server — C:\Documents and Settings\All Users\Application Data\McAfee\Common
Framework
• For Microsoft Windows 7 — C:\ProgramData\McAfee\Common Framework
Configuring the repository list
The repository list includes the repositories where you retrieve updates. Create and configure
as many repositories as you need. Some sites can be used all the time while others are used
only occasionally.
Task
For option definitions, click Help in the interface.
1
From the VirusScan Console, select Tools | Edit AutoUpdate Repository List to access
the AutoUpdate Repository List properties.
NOTE: To configure the repository feature using the ePolicy Orchestrator console navigate
to the Policy Catalog | McAfee Agent display and click the Repositories tab.
2
Configure the options on the tabs.
McAfee VirusScan Enterprise 8.8 Product Guide
47
Part I - Prevention: Avoiding Threats
Excluding scan items
Tab definitions
Tab
Definitions
Repositories
•
Specify the repositories where you get updates.
•
Configure the order to access the repositories.
Proxy settings
Specify which proxy settings to use when updating.
How rolling back DAT files works
If you find your current DAT files are corrupted or incompatible, you can roll back the DAT files
to the last backed up version.
When you update DAT files, the old version is stored in this location: <drive>:\Program
Files\Common Files\McAfee\Engine\OldDats.
When you rollback the DAT files, the current DAT files are replaced with the version in the
OldDats folder, and a flag is set in the registry at this location:
HKEY_LOCAL_MACHINE\SOFTWARE\McAfee\DesktopProtection\szRolledbackDATS.
Once the rollback occurs, you cannot go back to the previous version again. The next time an
update occurs, the DAT version in the registry is compared with the DAT files in the update
repository. If the new DAT files are the same as those in the registry, no update occurs.
Rolling back DAT files
To revert your DAT files version back to the previous version use the Rollback DATs tool.
Task
For option definitions, click Help in the interface.
1
From the VirusScan Console, select Tools | Rollback DATs.
2
Click Yes to proceed with the DAT rollback.
NOTE: This feature is not available from the ePolicy Orchestrator console.
3
Configure the options on the tab.
Excluding scan items
Each of the VirusScan Enterprise scanners allows you to fine-tune the list of file types scanned.
For example, you can exclude from scanning individual files, folders, and disks. These exclusions
might be needed because the scanners could scan and lock a file when that file is being used
by a database or server. This could cause the database or server to fail or generate errors.
Contents
Specifying exclusions
How to use wildcards to specify scan items
48
McAfee VirusScan Enterprise 8.8 Product Guide
Part I - Prevention: Avoiding Threats
Using scheduled tasks
Specifying exclusions
Specify files, folders, and drives to exclude from scanning operations. You can also remove any
exclusions you specified previously.
Option definitions
Option
Definition
What to exclude
Select the type of exclusion.
•
Exclude by file name/location — Specify the file name, location, and whether
to exclude subfolders.
NOTE: You must add a backslash (\) at the end of the string to apply to a folder.
Otherwise, it is considered a file exclusion and the Also exclude subfolders
checkbox is disabled by default.
When to exclude
How to handle client
exclusions
•
Exclude by file type — Specify a file type(s).
•
Exclude by file age — Specify the access type and minimum age in days.
Select when to exclude the selected item:
•
On read
•
On write
Overwrite client exclusions — Only exclude items specified in this policy. If this
option is not selected, the client computer uses exclusions that were specified locally
and the exclusions specified in this policy.
NOTE: This option is only available via ePolicy Orchestrator.
How to use wildcards to specify scan items
You can use wildcards to exclude types of files by extension.
When using wildcards, these limitations apply.
• Valid wildcards are question mark (?) for excluding single characters and asterisk (*) for
excluding multiple characters.
• Wildcards can appear in front of a back slash (\) in a path. For example: C:\ABC\*\XYZ
matches C:\ABC\DEF\XYZ.
• An exclusion containing question mark (?) characters applies if the number of characters
matches the length of the file or folder name. For example: The exclusion W?? excludes
WWW, but does not exclude WW or WWWW.
• The syntax is extended to include a double asterisk (**), which means zero or more of any
characters including back slash. This allows multiple-depth exclusions. For example:
C:\ABC\**\XYZ matches C:\ABC\DEF\XYZ and C:\ABC\DEF\DEF\XYZ, etc.
Using scheduled tasks
As part of configuring on-demand scan, AutoUpdate, or mirror tasks, you need to specify when,
how often, and for how long these tasks should run. You also need to configure user permissions
as part of the configuration process.
McAfee VirusScan Enterprise 8.8 Product Guide
49
Part I - Prevention: Avoiding Threats
Using scheduled tasks
Contents
Scheduling tasks
Configuring the task schedule
Scheduling tasks
You have the option to schedule on-demand, AutoUpdate, and mirror tasks to run at specific
dates and times, or intervals. The way you schedule tasks depends on the user interface console
you use.
To schedule these tasks:
• ePolicy Orchestrator console — Use the Schedule tab to display the Schedule page.
• VirusScan Console — Use the Schedule button to display the Schedule dialog box.
Configuring the task schedule
To configure a task to run at a specified time or interval, use the Schedule Settings dialog box.
Before you begin
You must have administrator rights to schedule the task. Administrator rights provide the user
with write access to the scheduled task’s registry key.
To schedule a task, click Schedule in the task’s properties dialog box.
CAUTION: McAfee recommends scheduling on-demand scans at minimum intervals.
Recommended McAfee minimum intervals:
• Daily — Only if you have had a major malware outbreak.
• Weekly — Recommended.
• Monthly — Acceptable.
• Quarterly — The bare minimum.
Tab definitions
Tab
Definitions
Task
•
Enable scheduled task to run at specified times.
•
Stop the task if it runs for the specified hours and minutes.
•
Specify user account settings; user name, domain, and password.
Schedule
50
Specify the schedule frequency and associated settings.
McAfee VirusScan Enterprise 8.8 Product Guide
Part II - Detection: Finding Threats
Finding threats is the second step in a protection strategy to detect malware attempting to gain
access to your system.
Contents
Scanning items on-access
Scanning items on-demand
Scanning email on-delivery and on-demand
Scanning items on-access
The on-access scanner examines files on your computer as they are accessed, which provides
continuous, real-time detection of threats. Both the Access Protection and Buffer Overflow
Protection features also use the on-access scanner to detect access violations and buffer overflow
exploits respectively.
Contents
On-access scanning and how it works
Scanning comparison: writing to disk vs. reading from disk
Scanning comparison: scanning all files vs. scanning default + additional file types
Script scanning and how it works
Determine the number of scanning policies
How Artemis works
How general and process settings are configured
On-access scanning and how it works
The on-access scanner hooks into the system at the lowest levels (File-System Filter Driver), it
scans files where they first enter your system. The on-access scanner acts as part of the system
(System Service), and delivers notifications via the interface when detections occur.
When an attempt is made to open, close, or rename a file, the scanner intercepts the operation
and takes these actions.
1
The scanner determines if the file should be scanned based on this criteria:
• The file’s extension matches the configuration.
• The file has not been cached.
• The file has not been excluded.
• The file has not been previously scanned.
McAfee VirusScan Enterprise 8.8 Product Guide
51
Part II - Detection: Finding Threats
Scanning items on-access
2
If the file meets the scanning criteria, it is scanned by comparing the information in the
file to the known malware signatures in the currently loaded DAT files.
• If the file is clean, the result is cached and read, write, or rename operation is granted.
• If the file contains a threat, the operation is denied and the configured action is taken.
For example:
• If the file needs to be cleaned, that cleaning process is determined by the currently
loaded DAT files.
• The results are recorded in the activity log, if the scanner was configured to do so.
• The On-Access Scan Messages alert appears describing the file name and the
action taken, if the scanner was configured to do so.
3
If the file does not meet the scanning requirements, it is not scanned. It is cached and the
operation is granted.
NOTE: The scan file cache is flushed and all files are rescanned whenever, for example,
the on-access scan configuration is changed, an EXTRA.DAT file is added, or when the
cache is full.
Scanning comparison: writing to disk vs. reading from disk
The on-access scanner performs scans differently, depending on whether the user is writing to
disk or reading from disk.
When files are being written to disk, the on-access scanner scans these items:
• Incoming files being written to the local hard drive.
• Files being created on the local hard drive or a mapped network drive (this includes new
files, modified files, or files being copied or moved from one drive to another).
NOTE: To scan mapped network drives, you must enable the On Network Drives option.
Refer to Enabling on-network drives.
These scans are only accessible by the same client where VirusScan Enterprise is installed.
It does not detect access to the mapped network drive by other systems.
When files are being read from disk, the on-access scanner scans these items:
• Outgoing files being read from the local hard drive or mapped network drives.
NOTE: To scan mapped network drives, select the On network drives option, described
in the previous bullets, to include remote network files.
• Any file attempting to execute a process on the local hard drive.
• Any file opened on the local hard drive.
• Any file being renamed on the local hard drive, if the file properties have changed.
Scanning comparison: scanning all files vs. scanning default +
additional file types
The on-access scanner scans files differently depending on whether it is configured to scan all
files, or to scan default files plus additional file types.
When scanning All files, the scanner examines every file type for all possible threats.
52
McAfee VirusScan Enterprise 8.8 Product Guide
Part II - Detection: Finding Threats
Scanning items on-access
When scanning Default + additional file types, the scanner examines a list of specific files
based on the file types you select.
• Default file types: The on-access scanner examines the specified file type only for threats
that attack that file type.
• Additional file types: The on-access scanner examines the files with matching extensions
for all possible threats.
• Specified files types: The on-access scanner examines the user defined list of file extensions
for all possible threats.
Script scanning and how it works
The script scanner operates as a proxy component to the real Windows scripting host component.
It intercepts scripts, then scans them before they are executed.
For example, the script scanner confirms:
• If the script is clean, it is passed on to the real scripting host component.
• If the script contains a potential threat, the script is not executed.
Trusted processes and also websites that utilize scripts can be excluded from inspection.
NOTE: On Windows Server 2008 systems, Script Scan URL exclusions do not work with Windows
Internet Explorer unless you click the checkbox Enable third-party browser extensions to
enable the setting and restart Windows Server 2008. For details, see
https://kc.mcafee.com/corporate/index?page=content&id=KB69526.
How Artemis works
The Artemis feature uses heuristics to check for suspicious files. It provides users with
Windows-based McAfee anti-virus products that have the most up-to-date real-time detections
for certain malware.
Artemis does not provide protection for entire classes of malware; just for suspicious samples.
The benefit of protecting against specific threats is the capability to protect users with McAfee
security at virtually the same time that McAfee Labs determines a sample is malicious.
You can configure the administrator-configured sensitivity levels Artemis uses to look for
suspicious programs and DLLs running on client systems protected by VirusScan Enterprise.
When Artemis detects a suspicious program, it sends a DNS request containing a fingerprint of
the suspicious file to a central database server hosted by McAfee Labs.
NOTE: In this release, the Artemis feature is enabled by default, with the sensitivity level set
to very low.
McAfee VirusScan Enterprise 8.8 Product Guide
53
Part II - Detection: Finding Threats
Scanning items on-access
Determine the number of scanning policies
Follow this process to determine whether to configure more than one on-access scanning policy.
How general and process settings are configured
The on-access scanner’s general and process policies are configured separately.
• General Settings — Includes options that apply to all processes.
• Process Settings — Allow you to configure one scanning policy for all processes, or
configure different policies for processes that you define as default, low-risk, and high-risk.
Configuring general settings
General settings apply to the scanning of all processes and include parameters, such as maximum
scan time, scanning scripts, blocking unwanted threats from a remote computer, sending
messages when threats are detected, and reporting detections.
54
McAfee VirusScan Enterprise 8.8 Product Guide
Part II - Detection: Finding Threats
Scanning items on-access
Configure the on-access general settings using the following user interface consoles.
ePolicy Orchestrator 4.5 or 4.6
Configure the general settings that apply to scanning of all processes with this user interface
console.
Task
For option definitions, click ? in the interface.
1
Click Menu | Policy | Policy Catalog, then from the Product list select VirusScan
Enterprise 8.8.0. The Category list displays the policy categories for VirusScan Enterprise
8.8.0.
2
Edit an existing policy or create a new policy:
Edit an existing policy
a From the Category list, select the policy category.
b From the Actions column, click Edit Setting to open the policy configuration page.
Create a new policy
a Click Actions | New Policy to open New Policy dialog box.
b From the Category list, select an existing policy.
c From the Create a new policy based on this existing policy list, select one of the
settings.
d Type a new policy name.
e Type any notes, if required.
f
Click OK. The new policy appears in the list of existing policies.
g From the Actions column of the new policy, click Edit Setting to open the policy
configuration page.
3
From the Settings for list, select Workstation or Server.
4
From the On-Access General Policies page, click the General tab to configure the
general policy that applies to all on-access scanning. For example, which on-access items
to scan, when to scan, the maximum scan time, and if cookies should be scanned.
You can configure scanning of all processes currently running on your system whenever
on-access scanning is enabled. This improves your system security, but it can impact your
system boot-time performance.
To configure the scan processes on enable feature, in the Scan group, click Processes on
enable to scan all processes currently running on your system whenever on-access scanning
is enabled.
NOTE: Enabling this feature can impact the time it takes for your system to boot up.
5
On the ScriptScan tab, enable ScriptScan and configure any processes or URLs to exclude
from scanning.
NOTE: With previous versions of VirusScan Enterprise disabling on-access scanning disabled
ScriptScan. With VirusScan Enterprise 8.8 disabling on-access scanning does not disable
ScriptScan. To disable ScriptScan deselect the Enable scanning of scripts checkbox.
McAfee VirusScan Enterprise 8.8 Product Guide
55
Part II - Detection: Finding Threats
Scanning items on-access
6
On the Blocking tab, configure blocking connections from remote computers that write
files with potential threats or unwanted programs.
NOTE: By default, when a remote system writes any malware to a system with VirusScan
Enterprise, VirusScan Enterprise blocks the connection to that remote system.
You can also configure a message that is sent to the system that has written the malware.
NOTE: To send this message requires Windows Messenger service.
7
On the Messages tab, configure messages to notify local users when detections occur
with a configured message, and specify which actions the user can take against the threat.
8
On the Reports tab, enable the scanning activity log files and define where they are stored,
their size, format, and any additional scan logging to help you diagnose this threat.
NOTE: These log files are very helpful when you diagnose security threats and help
determine which actions to take against these threats.
ePolicy Orchestrator 4.0
Configure the general settings that apply to scanning of all processes with this user interface
console.
Task
For option definitions, click ? in the interface.
1
Click Systems | Policy Catalog, then from the Product list select VirusScan Enterprise
8.8.0. The Category list displays the policy categories for VirusScan Enterprise 8.8.0.
2
Edit an existing policy or create a new policy:
Edit an existing policy
a From the Category list, select the policy category.
b From the Actions column, click Edit to open the policy configuration page.
Create a new policy
a Click New Policy to open New Policy dialog box.
b From the Create a new policy based on this existing policy list, select one of the
settings.
c Type a new policy name.
d Click OK. The new policy appears in the list of existing policies.
3
From the Settings for list, select Workstation or Server.
4
From the On-Access General Policies page, click the General tab to configure the
general policy that applies to all on-access scanning. For example, which on-access items
to scan, when to scan, the maximum scan time, and if cookies should be scanned.
You can configure scanning of all processes currently running on your system whenever
on-access scanning is enabled. This improves your system security, but it can impact your
system boot-time performance.
To configure the scan processes on enable feature, in the Scan group, click Processes on
enable to scan all processes currently running on your system whenever on-access scanning
is enabled.
NOTE: Enabling this feature can impact the time it takes for your system to boot up.
56
McAfee VirusScan Enterprise 8.8 Product Guide
Part II - Detection: Finding Threats
Scanning items on-access
5
On the ScriptScan tab, enable ScriptScan and configure any processes or URLs to exclude
from scanning.
NOTE: With previous versions of VirusScan Enterprise disabling on-access scanning disabled
ScriptScan. With VirusScan Enterprise 8.8 disabling on-access scanning does not disable
ScriptScan. To disable ScriptScan deselect the Enable scanning of scripts checkbox.
6
On the Blocking tab, configure blocking connections from remote computers that write
files with potential threats or unwanted programs.
NOTE: By default, when a remote system writes any malware to a system with VirusScan
Enterprise, VirusScan Enterprise blocks the connection to that remote system.
You can also configure a message that is sent to the system that has written the malware.
NOTE: To send this message requires Windows Messenger service.
7
On the Messages tab, configure messages to notify local users when detections occur
with a configured message, and specify which actions the user can take against the threat.
8
On the Reports tab, enable the scanning activity log files and define where they are stored,
their size, format, and any additional scan logging to help you diagnose this threat.
NOTE: These log files are very helpful when you diagnose security threats and help
determine which actions to take against these threats.
VirusScan Console
Configure the general settings that apply to scanning of all processes with this user interface
console.
Task
For option definitions, click Help in the interface.
1
From the Task list, right-click On-Access Scanner, then click Properties to open the
dialog box.
2
From the On-Access General Policies page, click the General tab to configure the
general policy that applies to all on-access scanning. For example, which on-access items
to scan, when to scan, the maximum scan time, and if cookies should be scanned.
You can configure scanning of all processes currently running on your system whenever
on-access scanning is enabled. This improves your system security, but it can impact your
system boot-time performance.
To configure the scan processes on enable feature, in the Scan group, click Processes on
enable to scan all processes currently running on your system whenever on-access scanning
is enabled.
NOTE: Enabling this feature can impact the time it takes for your system to boot up.
3
On the ScriptScan tab, enable ScriptScan and configure any scripts to exclude from
scanning.
NOTE: With previous versions of VirusScan Enterprise disabling on-access scanning disabled
ScriptScan. With VirusScan Enterprise 8.8 disabling on-access scanning does not disable
ScriptScan. To disable ScriptScan deselect the Enable scanning of scripts checkbox.
McAfee VirusScan Enterprise 8.8 Product Guide
57
Part II - Detection: Finding Threats
Scanning items on-access
4
On the Blocking tab, configure blocking connections from remote computers that write
files with potential threats or unwanted programs.
NOTE: By default, when a remote system writes any malware to a system with VirusScan
Enterprise, VirusScan Enterprise blocks the connection to that remote system.
You can also configure a message that is sent to the system that has written the malware.
NOTE: To send this message requires Windows Messenger service.
5
On the Messages tab, configure messages to notify local users when detections occur
with a configured message, and specify which actions the user can take against the threat.
6
On the Reports tab, enable the scanning activity log files and define where they are stored,
their size, format, and any additional scan logging to help you diagnose this threat.
NOTE: These log files are very helpful when you diagnose security threats and help
determine which actions to take against these threats.
Configuring process settings
On-access scan processes are configured based on the risk that you assign to each process.
You can configure one default scanning policy for all processes, or configure different policies
based on the risk assigned to each process. Parameters include assigning risk you assign to
processes, defining items to scan, performing Artemis scanning, scanning compressed files,
taking actions on detections, and scanning for potentially unwanted programs.
Configure the on-access process settings using the following user interface consoles.
ePolicy Orchestrator 4.5 or 4.6
Configure the On-Access Default Processes Policies with this user interface consoles.
Task
For option definitions, click ? in the interface.
1
Click Menu | Policy | Policy Catalog, then from the Product list select VirusScan
Enterprise 8.8.0. The Category list displays the policy categories for VirusScan Enterprise
8.8.0.
2
Edit an existing policy or create a new policy:
Edit an existing policy
a From the Category list, select the policy category.
b From the Actions column, click Edit Setting to open the policy configuration page.
Create a new policy
a Click Actions | New Policy to open New Policy dialog box.
b From the Category list, select an existing policy.
c From the Create a new policy based on this existing policy list, select one of the
settings.
d Type a new policy name.
e Type any notes, if required.
f
58
Click OK. The new policy appears in the list of existing policies.
McAfee VirusScan Enterprise 8.8 Product Guide
Part II - Detection: Finding Threats
Scanning items on-access
g From the Actions column of the new policy, click Edit Setting to open the policy
configuration page.
3
From the Settings for list, select Workstation or Server.
4
From the Processes tab, click Configure different scanning policies for high-risk,
low-risk, and default process to display the on-access Default Processes, Low-Risk
Processes, or High-Risk Processes.
5
From the On-Access Default, Low-Risk, or High-Risk Processes Policies page, configure the
options on each tab. Refer to Process setting tab options.
ePolicy Orchestrator 4.0
Configure the On-Access Default Processes Policies with this user interface consoles.
Task
For option definitions, click ? in the interface.
1
Click Systems | Policy Catalog, then from the Product list select VirusScan Enterprise
8.8.0. The Category list displays the policy categories for VirusScan Enterprise 8.8.0.
2
Edit an existing policy or create a new policy:
Edit an existing policy
a From the Category list, select the policy category.
b From the Actions column, click Edit to open the policy configuration page.
Create a new policy
a Click New Policy to open New Policy dialog box.
b From the Create a new policy based on this existing policy list, select one of the
settings.
c Type a new policy name.
d Click OK. The new policy appears in the list of existing policies.
3
From the Settings for list, select Workstation or Server.
4
From the Processes tab, click Configure different scanning policies for high-risk,
low-risk, and default process to display the on-access Default Processes, Low-Risk
Processes, or High-Risk Processes.
5
From the On-Access Default, Low-Risk, or High-Risk Processes Policies page, configure the
options on each tab. Refer to Process setting tab options.
VirusScan Console
Configure the On-Access Scan Properties with this user interface consoles.
Task
For option definitions, click Help in the interface.
1
From the Task list, right-click On-Access Scanner, then click Properties to open the
dialog box.
2
From the left-hand pane, click All Processes.
3
From the Processes tab, click Configure different scanning policies for high-risk,
low-risk, and default process to display the on-access Default Processes, Low-Risk
Processes, or High-Risk Processes.
McAfee VirusScan Enterprise 8.8 Product Guide
59
Part II - Detection: Finding Threats
Scanning items on-access
4
From the On-Access Default, Low-Risk, or High-Risk Processes Policies page, configure the
options on each tab. Refer to Process setting tab options.
Process setting tab options
The following table describes the on-access scanner tab options.
Tab
Definitions
Processes
•
On-Access Default Processes — Choose to configure one scanning policy for
all processes or configure different scanning policies for default processes, low-risk
processes, and high-risk processes.
NOTE: If you choose to configure one scanning policy, this policy applies to all
processes. If you choose to configure different scanning policies for low-risk and
high risk policies, this policy applies only to the processes that are not defined as
low-risk or high-risk.
•
On-Access Low-Risk Processes — Specify the processes that you define as
low-risk.
•
On-Access High-Risk Processes — Specify the processes that you define as
high-risk.
NOTE: The Configure different scanning policies for high-risk, low-risk, and
default processes option must be selected on the On-Access Default Processes
tab before you can configure individual policies for low-risk and high-risk processes.
Scan Items
•
Configure whether to scan files on read, on write, on network drives and opened
for backup.
CAUTION: Failure to enable When writing to disk and When reading from
disk leaves your system unprotected from numerous malware attacks.
•
Configure which files and file types to scan.
CAUTION: Failure to enable All files leaves your system unprotected from
numerous malware attacks.
Exclusions
Actions
•
Scan for potential threats that resemble unwanted programs, Trojan horses and
macro viruses.
•
Scan inside archives and decode MIME encoded files.
•
Enable on-access scanning for unwanted programs.
Configure which disks, files, and folders to exclude from scanning.
For threat detections:
•
Primary action to take when a threat is detected.
•
Secondary action to take on a threat detection if the first action fails.
For unwanted program detections:
•
Primary action to take when an unwanted program is detected.
•
Secondary action to take on an unwanted program detection if the first action
fails.
Enabling on-network drives
To scan mapped network drives, you must enable the On Network Drives option.
Configure the on-access scanning of on-network drives from the On-Access Default Processes
Policies using one of the following user interface consoles.
60
McAfee VirusScan Enterprise 8.8 Product Guide
Part II - Detection: Finding Threats
Scanning items on-access
ePolicy Orchestrator 4.5 or 4.6
Enable on-network drives from the On-Access Default Processes Policies with this user interface
console.
Task
For option definitions, click ? in the interface.
1
Click Menu | Policy | Policy Catalog, then from the Product list select VirusScan
Enterprise 8.8.0. The Category list displays the policy categories for VirusScan Enterprise
8.8.0.
2
Edit an existing policy or create a new policy:
Edit an existing policy
a From the Category list, select the policy category.
b From the Actions column, click Edit Setting to open the policy configuration page.
Create a new policy
a Click Actions | New Policy to open New Policy dialog box.
b From the Category list, select an existing policy.
c From the Create a new policy based on this existing policy list, select one of the
settings.
d Type a new policy name.
e Type any notes, if required.
f
Click OK. The new policy appears in the list of existing policies.
g From the Actions column of the new policy, click Edit Setting to open the policy
configuration page.
3
From the Settings for list, select Workstation or Server.
4
On the On-Access Default Processes Policies page, click Scan Items tab, and On
network drives next to Scan files.
5
Click Save.
ePolicy Orchestrator 4.0
Enable on-network drives with this user interface console.
Task
For option definitions, click ? in the interface.
1
Click Systems | Policy Catalog, then from the Product list select VirusScan Enterprise
8.8.0. The Category list displays the policy categories for VirusScan Enterprise 8.8.0.
2
Edit an existing policy or create a new policy:
Edit an existing policy
a From the Category list, select the policy category.
b From the Actions column, click Edit to open the policy configuration page.
Create a new policy
a Click New Policy to open New Policy dialog box.
b From the Create a new policy based on this existing policy list, select one of the
settings.
McAfee VirusScan Enterprise 8.8 Product Guide
61
Part II - Detection: Finding Threats
Scanning items on-demand
c Type a new policy name.
d Click OK. The new policy appears in the list of existing policies.
3
From the Settings for list, select Workstation or Server.
4
On the On-Access Default Processes Policies page, click Scan Items tab and On
network drives next to Scan files.
5
Click Save.
VirusScan Console
Enable on-network drives with this user interface console.
Task
For option definitions, click Help in the interface.
1
From the Task list, right-click On-Access Scanner, then click Properties to open the
On-Access Scanner Properties dialog box.
2
Click the Scan Items tab and On network drives next to Scan files.
3
Click Save.
Scanning items on-demand
The on-demand scanner examines all parts of your computer for potential threats, at convenient
times or at regular intervals. Use on-demand scans to supplement the continuous protection
that the on-access scanner offers, or to schedule regular scans at times that do not interfere
with your work.
Contents
On-demand scanning and how it works
On-demand scanning methods and how they are defined
How scanning of remote storage works
How scan deferral works
How system utilization works
Configuring on-demand scan tasks
Configuring global system cache
On-demand scanning and how it works
The on-demand scanner searches your system's files, folders, memory, registry, and more
looking for any malware that could have infected your system. You decide when and how the
on-demand scans occur. You can scan your system manually, at a scheduled time, or for
example, when your system boots.
When an attempts is made to open, close, or rename a file, the scanner intercepts the operation
and takes these actions.
1
The scanner determines if the file, folder, or disk should be scanned based on this criteria:
• The file’s extension matches the configuration.
62
McAfee VirusScan Enterprise 8.8 Product Guide
Part II - Detection: Finding Threats
Scanning items on-demand
• The file has not been cached.
• The file has not been excluded.
• The file has not been previously scanned.
NOTE: The on-demand scanner uses heuristics to check for suspicious files, if you
configure Artemis. For details, see How Artemis works.
2
If the file, folder, or disk meets the scanning criteria, it is scanned by comparing the
information in the file to the known virus signatures in the currently loaded DAT files.
• If it is clean, the result is cached and the next item is checked.
• If it contains a threat, the configured action is taken. For example:
• If it needs to be cleaned, that process is determined by the currently loaded DAT
files.
• The results are recorded in the activity log if the scanner was configured to do so.
• In the On-Demand Scan Progress dialog, the information describing the memory,
file, folder, or disk name and the action taken is displayed.
3
If the memory, file, folder, or disk does not meet the scanning requirements, it is not
scanned and the scanner continues until all of the data is scanned.
On-demand scanning methods and how they are defined
The on-demand scanner uses in-memory-process scanning and incremental or resumable
scanning.
In-memory-process scanning
This method examines all active processes prior to running the on-demand scan task. Any
detected potentially unwanted process is highlighted and the process is stopped. This means
that a single pass with the on-demand scanner removes all instances of a potentially unwanted
program.
Incremental or resumable scanning
This method allows you to limit when on-demand scan activity occurs, and still scan the entire
system in multiple sessions. Incremental scanning can be set by adding a time limit to the
scheduled scan. The scan stops when the time limit is reached. The next time this task starts,
it continues from the point in the file and folder structure where the previous scan stopped.
How scanning of remote storage works
Remote storage data is hierarchical, with two defined levels of storage.
The two levels of storage:
• Upper level, local storage — Includes the NTFS disk volumes of the computer running
Remote Storage on Windows 2000 Server.
• Lower level, remote storage — Located on the robotic tape library, or a standalone tape
drive connected to a server computer.
Remote storage automatically copies eligible files on your local volumes to a tape library, then
monitors space available on the local volumes. File data is cached locally so that it can be
accessed quickly as needed. When necessary, remote storage moves data from the remote
McAfee VirusScan Enterprise 8.8 Product Guide
63
Part II - Detection: Finding Threats
Scanning items on-demand
storage to local storage. When you need to access a file on a volume managed by remote
storage, open the file as usual. If the data for the file is no longer cached on your local volume,
remote storage recalls the data from a tape library.
How scan deferral works
To improve performance, you can defer on-demand scan tasks when battery power is low or
during full-screen presentations. You can also allow the user to defer scheduled scans in one-hour
increments. The increments can last one hour, 24 hours, or the on-demand scan can be deferred
forever.
Each user deferral can last one hour. For example, if the Defer at most option is set at 2, the
user can defer the scan task two times or two hours. When the maximum specified number of
hours elapses, the scan continues. If the administrator allows unlimited deferrals by setting the
option to zero, the user can continue deferring the scan forever.
How system utilization works
The on-demand scanner uses the Windows Set Priority setting for the scan process and threads
priority. This lets the operating system set the amount of CPU time that the on-demand scanner
receives at any point in the scan process. The system utilization setting in the On-Demand Scan
Properties maps to the Windows Set Priority control.
Setting the system utilization for the scan to low provides improved performance for other
running applications. The low setting is useful for systems with end user activity in progress.
Conversely, by setting the system utilization to normal the scan completes faster. The normal
setting is useful for systems that have large volumes and very little end user activity.
The following table shows the VirusScan Enterprise and ePolicy Orchestrator default process
settings.
VirusScan Enterprise process setting
Windows Set Priority setting
Low
Low
Below normal — The ePolicy Orchestrator default
Below normal
Normal — The VirusScan Enterprise 8.8 default
Normal
Configuring on-demand scan tasks
Configuring on-demand tasks depends on the user interface console you are using. These tasks
describe that process for each user interface console.
Tasks
ePolicy Orchestrator 4.5 or 4.6
ePolicy Orchestrator 4.0
VirusScan Console
Configuring on-demand scan tasks tabs
ePolicy Orchestrator 4.5 or 4.6
Configure the on-demand scan tasks with this user interface console.
64
McAfee VirusScan Enterprise 8.8 Product Guide
Part II - Detection: Finding Threats
Scanning items on-demand
Task
For option definitions, click ? in the interface.
1
Click Menu | System | System Tree and select Client Task.
2
From the Client Task page that appears:
• To edit an existing on-demand scan task, click Edit Setting from the Actions column
of the task to open the Description page.
• To create a new on-demand scan task, click Actions | New task to open the
Description page.
3
From the Descriptions page:
• When editing an existing on-demand scan task, check the descriptions and click Next.
• When creating a new on-demand scan task, configure the following and click Next:
• Name and Notes.
• Type by selecting On-Demand Scan (VirusScan Enterprise 8.8) from the list.
• Tags that determine which computers receive the on-demand scan task.
4
From the Client Task Builder configuration page that appears, configure each of the tabs.
For details, refer to Configuring on-demand scan tasks tabs.
ePolicy Orchestrator 4.0
Configure the on-demand scan tasks with this user interface console.
Task
For option definitions, click ? in the interface.
1
Click Systems | System tree | Client Task.
2
From the Client Task page that appears:
• To edit an existing on-demand scan task, click Edit from the Actions column of the
task to open the Description page.
• To create a new on-demand scan task, click Actions | New task to open the
Description page.
3
Perform one of the following:
• When editing an existing on-demand scan task, check the descriptions and click Next.
• When creating a new on-demand scan task, configure the following and click Next:
• Name and Notes.
• Type by selecting On-Demand Scan (VirusScan Enterprise 8.8) from the list.
• Tags that determine which computers receive the on-demand scan task.
4
From the Client Task Builder configuration page that appears, configure each of the tabs.
For details, refer to Configuring on-demand scan tasks tabs.
VirusScan Console
Configure the on-demand scan tasks with this user interface console.
McAfee VirusScan Enterprise 8.8 Product Guide
65
Part II - Detection: Finding Threats
Scanning items on-demand
Task
For option definitions, click Help in the interface.
1
Open the On-Demand Scan Properties page for an existing or new task:
• Select and right-click an existing on-demand scan task, right-click, and select Properties.
• Create a new task, select Task | New On-Demand Scan Task, right-click the new
task, select Properties.
2
Configure each of the tabs in the On-Demand Scan Properties dialog box. Refer to the
section, Configuring on-demand scan tasks tabs for details.
Configuring on-demand scan tasks tabs
VirusScan Enterprise includes a default on-demand scan task. You can use the default task and
create new tasks.
Configure the options on each tab. For option definitions, click ? or Help on each tab.
Tab definitions
Tab
Definitions
Scan Locations
•
Specify which locations and items to scan.
•
Include running processes.
•
Include subfolders when scanning.
•
Include boot sectors when scanning.
•
Include registry keys and values when scanning.
•
Include cookie files when scanning.
CAUTION: Failure to scan Memory for rootkits and Running processes leaves your
system unprotected from numerous malware attacks.
NOTE: When the On-Demand Scan Progress dialog appears, the locations to scan
appear as a comma-separated string following Scanning in. As the scan processes are
completed, they are removed from the string.
Scan Items
•
Configure which files and file types to scan.
•
Enable on-demand scanning for unwanted programs.
•
Scan inside archives and decode MIME encoded files.
•
Scan files that have been migrated to storage.
•
Scan for potential threats that resemble unwanted programs, Trojan horses, and
macro viruses.
Exclusions
Configure which disks, files, and folders to exclude from scanning by Name or Location,
by File Type, or by File Age.
Performance
•
Configure when to defer scans and for how long.
•
Specify the system utilization percentage.
•
Configure the sensitivity level for Artemis.
Actions
For threat detections:
•
Primary action to take when a threat is detected.
•
Secondary action to take on a threat detection if the first action fails.
For unwanted program detections:
•
66
Primary action to take when an unwanted program is detected.
McAfee VirusScan Enterprise 8.8 Product Guide
Part II - Detection: Finding Threats
Scanning items on-demand
Tab
Definitions
•
Secondary action to take on an unwanted program detection if the first action
fails.
For allowed actions in the prompt dialog box, select the action.
Reports
•
Enable activity logging.
•
Specify the log file name and location.
•
Specify the log file size limit.
•
Select the log file format.
•
Specify what to log besides scanning activity.
•
Specify which of the following to log in addition to scanning activity:
•
Task
•
Enable session settings
•
Enable session summary
•
Enable failure to scan encrypted files
Enable alerts when cookies are detected.
Specify where the on-demand scan task runs.
NOTE: This tab is only available via ePolicy Orchestrator.
Configuring global system cache
The VirusScan Enterprise scan cache saves a list of scanned files that are clean. You can improve
your system performance by saving this clean file scan cache information during a system
reboot. This allows the on-demand scanner to use this clean file cache information to reduce
duplicate file scanning.
Configure the scan cache features using the General Options Policies and the Global Scan
Settings tab using the following user interface consoles.
Tasks
ePolicy Orchestrator 4.5 or 4.6
ePolicy Orchestrator 4.0
VirusScan Console
ePolicy Orchestrator 4.5 or 4.6
Configure the scan cache feature from the General Options Policies with this user interface
console.
Task
For option definitions, click ? or Help in the interface.
1
Click Menu | Policy | Policy Catalog, then from the Product list select VirusScan
Enterprise 8.8.0. The Category list displays the policy categories for VirusScan Enterprise
8.8.0.
2
Edit an existing policy or create a new policy:
Edit an existing policy
a From the Category list, select the policy category.
b From the Actions column, click Edit to open the policy configuration page.
McAfee VirusScan Enterprise 8.8 Product Guide
67
Part II - Detection: Finding Threats
Scanning items on-demand
Create a new policy
a Click New Policy to open New Policy dialog box.
b From the Create a new policy based on this existing policy list, select one of the
settings.
c Type a new policy name.
d Click OK. The new policy appears in the list of existing policies.
3
From the Settings for list, select Workstation or Server.
4
From the General Options Policies, click the Global Scan Settings tab to configure the
VirusScan Enterprise scan cache option settings.
5
Configure the following global settings for the scan cache:
• Click Enable saving scan data across reboots — Saves the clean scan results when
you reboot the system.
• Click Allow On-Demand Scans to utilize the scan cache — Allows the on-demand
scanner to use the existing clean scan results to reduce duplicate scanning.
6
Click Save.
ePolicy Orchestrator 4.0
Configure the scan cache feature from the General Options Policies with this user interface
console.
Task
For option definitions, click ? or Help in the interface.
1
Click Systems | Policy Catalog, then from the Product list select VirusScan Enterprise
8.8.0. The Category list displays the policy categories for VirusScan Enterprise 8.8.0.
2
Edit an existing policy or create a new policy:
Edit an existing policy
a From the Category list, select the policy category.
b From the Actions column, click Edit to open the policy configuration page.
Create a new policy
a Click New Policy to open New Policy dialog box.
b From the Create a new policy based on this existing policy list, select one of the
settings.
c Type a new policy name.
d Click OK. The new policy appears in the list of existing policies.
3
From the Settings for list, select Workstation or Server.
4
From the General Options Policies, click the Global Scan Settings tab to configure the
VirusScan Enterprise scan cache option settings.
5
Configure the following global settings for the scan cache:
• Click Enable saving scan data across reboots — Saves the clean scan results when
you reboot the system.
• Click Allow On-Demand Scans to utilize the scan cache — Allows the on-demand
scanner to use the existing clean scan results to reduce duplicate scanning.
6
68
Click Save.
McAfee VirusScan Enterprise 8.8 Product Guide
Part II - Detection: Finding Threats
Scanning email on-delivery and on-demand
VirusScan Console
Configure the scan cache feature with this user interface console.
Task
For option definitions, click Help in the interface.
1
Click Tools | General Options and the Global Scan Settings tab to display the Global
Scan Settings dialog box.
2
Configure the following global settings for the scan cache:
• Click Enable saving scan data across reboots — Saves the clean scan results when
you reboot the system.
• Click Allow On-Demand Scans to utilize the scan cache — Allows the on-demand
scanner to use the existing clean scan results to reduce duplicate scanning.
3
Click OK.
Scanning email on-delivery and on-demand
The email scanner automatically examines email messages and attachments.
The email is scanned using:
• Microsoft Outlook — Email is scanned on-delivery, or you can invoke on-demand email
scans directly from Microsoft Outlook.
NOTE: If you configure Heuristics and Artemis features, the email on-delivery and on-demand
scanner uses heuristics to check for suspicious files. For details see, How Artemis works.
• Lotus Notes — Allows you to configure:
• When accessed, email is scanned.
• When invoked, on-demand email scans directly from Lotus Notes.
• Which Notes databases to exclude.
Configure the On-Delivery Email Scan Policies using the following user interface consoles.
Tasks
ePolicy Orchestrator 4.5 or 4.6
ePolicy Orchestrator 4.0
VirusScan Console
On delivery email scan policies tab definitions
ePolicy Orchestrator 4.5 or 4.6
Configure the On-Delivery Email Scan Policies using this user interface console.
Task
For option definitions, click ? in the interface.
McAfee VirusScan Enterprise 8.8 Product Guide
69
Part II - Detection: Finding Threats
Scanning email on-delivery and on-demand
1
Click Menu | Policy | Policy Catalog, then from the Product list select VirusScan
Enterprise 8.8.0. The Category list displays the policy categories for VirusScan Enterprise
8.8.0.
2
Edit an existing policy or create a new policy:
Edit an existing policy
a From the Category list, select the policy category.
b From the Actions column, click Edit Setting to open the policy configuration page.
Create a new policy
a Click Actions | New Policy to open New Policy dialog box.
b From the Category list, select an existing policy.
c From the Create a new policy based on this existing policy list, select one of the
settings.
d Type a new policy name.
e Type any notes, if required.
f
Click OK. The new policy appears in the list of existing policies.
g From the Actions column of the new policy, click Edit Setting to open the policy
configuration page.
3
From the Settings for list, select Workstation or Server.
4
From the On-Delivery Email Scanner Policies configuration page, configure the options on
each tab. Refer to On delivery email scan policies tab definitions.
ePolicy Orchestrator 4.0
Configure the On-Delivery Email Scan Policies using this user interface console.
Task
For option definitions, click ? in the interface.
1
Click Systems | Policy Catalog, then from the Product list select VirusScan Enterprise
8.8.0. The Category list displays the policy categories for VirusScan Enterprise 8.8.0.
2
Edit an existing policy or create a new policy:
Edit an existing policy
a From the Category list, select the policy category.
b From the Actions column, click Edit to open the policy configuration page.
Create a new policy
a Click New Policy to open New Policy dialog box.
b From the Create a new policy based on this existing policy list, select one of the
settings.
c Type a new policy name.
d Click OK. The new policy appears in the list of existing policies.
70
3
From the Settings for list, select Workstation or Server.
4
From the On-Delivery Email Scanner Policies configuration page, configure the options on
each tab. Refer to On delivery email scan policies tab definitions.
McAfee VirusScan Enterprise 8.8 Product Guide
Part II - Detection: Finding Threats
Scanning email on-delivery and on-demand
VirusScan Console
Configure the On-Delivery Email Scan Policies using this user interface console.
Task
For option definitions, click ? in the interface.
1
From the Task list, right-click On-Delivery Email Scan Properties, then click Properties
to open the dialog box.
2
From the On-Delivery Email Scan Properties dialog box, configure the options on each tab.
Refer to On delivery email scan policies tab definitions.
On delivery email scan policies tab definitions
Tab
Definitions
Scan Items
•
Specify which attachments and messages to scan.
•
Scan using heuristics for potential threats that resemble malware, unknown macro
viruses, and find attachments with multiple extensions.
•
Scan compressed files inside archives and decode MIME encoded files.
•
Enable the email scanner to scan for unwanted programs.
•
Scan email message bodies.
•
Configure the sensitivity level for Artemis.
NOTE: This option is available only for On-Delivery Email Scanning.
Actions
For threat detections:
•
Primary action to take when a threat is detected.
•
Secondary action to take if the first action fails.
For unwanted program detections:
•
Primary action to take when an unwanted program is detected.
•
Secondary action to take if the first action fails.
For allowed actions in the prompt dialog box, select the action.
Alerts
Reports
Notes Scanner Settings
•
Notify another user when a threatened email message is detected.
•
Specify the message that displays to the user when prompting for action.
•
Enable activity logging.
•
Specify the log file name and location.
•
Specify the log file size limit.
•
Select the log file format.
•
Specify what to log besides scanning activity.
NOTE: This tab is available only for On-Delivery Email Scanning.
Configure Lotus Notes specific settings.
•
Scan all server databases.
•
Scan server mailboxes in the specified mailbox root folder.
•
Notes applications to ignore.
McAfee VirusScan Enterprise 8.8 Product Guide
71
Part III - Response: Handling Threats
Responding to threats is the third step in a protection strategy to detect and clean malware
that attempts to gain access to your system.
Contents
Detections and responses
Configuring alerts and notifications
Access queries and dashboards
Configuring emergency DATs
Detections and responses
When a threat occurs and is detected, what happens next is determined by how VirusScan
Enterprise is configured to respond and which feature detects the threat. Understanding these
differences helps you to develop and implement an effective strategy.
Contents
What happens when a detection occurs
System access point violations
Buffer overflow detections
Unwanted program detections
On-access scan detections
On-demand scan detections
Email scan detections
Quarantined items
What happens when a detection occurs
When a detection occurs and is detected, the reaction depends on how VirusScan Enterprise
is configured.
If VirusScan Enterprise is configured to clean automatically (the suggested default setting), the
resulting action depends on the cleaning instruction from the DAT file. For example, if the
scanner cannot clean a file, or if the file has been damaged beyond repair, the scanner might
delete the file or take the secondary action, depending on the definition in the DAT file.
When the scanner denies access to files with potential threats, it adds an .mcm extension to
the file name when the file is saved.
72
McAfee VirusScan Enterprise 8.8 Product Guide
Part III - Response: Handling Threats
Detections and responses
System access point violations
When a system access point is violated, the action taken depends on how the rule was
configured.
If the rule was configured to:
• Report — Information is recorded in the log file.
• Block — Access is denied.
Review the log file to determine which system access points were violated and which rules
detected the violations, then configure the access protection rules to allow users access to
legitimate items and prevent users from accessing protected items.
Use these scenarios to decide which action to take as a response.
Detection type
Scenarios
Unwanted processes
•
If the rule reported the violation in the log file, but did not block the violation, select
the Block option for the rule.
•
If the rule blocked the violation, but did not report the violation in the log file, select
the Report option for the rule.
•
If the rule blocked the violation and reported it in the log file, no action is necessary.
•
If you find an unwanted process that was not detected, edit the rule to include it
as blocked.
•
If the rule reported the violation in the log file, but did not block the violation,
deselect the Report option for the rule.
•
If the rule blocked the violation and reported it in the log file, edit the rule to exclude
the legitimate process from being blocked.
Legitimate processes
Buffer overflow detections
When a buffer overflow detection occurs, the scanner blocks the detection and a message is
recorded in the On-Access Scan Messages dialog box. You can view the dialog box, then
decide whether to take any additional actions.
The actions you can take include:
• Removing the message — Select the item in the list, then click Remove.
• Creating an exclusion — If the detected process is one that you legitimately use, or a
false positive, create an exclusion using the information in the On-Access Scan Messages
dialog box. Review the information in the Name column to determine the name of the
process that owns the writable memory that is making the call. Use the process name to
create an exclusion.
• Submitting a sample to McAfee Labs for analysis — If the scanner detects something
that you think it should not detect, or does not detect something that you think it should,
you can send a sample to McAfee Labs.
Unwanted program detections
The on-access, on-demand, and email scanners detect unwanted programs based on the
Unwanted Programs Policy you configured. When a detection occurs, the scanner that
detected the potentially unwanted program applies the action that you configured on the Actions
tab for that scanner.
McAfee VirusScan Enterprise 8.8 Product Guide
73
Part III - Response: Handling Threats
Detections and responses
Review the information in the log file, then decide whether to take any of these additional
actions:
• Fine-tune scanning items — This makes your scans more efficient.
• Exclude it from detection — If a legitimate program was detected, you can configure it
as an exclusion.
• Add it to the user-defined detection list — If an unwanted program was not detected,
you can add it to the user-defined detection list.
• Submit a sample to McAfee Labs for analysis — If the scanner detects something that
you think it should not detect or does not detect something that you think it should, you
can send a sample to McAfee Labs.
On-access scan detections
When the on-access scanner detects any malware it takes action according to how you configured
the On-Access Scan Properties, in the Actions tab. Also, a message is recorded in the On-Access
Scan Messages dialog box.
Review the information in the activity log and the On-Access Scan Messages dialog box,
then decide whether to take any of these additional actions.
• Fine-tune scanning items — To make scanning more efficient, exclude legitimate files
that VirusScan Enterprise might consider threats, and delete known threats that might be
saved in the quarantine.
• Right-click an item in the On-Access Scan Messages dialog box — To perform these
actions:
• Clean File — Attempts to clean the file referenced by the selected message.
• Delete File — Deletes the file referenced by the selected message. The file name is
recorded in the log so that you can restore it from the Quarantine Manager.
• Select All (ctrl+a) — Selects all messages in the list.
• Remove Message from List (ctrl+d) — Removes the selected message from the list.
Messages that have been removed from the list are still visible in the log file.
• Remove All Messages — Removes all message from the list. Messages that have been
removed from the list are still visible in the log file.
• Open On-Access Scanner Log File — Opens the on-access scanner activity log file.
This option is available only from the File menu.
• Open Access Protection Log File — Opens the access protection activity log file. This
option is available only from the File menu.
• If an action is not available for the current message, the corresponding icon, button, and
menu items are disabled. For example, Clean is not available if the file has already been
deleted, or Delete is not available if the administrator has suppressed the action.
• Clean File — A file cannot be cleaned if the DAT file has no cleaner or it has been
damaged beyond repair. If the file cannot be cleaned, the scanner appends an .mcm
extension to the file name and denies access to it. An entry is recorded in the log file. In
this case, we recommend that you delete the file and restore it from a clean backup copy.
• Submit a sample to McAfee Labs for analysis — If the scanner detects something that
you think it should not detect, or does not detect something that you think it should, you
can send a sample to McAfee Labs.
74
McAfee VirusScan Enterprise 8.8 Product Guide
Part III - Response: Handling Threats
Detections and responses
On-demand scan detections
When an on-demand detection occurs, the scanner takes action according to how you configured
the On-Demand Scan Properties, Actions tab.
Review the information in the log file, then decide whether to take any of these additional
actions:
• Fine-tune scanning items — This make your scans more efficient.
• Prompt for action — Configured the scanner to Prompt for action by selecting the action
from the On-Demand Scan Progress dialog box.
• Submit a sample to McAfee Labs for analysis — If the scanner detects something that
you think it should not detect, or does not detect something that you think it should, you
can send a sample to McAfee Labs.
Email scan detections
When an email scan detection occurs, the scanner takes action according to how you configured
the On-Delivery Email Scan Properties or On-Demand Email Scan Properties, Actions
tab.
Review the information in the log file, then decide whether to take any of these additional
actions:
• Fine-tune scanning items — This makes your scans more efficient.
• Submit a sample to McAfee Labs for analysis — If the scanner detects something that
you think it should not detect, or does not detect something that you think it should, you
can send a sample to McAfee Labs.
Quarantined items
Items that are detected as threats, are cleaned or deleted. Plus, a copy of the item is converted
to a non-executable format and saved in the Quarantine folder. This allows you to perform
processes on the quarantined items after downloading a later version of the DAT, that possibly
contains information that can clean the threat.
These additional processes include:
• Restore.
• Rescan.
• Delete.
• Check for false positive.
• View detection properties.
NOTE: Quarantined items can include multiple types of scanned objects. These objects include
files, cookies, registries, or anything VirusScan Enterprise scans for malware.
Configuring the quarantine policy
Access the Quarantine Manager Policies and configure the quarantine policy, if needed, or
accept the default settings.
Configure the Quarantine Manager Policies using the following user interface consoles.
McAfee VirusScan Enterprise 8.8 Product Guide
75
Part III - Response: Handling Threats
Detections and responses
Tasks
ePolicy Orchestrator 4.5 or 4.6
ePolicy Orchestrator 4.0
VirusScan Console
ePolicy Orchestrator 4.5 or 4.6
Configure the Quarantine Manager Policies using this user interface console.
Task
For option definitions, click ? in the interface.
1
Click Menu | Policy | Policy Catalog, then from the Product list select VirusScan
Enterprise 8.8.0. The Category list displays the policy categories for VirusScan Enterprise
8.8.0.
2
Edit an existing policy or create a new policy:
Edit an existing policy
a From the Category list, select the policy category.
b From the Actions column, click Edit Setting to open the policy configuration page.
Create a new policy
a Click Actions | New Policy to open New Policy dialog box.
b From the Category list, select an existing policy.
c From the Create a new policy based on this existing policy list, select one of the
settings.
d Type a new policy name.
e Type any notes, if required.
f
Click OK. The new policy appears in the list of existing policies.
g From the Actions column of the new policy, click Edit Setting to open the policy
configuration page.
3
From the Settings for list, select Workstation or Server.
4
From the Quarantine page, accept the default quarantine directory, or select a different
directory.
5
To configure the days the quarantined items are saved, click Automatically delete
quarantined data after the specified number of days and type the Number of days
to keep backed-up data in the quarantine directory.
ePolicy Orchestrator 4.0
Configure the Quarantine Manager Policies using this user interface console.
Task
For option definitions, click ? in the interface.
76
1
Click Systems | Policy Catalog, then from the Product list select VirusScan Enterprise
8.8.0. The Category list displays the policy categories for VirusScan Enterprise 8.8.0.
2
Edit an existing policy or create a new policy:
Edit an existing policy
McAfee VirusScan Enterprise 8.8 Product Guide
Part III - Response: Handling Threats
Detections and responses
a From the Category list, select the policy category.
b From the Actions column, click Edit to open the policy configuration page.
Create a new policy
a Click New Policy to open New Policy dialog box.
b From the Create a new policy based on this existing policy list, select one of the
settings.
c Type a new policy name.
d Click OK. The new policy appears in the list of existing policies.
3
From the Settings for list, select Workstation or Server.
4
From the Quarantine page, accept the default quarantine directory, or select a different
directory.
5
To configure the days the quarantined items are saved, click Automatically delete
quarantined data after the specified number of days and type the Number of days
to keep backed-up data in the quarantine directory.
VirusScan Console
Configure the Quarantine Manager Policy using this user interface console.
Task
For option definitions, click ? in the interface.
1
From the Task list, right-click Quarantine Manager Policy, then click Properties to
open the Quarantine Manager Policy dialog box.
2
Accept the default quarantine directory, or select a different directory.
3
To configure the days the quarantined items are saved, click Automatically delete
quarantined data after the specified number of days and type the Number of days
to keep backed-up data in the quarantine directory.
Managing quarantined items
Process quarantined items to further check these items and manually delete or restore them
using the VirusScan Console.
NOTE: From the ePolicy Orchestrator console, use the Restore from Quarantine client task
to restore quarantined items.
Task
For option definitions, click ? in the interface.
1
From the VirusScan Console Task list, click Quarantine Manager Policy to open the
Quarantine Manager Policy dialog box.
2
Click the Manager tab, and right-click an item to access these advanced options:
• Restore.
• Rescan.
• Delete.
• Check for false positive.
McAfee VirusScan Enterprise 8.8 Product Guide
77
Part III - Response: Handling Threats
Configuring alerts and notifications
• View detection properties.
3
A dialog box appears and describes the affect of your attempt.
Configuring alerts and notifications
Being notified when a potential threat is detected is an important part of protecting your
environment. You can use the ePolicy Orchestrator console, or VirusScan Console, to configure
how you are notified when detections occur. Both consoles allow configuring alerting options,
filter alerts by severity to limit alert traffic, and configure local alerting options.
Configuring alerts
Configure the alerts and notification properties that appear when the various scanners detect
a threat.
Use the same process to configure alerts for these policies:
• Alert Policies
• Buffer Overflow Protection Policies
• On-Delivery Email Scan Policies
Configure the alert notification policies for all three policies using the following user interface
consoles.
Tasks
ePolicy Orchestrator 4.5 or 4.6
ePolicy Orchestrator 4.0
VirusScan Console
Alert policy tab configuration
ePolicy Orchestrator 4.5 or 4.6
Configure the Alert Policies with this user interface console.
Task
For option definitions, click ? in the interface.
1
Click Menu | Policy | Policy Catalog, then from the Product list select VirusScan
Enterprise 8.8.0. The Category list displays the policy categories for VirusScan Enterprise
8.8.0.
2
Edit an existing policy or create a new policy:
Edit an existing policy
a From the Category list, select the policy category.
b From the Actions column, click Edit Setting to open the policy configuration page.
Create a new policy
a Click Actions | New Policy to open New Policy dialog box.
b From the Category list, select an existing policy.
78
McAfee VirusScan Enterprise 8.8 Product Guide
Part III - Response: Handling Threats
Configuring alerts and notifications
c From the Create a new policy based on this existing policy list, select one of the
settings.
d Type a new policy name.
e Type any notes, if required.
f
Click OK. The new policy appears in the list of existing policies.
g From the Actions column of the new policy, click Edit Setting to open the policy
configuration page.
3
From the Settings for list, select Workstation or Server.
4
Configure the alert policy tabs. Refer to Alert policy tab configuration.
ePolicy Orchestrator 4.0
Configure the Alert Policies with this user interface console.
Task
For option definitions, click ? in the interface.
1
Click Systems | Policy Catalog, then from the Product list select VirusScan Enterprise
8.8.0. The Category list displays the policy categories for VirusScan Enterprise 8.8.0.
2
Edit an existing policy or create a new policy:
Edit an existing policy
a From the Category list, select the policy category.
b From the Actions column, click Edit to open the policy configuration page.
Create a new policy
a Click New Policy to open New Policy dialog box.
b From the Create a new policy based on this existing policy list, select one of the
settings.
c Type a new policy name.
d Click OK. The new policy appears in the list of existing policies.
3
From the Settings for list, select Workstation or Server.
4
Configure the alert policy tabs. Refer to Alert policy tab configuration.
VirusScan Console
Configure the Alerts properties with this user interface console.
Task
For option definitions, click Help in the interface.
1
Open one of the following properties to configure the alerts:
• Alerts — Click Tools | Alerts to open the Alert Properties dialog box.
• Buffer Overflow Protection — Select the Buffer Overflow Protection task,
right-click Properties to open the Buffer Overflow Protection properties dialog box.
• On-Delivery Email Scanner — Select the On-Delivery Email Scanner task,
right-click Properties to open the On-Delivery Email Scanner properties dialog box.
Click Alerts tab.
McAfee VirusScan Enterprise 8.8 Product Guide
79
Part III - Response: Handling Threats
Access queries and dashboards
2
Configure the alert policy tabs. Refer to Alert policy tab configuration.
Alert policy tab configuration
Task
Configuration
Alerts Policies
1
From the Actions column, select Edit Settings to open the Alerts Policies
page.
2
Configure the Components that generate alerts and Alert Manager
options.
Buffer Overflow Protection 1
Policies
On-Delivery Email Scan
Policies
From the Actions column, select Edit Settings to open the Buffer Overflow
Protection page.
2
Next to Client system warning, click Show the messages dialog box
when a buffer overflow is detected.
1
From the Actions column, select Edit Settings to open the Buffer On-Delivery
Email Scan Policies page.
2
Click Alerts and configure Email alert for user and Prompt for action
message.
Access queries and dashboards
Use queries and dashboards to monitor activity and help you determine which action to take
on detections. You can use the predefined queries and dashboards, and create additional ones
to meet your needs. For information about queries and dashboards, see the ePolicy Orchestrator
product documentation.
Queries
Depending on your ePolicy Orchestrator version, navigate to the Queries using:
ePolicy Orchestrator 4.5 and 4.6
1
Click Menu | Reporting | Queries and the Queries page appears.
2
In the Queries pane, type VSE: in Quick find and click Apply. Only the VirusScan Enterprise
queries appear in the list.
ePolicy Orchestrator 4.0
1
Click Reporting | Queries and the Queries page appears.
2
In the Queries list, in the right-hand pane, scroll down to find the queries beginning with
"VSE:".
These predefined queries are available:
80
VSE: Compliance Over the Last 30 Days
VSE: Threats Detected Over the Previous 2 Quarters
VSE: Computers with Threats Detected per Week
VSE: Threats Detected per Week
VSE: Current DAT Adoption
VSE: Top 10 Access Protection Rules Broken
VSE: DAT Adoption Over the Last 24 Hours
VSE: Top 10 Buffer Overflows Detected
VSE: DAT Deployment
VSE: Top 10 Computers with the Most Detections
VSE: Detection Response Summary
VSE: Top 10 Detected Threats
VSE: Number of Detections by Tag
VSE: Top 10 Threat Sources
McAfee VirusScan Enterprise 8.8 Product Guide
Part III - Response: Handling Threats
Configuring emergency DATs
VSE: Spyware Detected in the Last 24 Hours
VSE: Top 10 Threats per Threat Category
VSE: Spyware Detected in the Last 7 Days
VSE: Top 10 Users with the Most Detections
VSE: Summary of Threats Detected in the Last 24 Hours
VSE: Unwanted Programs Detected in the Last 24 Hours
VSE: Summary of Threats Detected in the Last 7 Days
VSE: Unwanted Programs Detected in the Last 7 Days
VSE: Threat Count by Severity
VSE: Version 8.5 Compliance
VSE: Threat Names Detected per Week
VSE: Version 8.7 Compliance
VSE: Threats Detected in the Last 24 Hours
VSE: Version 8.8 Compliance
VSE: Threats Detected in the Last 7 Days
Dashboards
To access dashboards in the ePolicy Orchestrator console, go to Dashboards.
These predefined dashboards are available:
• VSE: Version 8.8 Compliance
• VSE: Trending Data
• VSE: Current Detections
Configuring emergency DATs
Emergency DATs can be downloaded manually to protect your system against a major virus
until the normal VirusScan DAT update is released.
NOTE: These EXTRA.DAT files should be automatically downloaded as part of your client system
AutoUpdates, or ePolicy Orchestrator scheduled pull process. Refer to the section, Updating
detection definitions.
Configuring emergency DATs is a two-step process.
1
Download the emergency DAT file. This process is the same for both client systems and
ePolicy Orchestrator repositories.
2
Install the emergency DAT file. This process is different for client systems and ePolicy
Orchestrator 4.0, 4.5, and 4.6 servers.
Each of the these processes is described in this section.
Contents
About emergency DATs
Downloading a SuperDAT file
Installing the SuperDAT files on an ePolicy Orchestrator repository
Installing the EXTRA.DAT file on a client system
About emergency DATs
Emergency DATs, called EXTRA.DAT files, contain information used by VirusScan Enterprise to
detect a new virus. When new malware is discovered and extra detection is required, an
McAfee VirusScan Enterprise 8.8 Product Guide
81
Part III - Response: Handling Threats
Configuring emergency DATs
EXTRA.DAT file, packaged in a SuperDAT (SDAT) executable file, is made available by McAfee
Labs until the normal VirusScan Enterprise DAT update is released.
NOTE: McAfee no longer posts individual EXTRA.DAT files on the Security Updates download
site. To get an EXTRA.DAT file for a specific threat, go to the McAfee Avert Labs Extra.dat
Request Page at, https://www.webimmune.net/extra/getextra.aspx.
SuperDAT packages
The SuperDAT executable is a self-installing package. It might also include a new virus-scanning
engine and other program components. The file uses the name format sdatXXXX.exe, where
XXXX is the four-digit DAT version number, for example sdat4321.exe.
When an EXTRA.DAT file is extracted from the SuperDAT executable and added to the Engine
folder on your hard drive, it is used by VirusScan Enterprise, in addition to its normal DAT files,
to detect the new virus. This enables VirusScan Enterprise to protect your computer from the
new malware code until the official DAT update is released that contains the malware detection
and removal information. Once the official DAT update is released and installed, the EXTRA.DAT
file is no longer needed.
NOTE: EXTRA.DAT files remain on your file system for 5 days, then they are automatically
deleted. You should keep your VirusScan Enterprise DAT files updated by automatically
downloading and installing the official daily updates.
Downloading a SuperDAT file
To download a SuperDAT (SDAT) file, you must connect to the McAfee Security Updates page.
Before you begin
• You must have a valid grant number to access the McAfee Security Updates page:
http://www.mcafee.com/apps/downloads/security_updates/dat.asp
• You must have Administrator privileges to update McAfee software.
Task
1
Go to the McAfee Security Updates page at the following URL:
http://www.mcafee.com/apps/downloads/security_updates/dat.asp
2
Click the SuperDATs tab, and double-click the sdatXXXX.exe file, where XXXX is the number
of the most recent DAT update.
NOTE: Double-click the readme.txt file for additional information.
3
Save the executable file to a temporary location, using its default name.
Installing the SuperDAT files on an ePolicy Orchestrator
repository
After you download the SuperDAT file you must install it on ePolicy Orchestrator server.
Before you begin
You must have Administrator privileges to update the McAfee software.
82
McAfee VirusScan Enterprise 8.8 Product Guide
Part III - Response: Handling Threats
Configuring emergency DATs
Task
For option definitions, click ? in the interface.
1
To install the SuperDAT file on an ePolicy Orchestrator server, use one of the following:
Server
Steps...
ePolicy Orchestrator 4.5 and 4.6 1
ePolicy Orchestrator 4.0
Click Menu | Software | Master Repository to open
the Packages in Master Repository page in the ePolicy
Orchestrator 4.5 and 4.6 console.
2
Click Actions | Check in Packages.
1
Click Software | Master Repository to open the
Packages in Master Repository page.
2
Click Check in Packages to open the Check in Packages
page.
2
Select Super DAT (EXE), browse to the location where you want to save the file, then
click Next.
3
Confirm your selection, then click Save. The Packages in Master Repository page displays
the new DAT package in the Name list.
Installing the EXTRA.DAT file on a client system
You can install the EXTRA.DAT file on a standalone client system after you have downloaded
the file from McAfee Labs. For EXTRA.DAT file downloading information, refer to About
emergency DATs.
Before you begin
You must have Administrator privileges to update the McAfee Security software.
Task
For option definitions, click Help in the interface.
1
Once the download is complete, locate the file you just saved, run the executable file, and
follow the instructions in the wizard.
The executable EXTRA.DAT file performs the following steps:
• Unloads McAfee memory-resident software or stops services that use your current DAT
files.
• Copies new DAT files to the appropriate program directories.
• Restarts the software components needed to continue scans with your new DAT files.
2
When the installer has finished updating your DAT files, you can delete the downloaded
file, or keep a copy available for further updates.
McAfee VirusScan Enterprise 8.8 Product Guide
83
Part IV - Monitoring, Analyzing, and
Fine-Tuning Your Protection
After the initial configuration of your protection strategy, you should monitor, analyze, and
fine-tune your protection. By checking the activity log files and ePolicy Orchestrator queries,
you can improve the performance and the protection of VirusScan Enterprise systems.
Contents
Monitoring activity in your environment
Analyzing your protection
Monitoring activity in your environment
An important step in a protection strategy is monitoring the malware events that occur on your
systems. To do this you need to understand the tools to use and how to use them.
Tools for monitoring activity
VirusScan Enterprise provides many ways to monitor the threat events that occur on your
protected systems. The tools you use depend on whether you use the ePolicy Orchestrator
console or the VirusScan Console.
Query and dashboard uses
Use the ePolicy Orchestrator queries and dashboards to monitor activity on your McAfee managed
systems, and determine what action to take on detections.
For additional information about queries and dashboard see the following:
• Refer to Access queries and dashboards for a complete list of the predefined queries available.
• Refer to the ePolicy Orchestrator product documentation for information about modifying
and creating queries and dashboards.
Activity log uses
The VirusScan Console activity logs store a record of events that occur on your VirusScan
Enterprise protected system. The following table describes the log files.
All activity log files are stored, by default, at one of the following locations, depending on your
operating system:
84
McAfee VirusScan Enterprise 8.8 Product Guide
Part IV - Monitoring, Analyzing, and Fine-Tuning Your Protection
Monitoring activity in your environment
• For Microsoft Windows XP, Microsoft Vista, Microsoft 2000 Server, Microsoft 2003 Server,
and Microsoft 2008 Server — C:\Documents and Settings\All Users\Application
Data\McAfee\DesktopProtection
• For Microsoft Windows 7 — C:\ProgramData\McAfee\DesktopProtection
Table 1: Log files
File name
How to access
Displays
AccessProtectionLog.txt
In the Task column, click Access Protection |
Reports tab, and click View Log.
Date, time, event, user,
and name of file.
BufferOverflowProtectionLog.txt In the Task column, click Buffer Overflow
Protection | Reports tab, and click View Log.
MirrorLog.txt
Date, time, what
executable caused the
overflow, and if it was a
stack or heap overflow.
•
For Microsoft Windows XP, Microsoft Vista,
Date, time, path to the
Microsoft 2000 Server, Microsoft 2003 Server,
mirror files, and any
and Microsoft 2008 Server — C:\Documents and additional information.
Settings\All Users\Application
Data\McAfee\DesktopProtection
•
For Microsoft Windows 7 —
C:\ProgramData\McAfee\DesktopProtection
OnAccessScanLog.txt
In the Task column, click On-Access Scanner |
General Settings | Reports tab, and click View
Log.
Date, time, detected
malware, what action was
taken, and what was
found.
OnDemandScanLog.txt
From the menu, click Task | View Log.
Date, time scan occurred,
any action performed, to
what file, and what was
found.
UpdateLog.txt
•
For Microsoft Windows XP, Microsoft Vista,
Microsoft 2000 Server, Microsoft 2003 Server,
and Microsoft 2008 Server — C:\Documents and
Settings\All Users\Application
Data\McAfee\DesktopProtection
Date, time update
occurred, who initiated
the update, and any
information about the
update.
•
For Microsoft Windows 7 —
C:\ProgramData\McAfee\DesktopProtection
Running an example query
Run a simple query to determine how many threats were detected per week on your managed
systems. This query is just an example. The queries you run or configure depend on the
information you want to retrieve from the ePolicy Orchestrator database.
Task
For option definitions, click ? in the interface.
1
Use one of the following to run a simple ePolicy Orchestrator query:
• ePolicy Orchestrator 4.5 or 4.6 — Click Menu | Reporting | Queries, scroll down to
the VSE: Threats Detected per Weeks query, and click Run.
• ePolicy Orchestrator 4.0 — Click Reporting | Queries, scroll down to the VSE: Threats
Detected per Weeks query, and click Run.
2
If any threats were detected, the query output display shows the following:
• A bar chart with the number of threats and in which weeks they occurred.
McAfee VirusScan Enterprise 8.8 Product Guide
85
Part IV - Monitoring, Analyzing, and Fine-Tuning Your Protection
Analyzing your protection
• A table with similar information and a total of the threats.
NOTE: You can click on the bar chart or table information to open the ePolicy Orchestrator
database data.
3
Click Close to return to the queries list.
There are many more default queries you can run, plus you can create your own queries. See
the ePolicy Orchestrator documentation for details.
Analyzing your protection
Analyzing the protection of your VirusScan Enterprise protected system should be an on-going
process and improves the protection and performance of your system.
Contents
The importance of analysis
Analyzing protection examples
The importance of analysis
Analyzing your protection allows you to determine which kind of threats you are facing, from
where, how often they are found, and which systems are being targeted. For example, if one
system is being continuously attacked, maybe that system should be moved to a more secure
part of your network and have increased security enabled to protect it.
This analysis is also helpful when:
• Creating reports for IT and managers.
• Capturing information used to create scripts and queries.
• Monitoring network access time and VirusScan Enterprise update network usage.
Analyzing protection examples
You can use the steps in these analysis examples as a framework for analyzing most VirusScan
Enterprise protection scenarios.
These examples describe seeing a spike of malware attacks and determining:
• Where and when the attacks occurred
• What malware was used in the attack
• How the attack affected the system
Tasks
ePolicy Orchestrator 4.5 or 4.6
ePolicy Orchestrator 4.0
VirusScan Console
86
McAfee VirusScan Enterprise 8.8 Product Guide
Part IV - Monitoring, Analyzing, and Fine-Tuning Your Protection
Analyzing your protection
ePolicy Orchestrator 4.5 or 4.6
This example analysis is used as a framework for analyzing most VirusScan Enterprise protection
scenarios with ePolicy Orchestrator 4.5 or 4.6.
Before you begin
You must have direct or remote access to a VirusScan Enterprise protected system to perform
this example analysis.
Task
For option definitions, click ? in the interface.
1
Determine where and when the attacks occurred:
a Click Menu | Reporting | Queries to open the Queries pane.
b Type Malware in the Quick find search and click Apply. The Malware Detection History
query appears in the Queries list.
c Select the query and click Actions | Run. The query returns the number of recent
attacks.
2
To determine which malware was used in the attack, click Menu | Reporting | Threat
Event Log to display the Threat Event Log.
3
Double-click the log event to display the details page in the pane. From the log event you
can determine:
• Threat Source IP Address and target are shown to help you determine what actions
to take.
• Threat Name and Threat Type describe what malware was used in the attack.
• Threat Event Descriptions describe how the attack affected the system and what
actions were taken on the threat.
ePolicy Orchestrator 4.0
This example analysis is used as a framework for analyzing most VirusScan Enterprise protection
scenarios with ePolicy Orchestrator 4.0.
Before you begin
You must have direct or remote access to a VirusScan Enterprise protected system to perform
this example analysis.
Task
For option definitions, click ? in the interface.
1
Determine where and when the attacks occurred:
a Click Reporting | Queries to open the Queries list.
b From the Public Queries list, select ePO: Malware Detection History and click More
Actions | Run. The Malware Detection History query appears in the Queries list.
2
To view the event that triggered the malware detection, click Reporting | Event Log,
the query returns the number of recent attacks.
3
Double-click the log event to display the details page in the pane. From the log event you
can determine:
McAfee VirusScan Enterprise 8.8 Product Guide
87
Part IV - Monitoring, Analyzing, and Fine-Tuning Your Protection
Analyzing your protection
• Threat Source IP Address and target are shown to help you determine what actions
to take.
• Threat Name and Threat Type describe what malware was used in the attack.
• Threat Event Descriptions describe how the attack affected the system and what
actions were taken on the threat.
VirusScan Console
This example analysis is used as a framework for analyzing most VirusScan Enterprise protection
scenarios using VirusScan Console.
Before you begin
You must have direct or remote access to a VirusScan Enterprise protected system to perform
this example analysis.
Task
For option definitions, click Help in the interface.
1
From the Task list, right-click On-Access Scanner and select Statistics from the list.
The On-Access Scan Statistics dialog box appears.
2
In the Scanning Statistics group, note the number of Detected files that appears. If this is
any number other than zero, click Properties to open the On-Access Scan Properties
dialog box.
3
Click the Reports tab and View Log. The OnAccessScanLog.txt file appears in a NotePad
window.
4
From this output you can determine:
• What malware was used in the attack. For example,
C:\...\eicar.com EICAR test file
• How the attack affected the system. For example,
(Clean failed because the detection isn't cleanable)
• What actions were taken on the threat. For example,
Deleted
5
88
Use the information in the previous step to determine if the source, or target systems need
their virus protection settings modified, or if you want to take some other action.
McAfee VirusScan Enterprise 8.8 Product Guide
Appendix
There are more configuration and troubleshooting features you can use to improve the protection
provided by VirusScan Enterprise. These features use familiar tools, for example, the ePolicy
Orchestrator console, the command-line, and the Internet.
Contents
Configuring ePolicy Orchestrator server tasks
Using the command line with VirusScan Enterprise
Connecting to remote systems
Submit threat samples for analysis
Access the McAfee Labs Threat Library
Troubleshooting
Configuring ePolicy Orchestrator server tasks
Server tasks, configured in ePolicy Orchestrator, allow you to schedule and run automatic tasks
to manage your server and the VirusScan Enterprise software.
VirusScan Enterprise server tasks can be configured to automatically generate the following:
• Export Policies — Runs a policy report and stores the policy information in a file.
• Run Query — Runs a preconfigured query and, if configured, displays the output on the
ePolicy Orchestrator dashboard.
• Export Queries — Runs a preconfigured query and either emails the report to a configured
address or exports the report to a configured location.
NOTE: The Export Queries feature is only avalable using ePolicy Orchestrator 4.5 and 4.6.
The ePolicy Orchestrator server has the following VirusScan Enterprise server tasks already
installed:
• VSE: Compliance Over the Last 30 Days — Runs a query once a day, which stores
McAfee anti-virus software compliance status.
• VSE: DAT Adoption Over the Last 24 Hours — Runs a query every hour, which stores
McAfee anti-virus software DAT version status.
NOTE: To configure custom server tasks, see the appropriate ePolicy Orchestrator product guide
for detailed instruction.
Configuring example server task
To enable and configure the existing ePolicy Orchestrator VSE: Compliance Over the Last 30
Days server task.
McAfee VirusScan Enterprise 8.8 Product Guide
89
Appendix
Configuring ePolicy Orchestrator server tasks
Before you begin
You must have Administrator privileges to update the ePolicy Orchestrator configuration.
Task
For option definitions, click ? in the interface.
1
Open the existing Server Task page from ePolicy Orchestrator.
• ePolicy Orchestrator 4.5 or 4.6 — Click Menu | Automation | Server Tasks.
• ePolicy Orchestrator 4.0 — Click Automation | Server Tasks.
2
In the Name column, find the VSE: Compliance Over the Last 30 Days task and click
Edit in the Actions column. The Server Task Builder page appears.
3
Next to Schedule Status, click Enabled, then click Next. The Actions page appears.
Next to 1. Actions, Run Query is selected by default.
4
Next to Query, VSE: Version 8.8.0 Compliance is selected by default. If needed, change
the Language setting.
In the Sub-Actions group, confirm the following items are selected by default:
• Generate Compliance Event in the Sub-Actions list.
• Specific number of target systems is selected with 1 in the text-box.
5
Add VirusScan Enterprise, Version 8.7 and 8.5 compliance actions to the server task:
a In the 1. Actions row, click plus (+) to open an additional actions row.
b Configure the following in the new 2. Actions row:
• Next to 2. Actions, select Run Query from the list.
• Next to Query, select VSE: Version 8.7 Compliance from the list.
• If needed, change the Language setting.
• Confirm, in the Sub-Actions group, the Generate Compliance Event and Specific
number of target systems is selected with 1 in the text-box.
c In the 2. Actions row, click plus (+) to open an additional actions row.
d Configure the following in the new 3. Actions row:
• Next to 3. Actions, select Run Query from the list.
• Next to Query, select VSE: Version 8.5 Compliance from the list.
• If needed, change the Language setting.
• Confirm, in the Sub-Actions group, the Generate Compliance Event and Specific
number of target systems is selected with 1 in the text-box.
6
Click Next to open the Schedule page.
7
Select how often to run the server task from the Schedule type list.
• Set the Start date, or accept the current date as the default.
• Set theEnd date, or accept No end date as the default.
• Set theSchedule, accept the default, or set another start time for the query to run.
8
Click Next to open the Summary page. Confirm the information configured is correct.
9
Click Save, then the Server Task page reappears.
10 Confirm the VSE: Compliance Over the Last 30 Days server task has its Status enabled
and the Next Run date and time settings are correct.
90
McAfee VirusScan Enterprise 8.8 Product Guide
Appendix
Using the command line with VirusScan Enterprise
Using the command line with VirusScan Enterprise
You can use the Command Prompt to run some basic VirusScan Enterprise processes. You can
install, configure, and update VirusScan Enterprise from the command line. Command line
installation options are described in the VirusScan Enterprise Installation Guide.
Command line scan example
To scan all files, update the log files with the results of the scan, and automatically close the
on-demand scan dialog box when completed, enter the following command:
scan32 /all /log /autoexit
Command line update example
To update the DAT files, scanning engine, and product quietly, or not display the McAfee Update
dialog box during the update, enter the following command
mcupdate /update /quiet
On-demand scanning command-line options
VirusScan Enterprise uses the on-demand scanner SCAN32.EXE to detect threats. You can use
the same executable command, SCAN32, from the command line, or as part of a batch file, to
run scans.
The SCAN32 syntax does not require any specific order on its elements, except that you cannot
separate a property and its value. This syntax consists of:
• File name — The name of the executable file: SCAN32.EXE.
• Options — The option is preceded by a forward slash (/) character and is not case-sensitive.
The command format is:
SCAN32 PROPERTY=VALUE [,VALUE] [/option].
Following is a scan32.exe command example:
scan32.exe PRIORITY /normal
In this example:
• "PRIORITY" is a command value.
• "/normal" is a value option.
On-demand scanning values and options
Command-line
value
Definition with options
ALL
Scans all files in the target folder.
ALLOLE
Scans default files plus all Microsoft Office documents.
ALWAYSEXIT
Forces exit from on-demand scan, even if scan completed with error/failure.
APPLYNVP
Scans for the potentially unwanted programs that are defined in the Unwanted Programs
Policy.
ARCHIVE
Scans archive files such as .ZIP, .CAP. LZH, and .UUE files.
AUTOEXIT
Exits the on-demand scanner upon completion of a non-interactive scan.
McAfee VirusScan Enterprise 8.8 Product Guide
91
Appendix
Using the command line with VirusScan Enterprise
Command-line
value
Definition with options
CLEAN
Cleans the detected target file when a potentially unwanted program is found.
CLEANA
Cleans the detected file when an unwanted program is found.
CONTINUE
Continues scanning after a potentially unwanted program is detected.
CONTINUE2
Continues scanning after a potentially unwanted program is detected and the primary action
has failed.
CONTINUEA
Continues scanning after an unwanted program is detected.
CONTINUEA2
Continues scanning after an unwanted program is detected and the primary action has failed.
DEFEXT
Adds file extensions that you specify as parameters to the list of selected file types that are
included in scanning.
DELETE
Deletes the detected file when a potentially unwanted program is found.
DELETE2
Deletes the detected file when a potentially unwanted program is found and the primary action
has failed.
DELETEA
Deletes the file when an unwanted program is detected.
DELETEA2
Deletes the file when a potentially unwanted program is detected and the primary action has
failed.
EDIT
Displays the scan properties dialog box.
EXT
Replaces the extensions on the list of selected file types that are included in scanning with
the file extensions that you add, as parameters following this argument.
LOG
Logs detection reports to a previously specified log file.
LOGFORMAT
<value>
Uses the specified format for the log file. Valid values are ANSI, UTF8, or UTF16.
LOGSETTINGS
Logs the configuration settings of a scan.
LOGSUMMARY
Logs a summary of scan results.
LOGUSER
Logs identifying information about the user who executes a scan.
MHEUR
Enables Artemis detection of macro threats.
MIME
Detects potentially unwanted programs in mime (Multipurpose Internet Mail Extensions)
encoded files.
NOESTIMATE
Does not calculate scan size before beginning scanning of files. Progress bar does not display.
PHEUR
Enables Artemis detection of non-macro threats.
PRIORITY
Sets the priority of the scan relative to other CPU processes. Requires one of the following
options:
•
LOW
•
BELOWNORMAL — The ePolicy Orchestrator default.
•
NORMAL — The VirusScan Console default.
NOTE: You can enter a numerical parameter of 1 to 100, where 10 equals LOW, 50 equals
BELOWNORMAL, and 100 equals NORMAL.
92
PROMPT
Prompts the user for action when a potentially unwanted program is detected.
PROMPT2
Prompts the user for action when a potentially unwanted program is detected and the primary
action has failed.
PROMPTA
Prompts the user for action when an unwanted program is detected.
McAfee VirusScan Enterprise 8.8 Product Guide
Appendix
Using the command line with VirusScan Enterprise
Command-line
value
Definition with options
PROMPTA2
Prompts the user for action when an unwanted program is detected and the primary action
has failed.
RPTSIZE
Sets the size of the alert log, in Megabytes.
START
Runs the scan. Does not display the properties dialog box.
TASK
Launches the on-demand scanner task specified in the VirusScan Console. Requires additional
parameter specifying the specified task ID as recorded in the registry at:
hkey_local_machine_\software\McAfee\Desktop\Protection\Tasks.
UINONE
Launches the scanner without making the user interface dialog visible.
Update task command-line options
VirusScan Enterprise uses MCUPDATE.EXE to perform update tasks. You can use the same
executable command MCUPDATE from the command line, or as part of a batch file, to run update
tasks.
The MCUPDATE syntax does not require any specific order in its elements, except that you
cannot separate a property and its value. The syntax consists of:
• File name — The name of the executable file: MCUPDATE.EXE.
• Options — The option is preceded by a forward slash (/) character and is not case-sensitive.
The command format is:
MCUPDATE [/<type> [/TASK <guid>]] [/option].
NOTE: In the previous format, <type> can be ROLLBACKDATS or UPDATE.
The /TASK clause is optional. If you use it however, you must also specify an update task ID
(guid). The task ID you select must be for an update or a rollback DATs task. Do not select to
scan ID. If you do not specify a task ID, the default update task is used. Task IDs are located
at: hkey_local_machine\SOFTWARE\McAfee\DesktopProtection\Tasks\
The /option clause is not required. To perform a silent update task, use /QUIET.
NOTE: The /QUIET option is not supported for use with the rollback DATs task. This example
performs a silent update task: MCUPDATE /UPDATE /QUIET.
Update task options
Command-line
option
Definition
ROLLBACKDATS
Rolls the current DAT file back to the last backed up version.
UPDATE
Performs an update of the DAT file, scanning engine, product, or extra.dat.
/TASK
Launches the AutoUpdate or rollback DATs task specified in the VirusScan Console. Requires
an additional parameter to specify the task ID as recorded in the registry at:
hkey_local_machine\software\McAfee\DesktopProtection\Tasks
/QUIET
Performs the task silently.
McAfee VirusScan Enterprise 8.8 Product Guide
93
Appendix
Connecting to remote systems
Connecting to remote systems
You can connect to remote systems with VirusScan Enterprise installed to perform operations
such as modifying, scheduling scanning, update tasks, or enabling and disabling the on-access
scanner on a remote system.
NOTE: If you do not have administrator rights to connect to the remote system, you receive
an Insufficient user rights access denied message.
When you start the VirusScan Remote Console, the name of the system you are connected
to appears in the console title bar. If you have not connected to a system elsewhere on the
network, the title bar does not show the name of your local system. When you open any task’s
properties dialog box from a remote console, the system name is displayed in the properties
dialog box title bar.
You can open multiple remote consoles. When you close the Connect to Remote Computer
dialog box, the connection to the remote system also closes.
Accessing remote systems with VirusScan Enterprise installed
To connect to remote systems that you want to administer, with VirusScan Enterprise installed,
use Open Remote Console on the VirusScan Console.
Task
For option definitions, click Help in the interface.
1
From the Tools menu on the VirusScan Enterprise 8.8 Console, select Open Remote
Console.
2
Under Connect to computer, type the name of the system that you want to administer,
and select a system from the list, or click Browse to locate the system on the network.
NOTE: If environmental variables are used while configuring the path name of the file or
folder for a remote task, be sure that the environmental variable exists on the remote
system. The VirusScan Enterprise 8.8 Console cannot validate environmental variables on
the remote system.
3
Click OK to make a connection attempt to the destination system.
When you connect to the remote system:
• The title bar changes to display that system’s name.
• The console reads the remote system's registry and displays the tasks of the remote
system.
• You can add, delete, or reconfigure tasks for the remote system.
Submit threat samples for analysis
If you find a potential threat that is not being detected, or if the scanner detects something
that you think it should not detect as a threat, with the current DAT file, you can submit a
sample of the threat to McAfee Labs through the WebImmune. McAfee Labs analyzes the sample
and considers it for inclusion, or exclusion in the next DAT file.
You can submit a sample to McAfee Labs in three ways, by accessing the web site WebImmune,
by email, or by standard mail.
94
McAfee VirusScan Enterprise 8.8 Product Guide
Appendix
Access the McAfee Labs Threat Library
WebImmune
1
From the VirusScan Console, select Help | Submit a Sample to access the website. The
website is located at: https://www.webimmune.net/default.asp.
2
Log on to your free account, or create one.
3
Upload files directly to the McAfee Labs automated systems for review. Items are escalated
to the McAfee Labs analysts if additional research is required.
Email
Send emails directly to the McAfee Labs automated systems for review. Items are escalated to
the McAfee Labs analysts if additional research is required.
The global email address is virus_research@avertlabs.com.
NOTE: Get additional regional addresses from the WebImmune website.
Standard Mail
Get the address from the WebImmune website.
NOTE: This is the least preferred method and causes the longest turnaround time for review
of your sample.
Access the McAfee Labs Threat Library
To access the McAfee Labs Threat Library from the VirusScan Enterprise 8.8 Console, select
McAfee Labs Threat Library from the Help menu. Your internet browser opens with a
connection to http://vil.nai.com/vil/default.aspx.
Troubleshooting
Before you call McAfee Technical Support, read the information in this section. It contains
processes and tools you can use to troubleshoot your VirusScan Enterprise configuration, and
frequently asked questions.
Repairing the product installation
There may be times when you need to repair the installation of VirusScan Enterprise to restore
the default setting, reinstall the program files, or perform both steps. You can do this from the
VirusScan Console or the command-line.
Using the VirusScan Console
Using the Repair Installation utility, from the VirusScan Enterprise 8.8 Console, select Help
| Repair Installation.
NOTE: This feature is not available from the ePolicy Orchestrator console.
Option
Restore all settings to installation
defaults
Definition
Restores the VirusScan Enterprise default installation settings.
CAUTION: Customized settings might be lost.
McAfee VirusScan Enterprise 8.8 Product Guide
95
Appendix
Troubleshooting
Option
Reinstall all program files
Definition
Reinstalls the VirusScan Enterprise program files.
CAUTION: Hotfixes, Patches, and Service Packs might be overwritten.
Using SETUPVSE.exe at the command line
To repair or reinstall VirusScan Enterprise from the command line with the SETUPVSE.exe
command, use these commands.
NOTE: For REINSTALLMODE command line parameter options, refer to REINSTALLMODE
Property at http://msdn.microsoft.com/en-us/library/aa371182(VS.85).aspx.
Description
Command
Install program files only
SETUPVSE.exe REINSTALLMODE=sec /q
Install registry files only
SETUPVSE.exe REINSTALLMODE=secum /q
Install both program and registry files
SETUPVSE.exe REINSTALLMODE=amus /q
Using msiexec.exe at the command line
To repair or reinstall VirusScan Enterprise from the command line with the msiexec.exe command,
use these commands.
NOTE: For msiexec.exe command line options, refer to The Command-Line Options for the
Microsoft Windows Installer Tool Msiexec.exe at http://support.microsoft.com/kb/314881.
Description
Command
Install program files only
msiexec.exe /I VSE880.msi REINSTALL=ALL REINSTALLMODE=sa
/q REBOOT=R
Install registry files only
msiexec.exe /I VSE880.msi REINSTALL=ALL REINSTALLMODE=mu
/q REBOOT=R
Install both program and registry files
msiexec.exe /I VSE880.msi REINSTALL=ALL
REINSTALLMODE=samu /q REBOOT=R
Viewing the on-access activity log file
The VirusScan Console on-access activity log file shows you the history of updates, threat
activity, and how VirusScan Enterprise responded. This information can be useful when
troubleshooting automatic update activity and policy configurations.
Use one of the following process to access the on-access activity log files:
NOTE: You must have the on-access activity log file creation enabled. To enable the on-access
activity log file, refer to Configuring general settings.
Task
For option definitions, click Help on each tab.
1
96
From the Task list, right-click On-Access Scanner, then click Properties to open the
dialog box.
McAfee VirusScan Enterprise 8.8 Product Guide
Appendix
Troubleshooting
2
From the On-Access Scanner Properties dialog box, click the Reports tab and click View
Log. The OnAccessScanLog.txt file appears in a Notepad window. Following is an example
of the log file output.
3
The following table describes the data in the previous OnAccessScanLog.txt example:
Log entry example
Description
4/27/2010
Date
1:35:47 PM
Time
Cleaned/Deleted/No Action Taken
Action taken
File updated = version, or (Clean failed because...
Description of action
SRVR\user
Credentials
C:\WINDOWS\system32\NOTEPAD.EXE
C:\temp\eicar.com
Path and name of the threat file
EICAR test file (Test)
Description of the file
Similar information is available using ePolicy Orchestrator queries. For details, refer to Access
queries and dashboards.
Using the MER tool during troubleshooting
The Minimum Escalation Requirements (MER) tool collects McAfee VirusScan Enterprise, and
other McAfee product, data from your computer. Using this data allows McAfee Technical Support
to analyze and resolve your problem.
The WebMER tool can be downloaded using any of these file formats:
• EXE
• ZIP
• ProtectedZip
The information collected by the WebMER tool includes:
• Registry details
• File version details
• Files
• Event logs
• Process details
To use the WebMER tool, you must:
• View the Obtaining Minimum Escalation Requirements using McAfee WebMER tutorial found
at: https://kc.mcafee.com/corporate/index?page=content&id=TU30146.
McAfee VirusScan Enterprise 8.8 Product Guide
97
Appendix
Troubleshooting
• Download and install the tool from: http://mer.mcafee.com.
NOTE: An ePolicy Orchestrator deployable version is also available. This version uses the
ePolicy Orchestrator console to run the MER on client computers for collecting logs and
information when diagnosing McAfee product problems. Download the McAfee MER for
ePolicy Orchestrator 4.x (v2.0) from: http://mer.mcafee.com/enduser/downloadepomer.aspx.
• Run the tool and send the output back to McAfee Technical Support.
Disabling VirusScan Enterprise during troubleshooting
If a system problem occurs that could be related to processes VirusScan Enterprise is running,
you can systematically disable VirusScan Enterprise functions until the system problem is
eliminated. Or, at least you can eliminate VirusScan Enterprise as the cause of the problem.
CAUTION: You must reconfigure or restore VirusScan Enterprise to have full malware protection
again after troubleshooting.
Systematically disabling the VirusScan Enterprise functionality is separated into the following
eight-step process:
1
Disabling Buffer Overflow protection
2
Disabling Access Protection
3
Disabling ScriptScan
4
Disabling On Access Scanning
5
Disabling On Access Scanning then reboot
6
Preventing MFEVTP from loading then reboot
7
Renaming mfehidk.sys then reboot
8
Removing the product then reboot
Each of these eight steps is described in the following sections. For option definitions in the
VirusScan Console, click Help in the interface.
Disabling buffer overflow protection
Follow these steps to disable Buffer Overflow protection.
1
From the VirusScan Console Task list, right-click Buffer Overflow Protection and click
Properties.
2
From the Properties dialog box, deselect Enable buffer overflow protection and click
OK.
3
Is the original system problem fixed by disabling Buffer Overflow protection:
• Yes — Go to the McAfee Technical Support ServicePortal at http://mysupport.mcafee.com
and search for a solution or contact McAfee Technical Support.
• No — The original system problem was probably not related to this feature.
Disabling access protection
Follow these steps to disable Access Protection.
98
1
From the VirusScan Console Task list, double-click Access Protection to open the Access
Protection Properties dialog box.
2
Click Access Protection tab, deselect Enable access protection and click OK.
McAfee VirusScan Enterprise 8.8 Product Guide
Appendix
Troubleshooting
3
Is the original system problem fixed by disabling Access Protection:
• Yes — Go to the McAfee Technical Support ServicePortal at http://mysupport.mcafee.com
and search for a solution or contact McAfee Technical Support.
• No — The original system problem was probably not related to VirusScan Enterprise.
Disabling ScriptScan
Follow these steps to disable ScriptScan.
1
From the VirusScan Console Task list, right-click On-Access Scanner to open the On-Access
Scan Properties dialog box.
2
Click ScriptScan tab, deselect Enable scanning of scripts and click OK.
3
Is the original system problem fixed by disabling ScriptScan:
• Yes — Go to the McAfee Technical Support ServicePortal at http://mysupport.mcafee.com
and search for a solution or contact McAfee Technical Support.
• No — The original system problem was probably not related to VirusScan Enterprise.
Disabling on-access scanning
Follow these steps to disable on access scanning.
1
Disable Access Protection. From the VirusScan Console in the Task list, right-click Access
Protection and select Disable.
2
Change the McShield Services applet Start type to Disabled using the following:
• Click Start | Control Panel | Administrative Tools | Services to open the Services
applet.
• In Services (Local), scroll down to McAfee McShield and right-click the name to open
the McAfee McShield Properties dialog box.
• Click the General tab, from the Startup type list, click Disabled, and click OK.
3
From the VirusScan Console Task list, right-click On-Access Scanner and click Disable
from the list that appears. The On-Access Scanner icon should change to include a circle
with a slash to indicate the function is disabled.
4
Is the original system problem fixed by disabling On Access scanning:
• Yes — Go to the McAfee Technical Support ServicePortal at http://mysupport.mcafee.com
and search for a solution or contact McAfee Technical Support.
• No — The original system problem was probably not related to this feature.
Disabling on-access scanning then reboot
Follow these steps to disable on access scanning and reboot.
NOTE: The following process assumes you have not re-enabled on access scanning after disabling
it in the previous section.
1
Perform a complete shut-down and reboot of the system.
2
Is the original system problem fixed by disabling On Access scanning then rebooting:
• Yes — Go to the McAfee Technical Support ServicePortal at http://mysupport.mcafee.com
and search for a solution or contact McAfee Technical Support.
• No — The original system problem was probably not related to this feature.
McAfee VirusScan Enterprise 8.8 Product Guide
99
Appendix
Troubleshooting
Preventing MFEVTP from loading then reboot
Follow these steps to prevent McAfee Validation Trust Protection Service (MFEVTP) from loading
and reboot the system:
CAUTION: This section contains information about opening or modifying the registry.
• The following information is intended for System Administrators. Registry modifications are
irreversible and could cause system failure if done incorrectly.
• Before proceeding, McAfee strongly recommends backing up your registry and understanding
the restore process. For more information, see: http://support.microsoft.com/kb/256986 .
• Do not run a .REG file that is not confirmed to be a genuine registry import file.
1
From the command line, type regedit to display the Registry Editor user interface.
2
Navigate to the following Registry:
[HKEY_LOCAL_MACHINE\System\ControlSet001\Services\mfevtp]
3
In the right-hand pane, right-click Start and click Modify to display the Edit DWORD Value
dialog box.
4
Enter 4 in Value data and click OK.
5
Is the original system problem fixed by preventing MFEVTP from loading then rebooting:
• Yes — Go to the McAfee Technical Support ServicePortal at http://mysupport.mcafee.com
and search for a solution or contact McAfee Technical Support.
• No — The original system problem was probably not related to this feature.
Renaming mfehidk.sys file then reboot
Follow these steps to rename the mfehidk.sys file and reboot the system.
1
Navigate to the mfehidk.sys file in the following folder, depending on your operating system:
• For 32-bit operating systems — %windir%\System32\drivers
• For 64-bit operating systems — %windir%\System64\drivers
2
Change the file name from mfehidk.sys to, for example, mfehidk.sys.saved.
3
Reboot the system to stop and restart VirusScan Enterprise without loading the mfehidk.sys
file.
4
Is the original system problem fixed by renaming the mfehidk.sys file then rebooting:
• Yes — Go to the McAfee Technical Support ServicePortal at http://mysupport.mcafee.com
and search for a solution or contact McAfee Technical Support.
• No — The original system problem was probably not related to VirusScan Enterprise.
Removing the product then reboot
Follow these steps to completely remove VirusScan Enterprise and reboot:.
1
Remove the VirusScan Enterprise program files. Refer to the McAfee VirusScan Enterprise
8.8, Installation Guide for detailed instructions.
2
Reboot the system to stop and restart the operating system without VirusScan Enterprise
installed.
3
Is the original system problem fixed by completely removing the VirusScan Enterprise
program files and rebooting:
• Yes — The original system problem was probably related to VirusScan Enterprise.
100
McAfee VirusScan Enterprise 8.8 Product Guide
Appendix
Troubleshooting
• No — Go to the McAfee Technical Support ServicePortal at http://mysupport.mcafee.com
and search for a solution, or contact McAfee Technical Support.
Suggested support and troubleshooting tools
As a VirusScan Enterprise Global Administrator there are tools you should install and configure
to help you troubleshoot and evaluate your system security and performance. When you contact
McAfee Technical Support, they might ask you to run some of these tools while troubleshooting
your configuration. These tools can be downloaded from the internet sites listed in these tables.
McAfee tools
The support and troubleshooting tools you can download from McAfee are listed in this table.
Tool
Download site
MER Tool
WebMER
ProcessCounts
Provided by McAfee Support
SuperDAT Manager
Provided by McAfee Support
McAfee Profiler
Provided by McAfee Support
Non-McAfee tools
The support and troubleshooting tools, executable, and download site are listed in this table.
Tool
Executable
Download site
Driver Verifier
Verifier
Microsoft.com
Performance Monitor
PerfMon
Microsoft.com
Pool Monitor
PoolMon
Microsoft.com
Process Monitor
ProcMon
Microsoft.com
Process Explorer
ProcExp
Microsoft.com
Process Dump
ProcDump
Microsoft.com
Windows Object Viewer
WinObj
Microsoft.com
TCP Viewer
TCPView
Mircosoft.com
Debug Output Viewer
DebugView
Microsoft.com
Windows Debugger
WinDbg
Microsoft.com
Kernel Rate Viewer
KrView
Microsoft.com
Windows Performance Analysis Tools
Xperf
Microsoft.com
VM Converter
Varies
Vmware.com
WireShark
wireshark
Wireshark.org
Frequently asked questions
This section contains troubleshooting information in the form of frequently asked questions.
McAfee VirusScan Enterprise 8.8 Product Guide
101
Appendix
Troubleshooting
Installation
• Question: I just installed the software using the silent installation method, and there is no
VirusScan Enterprise icon in the Windows system tray.
Answer: The icon shield does not appear in the system tray until you restart your system.
However, even though there is no icon, VirusScan Enterprise is running and your system is
protected. Verify this by checking for the following registry key:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ ShStatEXE="C:\Program
Files\McAfee\VirusScan Enterprise\SHSTAT.EXE"/STANDALONE.
• Question: Why can some users on my network configure their own settings and others
cannot?
Answer: The administrator might have configured the user interface so that tasks are
password-protected. If so, users cannot change settings. In addition, different Windows
operating systems have different user privileges. Refer to your Microsoft Windows
documentation for more information about user privileges.
Blocked programs
• Question: I installed VirusScan Enterprise and now one of my programs does not work.
Answer: The program might be blocked by an access protection rule.
1
Review the access protection log file to determine if the program was blocked by a rule.
2
If you find the program listed in the log, you can either enter it as an exclusion to the
rule or disable the rule. See Protecting your system access points for more information.
Cookie detections
• Question: When reviewing the cookie detections in the on-demand scan activity log, I
noticed that the file name detection is always 00000000.ie for every detection. Why does
VirusScan Enterprise assign the same file name for every on-demand scan cookie detection
when other programs assign an individual or incremental file name to each cookie detection?
Answer: VirusScan Enterprise assigns the same file name to each cookie detection because
of the way the on-demand scanner detects and takes action on cookies. This behavior applies
only to cookies detected by on-demand scans. A cookie file might contain many cookies.
The scan engine treats a cookie file as an archive and assigns a value as an offset from the
beginning of the file (starting with zero). Because the scanner uses the scan engine to detect
and take action on each detected cookie before it proceeds with the scan, the value starts
at zero for each detection. The result is that every detection is assigned a 00000000.ie file
name. Other products detect all cookies, assign each one an individual or incremental file
name, then take action on each detection.
General
• Question: On my standalone VirusScan Enterprise system, the system icon in my system
tray appears to be disabled.
Answer: If there is a red circle and line covering the VirusScan Enterprise icon, that indicates
the on-access scanner is disabled. Here are the most common causes and solutions. If none
of these solves your problem, contact Technical Support:
102
1
Make sure that the on-access scanner is enabled. Right-click the VirusScan Enterprise
icon in the system tray. If the on-access scanner is disabled, click Enable On-Access
Scan.
2
Make sure that the McShield service is running.
McAfee VirusScan Enterprise 8.8 Product Guide
Appendix
Troubleshooting
• Start the service manually from the Services Control Panel.
• Select Start | Run, then type Net Start McShield.
• Set the service to start automatically from the Services Control Panel.
• Question: I get an error saying that I cannot download CATALOG.Z.
Answer: This error can be caused by many things. Here are some suggestions to help
determine the source of the problem:
• If you are using the McAfee default download site for updates, determine if you can
download the CATALOG.Z file from a web browser. Try downloading the file from this
website: http://update.nai.com/Products/CommonUpdater/catalog.z.
• If you can't download the file, but you can see it (in other words, your browser does not
allow you to download it), you have a proxy issue and need to talk to your network
administrator.
• If you can download the file, VirusScan Enterprise should be able to download it as well.
Contact technical support for assistance in troubleshooting your installation of VirusScan
Enterprise.
• Question: What is the location of the HTTP download site?
Answer:
• The McAfee download site location is:
http://www.mcafeesecurity.com/us/downloads/updates/default.asp.
• The CATALOG.Z file, which contains the latest updates, can be downloaded from this
website: http://update.nai.com/Products/CommonUpdater/catalog.z.
• Question: What is the location of the FTP download site?
Answer:
• The FTP download site location is: ftp://ftp.mcafee.com/pub/antivirus/datfiles/4.x.
• The CATALOG.Z file, which contains the latest updates, can be downloaded from this
site: ftp://ftp.mcafee.com/CommonUpdater/catalog.z.
• Question: If I do detect a potentially unwanted program and I have chosen prompt user
for action, what action should I choose (Clean or Delete)?
Answer: Our general recommendation is to choose Clean if you are not sure what to do
with a detected file. The on-access and on-demand scanners automatically back up items
to the quarantine directory before they are cleaned or deleted.
McAfee VirusScan Enterprise 8.8 Product Guide
103
Access Protection tab
Configure access protection rules and prevent McAfee processes from being stopped.
Option definitions
Option
Definition
Settings for
Select Workstation or Server from the drop-down list.
NOTE: This option is only available via ePolicy Orchestrator.
Access protection
settings
•
Enable access protection — Enables the access protection feature.
•
Prevent McAfee services from being stopped— Prevent users without debug
privileges from terminating McAfee processes.
Users with debug program privileges can still stop McAfee processes even though
you select this option.
Administrators have debug program privileges by default for Windows XP and
Windows 2003 operating systems. Remove these privileges from the user’s
permissions so that they cannot stop McAfee processes.
CAUTION: Failure to enable access protection and prevent McAfee services from being
stopped leaves your system unprotected from numerous malware attacks.
Access protection rules
Categories — Select a category to display the rules for that category. Rules are
organized into these categories:
•
Anti-virus Standard Protection
•
Anti-virus Maximum Protection
•
Anti-virus Outbreak Control
•
Common Standard Protection
CAUTION: Failure to configure Common Standard Protection, and enable Block and
Report, for the following rules leaves your system unprotected from numerous
malware attacks:
•
Prevent modification of McAfee files and settings.
•
Prevent modification of McAfee Common Management Agent files and settings.
•
Prevent modification of McAfee Scan Engine files and settings.
•
Prevent termination of McAfee processes.
•
Common Maximum Protection
•
Virtual Machine Protection
•
User-defined Rules
•
Anti-spyware Standard Protection
•
Anti-spyware Maximum Protection
See How access protection rules are defined for more information.
Block/Report/Rules — Configure the rules:
104
McAfee VirusScan Enterprise 8.8 Product Guide
Access Protection tab
Option
Definition
•
Block — Blocks the process that is specified in the Rule Details. Select Block
to enable the rule or deselect it to disable the rule.
NOTE:
To block access attempts without logging, select Block but do not select Report.
•
Report — Enables reporting of attempts to violate access protection. When a
detection occurs, information is recorded in the activity log.
NOTE:
To receive a warning without blocking access attempts, select Report, but do
not select Block. This is useful when the full impact of a rule is not known.
Monitor the logs and reports for a short while to determine whether to block
access.
•
Rules — Use the rules to protect your computer from unwanted changes. Rules
are organized by category. First select the category, then select the rule. See
Configuring predefined rules and Configuring user-defined rules for more
information.
New — Create a new user-defined rule. See Configuring user-defined rules for
more information.
Edit — Change an existing rule.
Delete — Remove an existing user-defined rule.
NOTE:
You can only delete user-defined rules. Other rules can be edited or disabled,
but not deleted. To disable a rule, deselect both the Block and Report options.
McAfee VirusScan Enterprise 8.8 Product Guide
105
Additional Alerting Options tab
Configure filter and local alerting options.
Option definitions
Option
Definition
Settings for
Select Workstation or Server from the drop-down list.
NOTE: This option is only available via ePolicy Orchestrator.
Severity Filter
Local Alerting
Choose from these filter options:
•
Don’t filter alerts — Send all alerts.
•
Suppress informational alerts — Don’t send informational alerts with a severity
of less than one.
•
Suppress informational and warning alerts — Don’t send informational and
warning alerts with a severity of less than two.
•
Suppress informational, warning, and low — Don’t send informational, warning,
and low severity alerts with a severity of less than three.
•
Suppress all except severe alerts — Don’t send any alerts except those with a
severity of more than four.
•
Suppress all alerts — Do not send any alerts.
•
Log to local application event log — Log information in the local application
event log.
•
Send SNMP trap using SNMP service — If you are using SNMP, you can send
SNMP trap alerts.
NOTE:
Local alerting options do not require Alert Manager.
106
McAfee VirusScan Enterprise 8.8 Product Guide
Alerts tab
Select the components that you want to generate alerts and configure Alert Manager if it is
installed.
See the Alert Manager 4.7.1 Product Guide for more information.
Option definitions
Option
Definition
Settings for
Select Workstation or Server from the drop-down list.
NOTE: This option is only available via ePolicy Orchestrator.
Components that
generate alerts
Alert Manager options
•
On-Access Scan — Generate alerts when the on-access scanner detects threats.
•
On-Demand Scan and scheduled scans — Generate alerts when the on-demand
scan tasks detect threats.
•
Email Scan — Generate alerts when the email scanner detects threats.
•
AutoUpdate — Generate alerts when update tasks detect threats.
•
Access Protection — Generate alerts when access protection detects threats.
•
Disable alerting — Do not generate alerts when detections occur.
•
Enable Centralized alerting — Use centralized alerting to notify you when
detections occur.
•
Enable Alert Manager alerting — Use Alert Manager alerting to notify you when
detections occur. Select this option and type the path to the location of the Alert
Manager server that receives alerts.
•
Disable Active Directory Lookup — Do not use Active Directory Lookup.
McAfee VirusScan Enterprise 8.8 Product Guide
107
Reports tab
Enable logging to track activity on your network and record which settings you used to detect
and respond to any potential threat that the scanner found.
Option definitions
Option
Definition
Settings for
Select Workstation or Server from the drop-down list.
NOTE: This option is only available via ePolicy Orchestrator.
Log to file
Enable activity logging.
Log file location
Accept the default location for the log file or specify a new location.
The default log name is AccessProtectionLog.txt.
The default location is: <drive>:\Documents and Settings\All Users\Application
Data\McAfee\DesktopProtection\
The default location may vary depending on which operating system you are using.
108
Log file size
Limit the size of the log file. Accept the default size (1 MB) or set a size from 1 MB to
999 MB. If the data in the log file exceeds the file size you set, the oldest 20 percent of
the entries are deleted and new data is appended to the file.
Log file format
Select the format of the log file. Default = Unicode (UTF8).
•
Unicode (UTF8) — Recommended if you are storing eastern text (every character
is one or two bytes), or sharing information within a multi-national organization.
•
Unicode (UTF16) — Recommended if you are storing eastern text (every character
is one or two bytes), or sharing information within a multi-national organization.
•
ANSI — Recommended if you are storing western text (every character is one byte).
McAfee VirusScan Enterprise 8.8 Product Guide
Blocking tab
Block connections from remote computers that have files with potential threats or unwanted
programs in a shared folder.
Option definitions
Option
Definition
Settings for
Select Workstation or Server from the drop-down list.
NOTE: This option is only available via ePolicy Orchestrator.
Send a message
Message text
Block the connection
Send the specified message to the network user when a threat is
detected — Notify the network user on the remote computer when a threat
is detected.
Type a custom message in the text box. The Windows Messenger service
must be running on the remote computer to receive this message.
•
Block the connection when a threatened file is detected in a shared
folder — Block the connection to any network user on a remote computer
who attempts to read from, or write to, a threatened file in the shared
folder.
•
Unblock connections after — Unblocks the connection after the specified
number of minutes. Enter a number between 1 and 9999. Default = 10
minutes.
•
Block the connection when a file with a potentially unwanted
program is detected in a shared folder — Blocks the connection to
any user on a remote computer who attempts to write an unwanted
program to the computer. The On-Access Scan Statistics dialog box
displays a list of blocked computers.
McAfee VirusScan Enterprise 8.8 Product Guide
109
Reports tab
Enable logging to track detections on the local system of any code execution from heap or stack
overruns for certain processes.
Option definitions
Option
Definition
Alert on cookies
Notify the user when a cookie detection occurs. Default = selected.
Log to file
Enable activity logging and accept the default location for the log file
or specify a new location.
Log file location
Accept the default location for the log file or specify a new location.
The default log name is BufferOverflowProtectionLog.txt.
The default location is: <drive>:\Documents and Settings\All
Users\Application Data\McAfee\DesktopProtection\
The default location may vary depending on which operating system you are
using.
110
Log file size
Limit the size of the log file. Accept the default size (1 MB) or set a size
from 1 MB to 999 MB. If the data in the log file exceeds the file size you set,
the oldest 20 percent of the entries are deleted and new data is appended to
the file.
Log file format
Select the format of the log file. Default = Unicode (UTF8).
•
Unicode (UTF8) — Recommended if you are storing eastern text (every
character is one or two bytes), or sharing information within a multi-national
organization.
•
Unicode (UTF16) — Recommended if you are storing eastern text (every
character is one or two bytes), or sharing information within a multi-national
organization.
•
ANSI — Recommended if you are storing western text (every character
is one byte), we recommend using ANSI format.
McAfee VirusScan Enterprise 8.8 Product Guide
Buffer Overflow Protection tab
Prevent buffer overflow exploits from executing arbitrary code on your computer.
Option definitions
Option
Definition
Settings for
Select Workstation or Server from the drop-down list.
NOTE: This option is only available via ePolicy Orchestrator.
Buffer overflow settings
Enable buffer overflow protection — Enable the buffer overflow protection
feature, then select the protection level.
•
Warning mode — Sends a warning when a buffer overflow is detected.
No other action is taken.
This mode is useful when the full impact of a buffer overflow is not known.
Use the feature in Warning Mode for a short while and review the log
file during that time to help determine whether to change to Protection
Mode.
•
Protection mode — Blocks buffer overflows as they are detected and
terminates the detected thread.
This can also result in termination of the application.
CAUTION: Failure to enable Buffer Overflow Protection and Protection
mode leaves your system unprotected from numerous malware attacks.
Client system warning
Show the messages dialog box when a buffer overflow is detected —
Displays the On-Access Scan Messages dialog box when a detection occurs.
Buffer overflow exclusions
Specify the exclusion information:
NOTE:
The exclusion names are case-sensitive.
•
Process — Specify the process name that owns the writable memory that
is making the call.
Type the process name alone or include its path.
If you type the process name only, such as for OUTLOOK.EXE, that
process is excluded whenever it is executed, no matter where it is located.
If you type the process name including the path, such as C:\Program
files\OUTLOOK.EXE, that process is excluded only when it is executed
from the specified path. Wildcards are not allowed.
•
Module (optional) — If applicable, type the name of the module that
owns the writable memory. This is information is not required.
•
API — Specify the API being called.
NOTE:
The API is required only if the module is specified.
McAfee VirusScan Enterprise 8.8 Product Guide
111
Display Options tab
Configure which system tray options users can access and the preferred language.
Option definitions
Option
Definition
Settings for
Select Workstation or Server from the drop-down list.
NOTE: This option is only available via ePolicy Orchestrator.
System tray icon
Console options
•
Show the system tray icon with all menu options — Allow users to see all
options on the system tray menu.
•
Show the system tray icon with minimal menu options — Hide all options on
the system tray menu except About VirusScan Enterprise and On-Access Scan
Statistics.
•
Do not show the system tray icon — Hide the system tray icon from all users.
NOTE: This option is only available via ePolicy Orchestrator.
•
Allow this system to make remote console connections to other systems —
Connect to remote computers.
You must have administrator rights and the Remote Registry Service must be
running.
•
Display managed tasks in the client console — Display ePolicy Orchestrator
tasks in the Console on the client computer.
•
Disable default AutoUpdate task schedule — Disable the schedule for the default
update task.
The schedule is disabled when the policy is enforced. The Task Manager service
must be running to disable the tasks’s schedule.
•
Enable splash screen — Display the VirusScan Enterprise 8.8 splash screen when
the Console or SHSTAT.EXE is launched.
NOTE:
This option is only available via ePolicy Orchestrator.
Console language
settings
Specify which language to use for the console text:
•
The language can be automatically selected or you can select a specific language.
NOTE:
When you change the preferred language from the VirusScan Enterprise 8.8 Console,
you are prompted to restart the system. If you click Yes, the language change is
applied.
When you change the preferred language from the ePolicy Orchestrator Console,
the language change is applied to the user console on the first policy enforcement.
For ePolicy Orchestrator managed systems, changes made by the user from the
client system affect the console interface, but the log file records activity in the
language specified in the ePolicy Orchestrator configuration. The console language
change is applied after a console restart.
112
McAfee VirusScan Enterprise 8.8 Product Guide
Actions tab
Configure which actions to take when a threat or potentially unwanted program is detected.
Option definitions
Option
Definition
Settings for
Select Workstation or Server from the drop-down list.
NOTE: This option is only available via ePolicy Orchestrator.
When a threat is found
Perform this action first — Select the first action that you want the scanner to take
when a threat is detected. Default = Clean attachments.
•
Clean attachments — The scanner tries to remove the threat from the attachment.
•
Prompt for action — Prompt the user for action when a threat is detected. Select
this option, then specify which actions users can take under Allowed action in
Prompt dialog box.
No secondary action is allowed for this option.
•
Continue scanning — Continue scanning when an attachment with a threat is
detected.
No secondary action is allowed for this option.
•
Move attachments to a folder — The scanner moves attachments with potential
threats to the designated folder.
•
Delete attachments — The scanner deletes attachments with potential threats
as soon as it detects them. For Microsoft Outlook, the email is deleted. For Lotus
Notes, the attachment is deleted.
•
Delete mail (for Outlook Scan only) — The scanner deletes mail with potential
threats. If you select this option as the primary action, no secondary action is allowed.
If the first action fails, then perform this action — Select the next action you want
the scanner to take if the first action fails. Default = Move attachments to a folder.
When an unwanted
program is found
•
Prompt for action — Prompt the user for action when a threat is detected. Select
this option, then specify which actions users can take under Allowed action in
Prompt dialog box.
•
Continue scanning — Continue scanning when an attachment with a threat is
detected.
•
Move attachments to a folder — The scanner moves attachments with potential
threats to the designated folder.
•
Delete attachments — The scanner deletes attachments with potential threats
as soon as it detects them. For Microsoft Outlook, the email is deleted. For Lotus
Notes, the attachment is deleted.
•
Delete mail (for Outlook Scan only) — The scanner deletes mail with potential
threats.
Perform this action first — Select the first action that you want the scanner to take
when a potentially unwanted program is detected. Default = Clean attachments.
•
Clean attachments — The scanner tries to remove the threat from the attachment.
•
Prompt for action — Prompt the user for action when a threat is detected. Select
this option, then specify which actions users can take under Allowed action in
Prompt dialog box.
McAfee VirusScan Enterprise 8.8 Product Guide
113
Actions tab
Option
Definition
No secondary action is allowed for this option.
•
Continue scanning — Continue scanning when an attachment with a threat is
detected.
No secondary action is allowed for this option.
•
Move attachments to a folder — The scanner moves attachments with potential
threats to the designated folder.
•
Delete attachments — The scanner deletes attachments with potential threats
as soon as it detects them. For Microsoft Outlook, the email is deleted. For Lotus
Notes, the attachment is deleted.
If the first action fails, then perform this action — Select the next action you want
the scanner to take if the first action fails. Default = Move attachments to a folder.
•
Prompt for action — Prompt the user for action when a threat is detected. Select
this option, then specify which actions users can take under Allowed action in
Prompt dialog box.
No secondary action is allowed for this option.
•
Continue scanning — Continue scanning when an attachment with a threat is
detected.
No secondary action is allowed for this option.
Move to folder
Allowed actions in
Prompt dialog box
•
Move attachments to a folder — The scanner moves attachments with potential
threats to the designated folder.
•
Delete attachments — The scanner deletes attachments with potential threats
as soon as it detects them. For Microsoft Outlook, the email is deleted. For Lotus
Notes, the attachment is deleted.
Specify the location of the quarantine folder. The quarantine folder must be located on
a hard drive and this location should be a local drive. It should not be located on a floppy
drive or the CD drive’s default location as the quarantine folder varies depending on
whether you are using Microsoft Outlook or Lotus Notes.
•
For Microsoft Outlook the quarantine folder is located in the Microsoft Outlook
mailbox.
•
For Lotus Notes, the quarantine folder is located in the file system.
Select the actions that are allowed when the user is prompted for action.
NOTE:
A default Deny Access action occurs before any of these actions are taken.
•
Clean attachment
•
Delete attachment
•
Move attachment
• Delete mail (for Microsoft Outlook only)
When the user is prompted for action, they receive the message that you specify on the
Alerts tab.
114
McAfee VirusScan Enterprise 8.8 Product Guide
Alerts tab
Configure the alert settings for the on-delivery email scanner.
Option definitions
Option
Definition
Settings for
Select Workstation or Server from the drop-down list.
NOTE: This option is only available via ePolicy Orchestrator.
Email alert for user
Send alert mail to user — Notify another user when a threatened email message is
detected.
Prompt for action
message
Specify the message that displays to the user when prompting for action. The Prompt
for action option must be selected on the Actions tab. Accept the default message or
type a new message. Default message = McAfee VirusScan Enterprise Email Scanner:
Alert!
McAfee VirusScan Enterprise 8.8 Product Guide
115
Reports tab
Enable logging to track activity on your network and record which settings you used to detect
and respond to any potential threat that the scanner found.
Option definitions
Option
Definition
Settings for
Select Workstation or Server from the drop-down list.
NOTE: This option is only available via ePolicy Orchestrator.
Log to file
Enable activity logging.
Log file location
Accept the default location for the log file or specify a new location.
The default log name for the on-demand email log is EmailOnDemandLog.txt.
The default location is: <drive>:\Documents and Settings\All Users\Application
Data\McAfee\DesktopProtection\
The default location may vary depending on which operating system you are using.
Log file size
Limit the size of the log file. Accept the default size (1 MB) or set a size from 1 MB to
999 MB. If the data in the log file exceeds the file size you set, the oldest 20 percent of
the entries are deleted and new data is appended to the file.
Log file format
Select the format of the log file. Default = Unicode (UTF8).
What to log in addition
to scanning activity
116
•
Unicode (UTF8) — Recommended if you are storing eastern text (every character
is one or two bytes), or sharing information within a multi-national organization.
•
Unicode (UTF16) — Recommended if you are storing eastern text (every character
is one or two bytes), or sharing information within a multi-national organization.
•
ANSI — Recommended if you are storing western text (every character is one byte),
we recommend using ANSI format.
•
Session settings — Record the properties for each scanning session in the log file.
•
Session summary — Record a summary of the scanner’s actions during each
scanning session in the log file. Summary information includes the number of files
scanned, the number and type of detections, the number of files cleaned or deleted,
and other information.
•
Failure to scan encrypted files — Record the name of encrypted files that the
scanner failed to scan.
McAfee VirusScan Enterprise 8.8 Product Guide
Scan Items tab
Configure detection options for the email scanner.
Option definitions
Option
Definition
Settings for
Select Workstation or Server from the drop-down list.
NOTE: This option is only available via ePolicy Orchestrator.
Scanning of email
Enable scanning of on-delivery email.
NOTE: This option is only available via ePolicy Orchestrator.
Attachments to scan
•
All file types — Scan all types of files, regardless of extension.
•
Default + additional file types — Scan the default list of extensions plus any
additions you specify. The default list is defined by the current DAT file. Select
Default + additional file types, then enter file extensions separated by spaces
in the text box.
Also scan for macros in all attachments— If you selected Default +
additional file types, you can also search for known macro threats in all files.
•
Specified file types — Create a list of user-specified extensions to be scanned.
You can also remove any extensions you added previously.
Select Specified file types, then enter file extensions separated by spaces in the
text box.
Artemis (Heuristic
network check for
suspicious files)
•
Find unknown program threats and trojans — Use Artemis scanning to detect
executable files that have code resembling malware.
•
Find unknown macro threats — Use Artemis scanning to detect unknown macro
viruses.
•
Find attachments with multiple extensions — Treat attachments with multiple
extensions as a threat.
When you select this option, an Email Scan Warning dialog box appears. Click
OK to confirm your selection.
CAUTION: Failure to enable Artemis leaves your system unprotected from numerous
malware attacks.
Compressed files
•
Scan inside archives — Examine archive (compressed) files and their contents.
Although it provides better protection, scanning compressed files can increase the
time required to perform a scan.
•
Unwanted programs
detection
Decode MIME encoded files — Detect, decode, and scan Multipurpose Internet
Mail Extensions (MIME) encoded files.
Detect unwanted programs — Enables the on-delivery email scanner to detect
potentially unwanted programs. The email scanner uses the information you configured
in the Unwanted Programs Policy to detect potentially unwanted programs.
See Restricting potentially unwanted programs for more information.
McAfee VirusScan Enterprise 8.8 Product Guide
117
Scan Items tab
Option
Definition
Email message body (for Scan email message body — Scan the body of Microsoft Outlook email messages.
Microsoft Outlook only)
Heuristic network check
for suspicious files
118
Configure the sensitivity level you wish to use when determining if a detected sample
is malware. For all levels other than Disabled, fingerprints of samples, or hashes, are
submitted to McAfee Labs to determine if they are malware. The benefit to you is that
detection may be made available as soon as McAfee Labs publishes the update, and
you would not have to wait for the next DAT release. The higher the sensitivity level
you choose, the higher the number of malware detections. However, by allowing more
detections, you may also get more false positive results. Choose from these sensitivity
levels:
•
Disabled — No fingerprints or any data are submitted to McAfee Labs to
determine if they malware.
•
Very Low —The detections and risk of false positives are the same as with
regular DATs. A detection is made available to VirusScan Enterprise when McAfee
Labs publishes it instead of waiting for the next DAT update.
•
Low — This level is defined as between Very Low and Medium.
•
Medium — Use this level when the regular risk of exposure to malware is greater
than the risk of a false positive. McAfee Labs proprietary, heuristic checks results
in detections that are likely to be malware. However, there is some risk that a
detection on a file that isn’t common may result in a false positive. McAfee Labs
checks that detections with this setting will not create a false positive on popular
applications and operating system files.
•
High — This level is defined as between Medium and Very High.
•
Very High —We recommend using this level only for email and for scanning
volumes and directories that support neither executing programs nor operating
systems. Detections found with this level are presumed to be malicious, but they
haven’t been fully tested to confirm that they are not false positives.
McAfee VirusScan Enterprise 8.8 Product Guide
Scan Items tab
Configure detection options for the on-demand email scanner.
Option definitions
Option
Definition
Messages to scan
•
All highlighted items — Scan selected email messages and folders.
•
All messages in the Inbox folder — Scan all messages currently in the Inbox
folder and its subfolders.
•
Attachments to scan
Scan unread messages only — Scan all unread messages currently in the
Inbox folder and its subfolders.
•
All file types — Scan all types of files, regardless of extension.
•
Default + additional file types — Scan the default list of extensions plus any
additions you specify. The default list is defined by the current DAT file. Select
Default + additional file types, then enter file extensions separated by spaces
in the text box.
Also scan for macros in all attachments— If you selected Default +
additional file types, you can also search for known macro threats in all files.
•
Specified file types — Create a list of user-specified extensions to be scanned.
You can also remove any extensions you added previously.
Select Specified file types, then enter file extensions separated by spaces in the
text box.
Artemis (Heuristic
network check for
suspicious files)
•
Find unknown program threats and trojans — Use Artemis scanning to detect
executable files that have code resembling malware.
•
Find unknown macro threats — Use Artemis scanning to detect unknown macro
viruses.
•
Find attachments with multiple extensions — Treat attachments with multiple
extensions as a threat.
When you select this option, an Email Scan Warning dialog box appears. Click
OK to confirm your selection.
CAUTION: Failure to enable Artemis leaves your system unprotected from numerous
malware attacks.
Compressed files
•
Scan inside archives — Examine archive (compressed) files and their contents.
Although it provides better protection, scanning compressed files can increase the
time required to perform a scan.
•
Unwanted programs
detection
Decode MIME encoded files — Detect, decode, and scan Multipurpose Internet
Mail Extensions (MIME) encoded files.
Detect unwanted programs — Enables the on-delivery email scanner to detect
potentially unwanted programs. The email scanner uses the information you configured
in the Unwanted Programs Policy to detect potentially unwanted programs.
See Restricting potentially unwanted programs for more information.
Email message body (for Scan email message body — Scan the body of Microsoft Outlook email messages.
Microsoft Outlook only)
McAfee VirusScan Enterprise 8.8 Product Guide
119
General tab
Configure general on-access scanning options.
Option definitions
Option
Definition
Settings for
Select Workstation or Server from the drop-down list.
NOTE: This option is only available via ePolicy Orchestrator.
Scan
Specify general scan items:
•
Boot sectors — Scan boot sectors. Default = Enabled.
•
Floppy during shutdown — Scan floppy drives when the computer is
shut down. Default = Enabled.
•
Processes on enable — The McAfee On-access McShield service scans
all processes which are already running. Default = Disabled.
NOTE: Enabling this feature improves security, but impacts boot-time
performance.
•
Trusted installers — Specify if MSI files, installed by msiexec.exe and
signed by McAfee or Microsoft, or if Windows Trusted Installer service files,
are scanned on-access:
•
Disabled (default), do not scan files installed by MSI or Windows
Trusted Installer service.
NOTE: Disabled improves the performance of large Microsoft application
installers.
•
Enable on-access scanning
Enabled, scan files installed by MSI or Windows Trusted Installer
service.
Specify when to enable scanning:
•
Enable on-access scanning at system startup — Enable the on-access
scanner each time you start your computer.
•
Enable on-access scanning when the policy is enforced — Enable
the on-access scanner each time the policy is enforced.
NOTE: This option is only available via ePolicy Orchestrator.
Maximum scan time
Specify the maximum scanning time:
•
Enforce a maximum scanning time for all files — Define a maximum
scanning time and enforce it for all files.
•
Maximum scan time — Specify the maximum scan time for all files in
seconds. Default = 45 seconds.
NOTE: If a scan exceeds the time limit, the scan stops cleanly and logs a
message. If the scan cannot be stopped cleanly, it terminates and starts again
on the next scan.
Cookies
120
Scan cookie files — Enable scanning of cookie files.
McAfee VirusScan Enterprise 8.8 Product Guide
General tab
Option
Definition
Artemis (Heuristic network check Specify one of the six sensitivity levels for Artemis between disabled and very
for suspicious files)
high. Default = very low.
McAfee VirusScan Enterprise 8.8 Product Guide
121
Messages tab
Configure message options for local users and users without administrative rights.
Option definitions
Option
Definition
Settings for
Select Workstation or Server from the drop-down list.
NOTE: This option is only available via ePolicy Orchestrator.
User messages
Message text
Actions available to users
122
Specify what messages local users receive.
•
Show the messages dialog box when a threat is detected and
display the specified text in the message — Display the On-Access
Scan Messages dialog box to local users when a detection occurs.
•
Alert when a cookie detection occurs — Send alerts when cookies
are detected. This includes generating ePolicy Orchestrator alerts, sending
messages to the On-Access Scan Messages dialog box, recording
detections in the activity log if you enabled activity logging on the
Reports tab, and counting detections in the scan statistics. If you deselect
this option, ePolicy Orchestrator does not generate alerts, but detections
will still be recorded in the activity log if you enabled activity logging on
the Reports tab, and counted in the scan statistics.
Accept the default message or type a custom message. Default = VirusScan
Enterprise 8.8 Alert!
•
Remove messages from the list — Allow users without administrator
rights to delete messages from the list.
•
Clean files — Allow users without administrator rights to clean files
referenced by the messages in the list.
•
Delete files — Allow users without administrator rights to delete files
referenced by the messages in the list.
McAfee VirusScan Enterprise 8.8 Product Guide
Notes Scanner Settings tab
Configure the Lotus Notes settings for the on-delivery email scanner.
Lotus Notes password configuration
When accessing a local database on Windows 2000 Server, Windows 2003 Server, or Windows
XP, you are prompted for a password. When you type the password, the text search dialog is
initiated and the password is inserted into the text search dialog instead of being inserted into
the password dialog. The password dialog box is not completely modal. Selecting the dialog
box again allows you to input the password.
McAfee recommends you prevent multiple prompts for passwords as follows:
1
From Lotus Notes, click File | Preferences | Security | User Security | Dialog.
2
Click Don't prompt for a password from other Notes-based programs (reduces
security).
CAUTION: This configuration potentially reduces your system security.
Option definitions
Option
Definition
Settings for
Select Workstation or Server from the drop-down list.
NOTE: This option is only available via ePolicy Orchestrator.
Server scanning settings •
Advanced options
Scan all server databases — Scan all server databases for potential threats.
•
Scan server mailboxes — Scan all server mailboxes for potential threats.
•
Mailbox root folder — Specify the location of the root folder. Accept the default
location for the mailbox root folder or specify a new location. This option is available
only for on-delivery email scanning. Default = !!mail\.
Notes applications to exclude — Specify which Lotus Notes applications to exclude
from scanning. Default = MNOTES.
McAfee VirusScan Enterprise 8.8 Product Guide
123
Actions tab
Configure which actions to take when a threat or potentially unwanted program is detected. If
you are configuring different scanning policies for default, low-risk, and high-risk processes,
the options on this tab must be configured for each process type.
Option definitions
Option
Definition
Settings for
Select Workstation or Server from the drop-down list.
NOTE: This option is only available via ePolicy Orchestrator.
When a threat is found
Perform this action first — Select the first action that you want the scanner
to take when a threat is detected. Default = Clean files automatically.
•
Clean files automatically — The scanner tries to remove the threat from
the detected file.
•
Deny access to files — Deny all users access to any files with potential
threats that the scanner finds.
•
Delete files automatically — The scanner deletes files with potential
threats as soon as it detects them.
If the first action fails, then perform this action — Select the next action
you want the scanner to take if the first action fails. Default = Delete files
automatically.
When an unwanted program is
found
•
Deny access to files — Deny all users access to any files with potential
threats that the scanner finds.
•
Delete files automatically — The scanner deletes files with potential
threats as soon as it detects them.
Perform this action first — Select the first action that you want the scanner
to take when a potentially unwanted program is detected. Default = Clean files
automatically.
•
Allow access to files — Give users access to detected files and programs.
NOTE:
Use this action to monitor what is being detected before you decide which
actions to take. Review the activity log to see which programs are being
detected. No secondary action is allowed for this option.
•
Clean files automatically — Remove the threat from detected files and
programs automatically.
•
Deny access to files — Prevent users from accessing detected files and
programs.
•
Delete files automatically — Remove detected files and programs
automatically.
If the first action fails, then perform this action — Select the next action
you want the scanner to take if the first action fails. Default = Delete files
automatically.
•
124
Allow access to files — Give users access to detected files and programs.
McAfee VirusScan Enterprise 8.8 Product Guide
Actions tab
Option
Definition
•
Deny access to files — Prevent users from accessing detected files and
programs.
•
Delete files automatically — Remove detected files and programs
automatically.
McAfee VirusScan Enterprise 8.8 Product Guide
125
Exclusions tab
Specify what items to exclude from scanning. If you are configuring different scanning policies
for default, low-risk, and high-risk processes, the options on this tab must be configured for
each process type.
Option definitions
Option
Definition
Settings for
Select Workstation or Server from the drop-down list.
NOTE: This option is only available via ePolicy Orchestrator.
What to exclude
Select the type of exclusion, then specify the details for the exclusion:
•
Exclude by file name/location — Type the file name and location in
the text box. Select Also exclude subfolders if required.
NOTE: You must add a backslash (\) at the end of the string to apply to a
folder. Otherwise, it is considered a file exclusion and the Also exclude
subfolders checkbox is disabled by default.
•
Exclude by file type — Type the file type in the text box.
•
Exclude by file age — Select the access type, then specify the minimum
age in days.
See Adding and Excluding scan items for more information.
When to exclude
Select when to exclude the selected item:
•
On read
•
On write
How to handle client exclusions Overwrite client exclusions — Only exclude items specified in this policy.
If this option is not selected, the client computer uses exclusions that were
specified locally and the exclusions specified in this policy.
NOTE: This option is only available via ePolicy Orchestrator.
126
McAfee VirusScan Enterprise 8.8 Product Guide
Reports tab
Enable logging to track activity on your network and record which settings you used to detect
and respond to any potential threat that the scanner found.
Option definitions
Option
Definition
Settings for
Select Workstation or Server from the drop-down list.
NOTE: This option is only available via ePolicy Orchestrator.
Log to file
Enable activity logging.
Log file location
Accept the default location for the log file or specify a new location.
The default log name is OnAccessScanLog.txt.
The default location is: <drive>:\Documents and Settings\All
Users\Application Data\McAfee\DesktopProtection\.
The default location may vary depending on which operating system you are
using.
Log file size
Limit the size of the log file. Accept the default size (1 MB) or set a size from
1 MB to 999 MB. If the data in the log file exceeds the file size you set, the
oldest 20 percent of the entries are deleted and new data is appended to the
file.
Log file format
Select the format of the log file. Default = Unicode (UTF8).
What to log in addition to
scanning activity
•
Unicode (UTF8) — Recommended if you are storing eastern text (every
character is one or two bytes), or sharing information within a multi-national
organization.
•
Unicode (UTF16) — Recommended if you are storing eastern text (every
character is one or two bytes), or sharing information within a multi-national
organization.
•
ANSI — Recommended if you are storing western text (every character
is one byte), we recommend using ANSI format.
•
Session settings — Record the properties for each scanning session in
the log file.
•
Session summary — Record a summary of the scanner’s actions during
each scanning session in the log file. Summary information includes the
number of files scanned, the number and type of detections, the number
of files cleaned or deleted, and other information.
•
Failure to scan encrypted files — Record the name of encrypted files
that the scanner failed to scan.
McAfee VirusScan Enterprise 8.8 Product Guide
127
Scan Items tab
Configure detection options. If you are configuring different scanning policies for default, low-risk,
and high-risk processes, the options on this tab must be configured for each process type.
Option definitions
Option
Definition
Settings for
Select Workstation or Server from the drop-down list.
NOTE: This option is only available via ePolicy Orchestrator.
Scan files
•
When writing to disk — Scan all files as they are written to or modified
on the computer or other data storage device.
CAUTION: Failure to enable When writing to disk leaves your system
unprotected from numerous malware attacks.
If you are copying or moving files from one computer to another, it is
important that all computers be configured identically so that a file with
a potential threat can’t be copied from or written to a computer.
•
When reading from disk — Scan all files as they are read from the
computer or other data storage device.
CAUTION: Failure to enable When reading from disk leaves your system
unprotected from numerous malware attacks.
•
On network drives — Scan resources on mapped network drives.
Scanning network resources might affect performance.
File types to scan
•
Opened for backup — Examine files that are open for backup operations.
•
All files — Scan all files regardless of extension.
CAUTION: Failure to enable All files leaves your system unprotected from
numerous malware attacks.
•
Default + additional file types — Scan the default list of extensions
plus any additions you specify. The default list is defined by the current
DAT file.
Also scan for macros in all files — If you selected this optopn, you
can also search for known macro threats in all files.
•
Specified file types only — Create a list of user-specified extensions to
be scanned. You can also remove any extensions you added previously.
Select this option, then enter file extensions separated by spaces in the
text box.
Artemis (Heuristic network check •
for suspicious files)
•
Find unknown program threats and Trojans — Use Artemis scanning
to detect executable files that have code resembling malware.
Find unknown macro threats — Use Artemis scanning to detect
unknown macro viruses.
CAUTION: Failure to enable Artemis leaves your system unprotected from
numerous malware attacks.
128
McAfee VirusScan Enterprise 8.8 Product Guide
Scan Items tab
Option
Definition
Compressed files
•
Scan inside archives — Examine archive (compressed) files and their
contents.
•
Decode MIME encoded files — Detect, decode, and scan Multipurpose
Internet Mail Extensions (MIME) encoded files.
NOTE: Although it provides better protection, scanning compressed files can
increase the time required to perform a scan.
Unwanted programs detection
•
Detect unwanted programs — Enables the on-access scanner to detect
potentially unwanted programs.
The scanner uses the information you configured in the Unwanted
Programs Policy to detect potentially unwanted programs.
See Restricting potentially unwanted programs for more information.
McAfee VirusScan Enterprise 8.8 Product Guide
129
Actions tab
Configure which actions to take when a threat or potentially unwanted program is detected.
Option definitions
Option
Definition
When a threat is found
Perform this action first — Select the first action that you want the scanner to take
when a threat is detected. Default = Clean files.
•
Clean files — The scanner tries to remove the threat from the detected file.
•
Continue scanning — Continue scanning when a threatened file is detected.
•
Delete files automatically — The scanner deletes files with potential threats as
soon as it detects them.
If the first action fails, then perform this action — Select the next action you want
the scanner to take if the first action fails. Default = Delete files.
When an unwanted
program is found
•
Continue scanning — Continue scanning when a threatened file is detected.
•
Delete files— The scanner deletes files with potential threats as soon as it detects
them.
Perform this action first — Select the first action that you want the scanner to take
when a threat is detected. Default = Clean files.
•
Clean files — The scanner tries to remove the threat from the detected file.
•
Continue scanning — Continue scanning when a threatened file is detected.
•
Delete files — The scanner deletes files with potential threats as soon as it detects
them.
If the first action fails, then perform this action — Select the next action you want
the scanner to take if the first action fails. Default = Delete files.
130
•
Continue scanning — Continue scanning when a threatened file is detected.
•
Delete files— The scanner deletes files with potential threats as soon as it detects
them.
McAfee VirusScan Enterprise 8.8 Product Guide
Exclusions tab
Specify what items to exclude from scanning.
Option definitions
Option
Definition
What to exclude
Select the type of exclusion from the drop down list, then specify the details for the
exclusion:
•
Exclude by file name/location — Type the file name and location in the text
box. Select Also exclude subfolders if required.
NOTE: You must add a backslash (\) at the end of the string to apply to a folder.
Otherwise, it is considered a file exclusion and the Also exclude subfolders
checkbox is disabled by default.
•
Exclude by file type — Type the file type in the text box.
•
Exclude by file age — Select the access type, then specify the minimum age in
days.
See Adding and Excluding scan items for more information.
When to exclude
How to handle client
exclusions
Select when to exclude the selected item:
•
On read
•
On write
Overwrite client exclusions — Only exclude items specified in this policy. If this
option is not selected, the client computer uses exclusions that were specified locally
and the exclusions specified in this policy.
NOTE:
This option configured only via ePolicy Orchestrator.
McAfee VirusScan Enterprise 8.8 Product Guide
131
Reports tab
Enable logging to track activity on your network and record which settings you used to detect
and respond to any potential threat that the scanner found.
Option definitions
Option
Definition
Log to file
Enable activity logging.
Log file location
Accept the default location for the log file or specify a new location.
The default log name is OnDemandScanLog.txt.
The default location is: <drive>:\Documents and Settings\All
Users\Application Data\McAfee\DesktopProtection\ .
The default location may vary depending on which operating system you are
using.
Log file size
Limit the size of the log file. Accept the default size (1 MB) or set a size from
1 MB to 999 MB. If the data in the log file exceeds the file size you set, the
oldest 20 percent of the entries are deleted and new data is appended to the
file.
Log file format
Select the format of the log file. Default = Unicode (UTF8).
What to log in addition to
scanning activity
Alert when a cookie detection
occurs
132
•
Unicode (UTF8) — Recommended if you are storing eastern text (every
character is one or two bytes), or sharing information within a multi-national
organization.
•
Unicode (UTF16) — Recommended if you are storing eastern text (every
character is one or two bytes), or sharing information within a multi-national
organization.
•
ANSI — Recommended if you are storing western text (every character
is one byte), we recommend using ANSI format.
•
Session settings — Record the properties for each scanning session in
the log file.
•
Session summary — Record a summary of the scanner’s actions during
each scanning session in the log file. Summary information includes the
number of files scanned, the number and type of detections, the number
of files cleaned or deleted, and other information.
•
Failure to scan encrypted files — Record the name of encrypted files
that the scanner failed to scan.
Alert when a cookie detection occurs — Send alerts when cookies are
detected. This includes generating ePolicy Orchestrator alerts, detection
notifications, recording detections in the activity log if you enabled activity
logging on the Reports tab, and counting detections in the scan statistics.
If you deselect this option, ePolicy Orchestrator does not generate alerts, but
detections will still be recorded in the activity log if you enabled activity logging
on the Reports tab, and counted in the scan statistics
McAfee VirusScan Enterprise 8.8 Product Guide
Scan Items tab
Configure detection options.
Option definitions
Option
Definition
File types to scan
•
All files — Scan all files regardless of extension.
•
Default + additional file types — Scan the default list of extensions plus any
additions you specify. The default list is defined by the current DAT file.
Select this option, then enter file extensions separated by spaces in the text box.
Also scan for macros in all files — If you selected Default + additional file
types, you can also search for known macro threats in all files.
•
Specified file types — Create a list of user-specified extensions to be scanned.
You can also remove any extensions you added previously.
Select this option, then enter file extensions separated by spaces in the text box.
Options
•
Detect unwanted programs — Enables the on-access scanner to detect potentially
unwanted programs.
The scanner uses the information you configured in the Unwanted Programs
Policy to detect potentially unwanted programs.
See Restricting potentially unwanted programs for more information.
•
Decode MIME encoded files — Detect, decode, and scan Multipurpose Internet
Mail Extensions (MIME) encoded files.
• Scan inside archives — Examine archive (compressed) files and their contents.
Although it provides better protection, scanning compressed files can increase the time
required to perform a scan.
•
Scan files that have been migrated to storage — Scans cached files stored
on Remote Storage.
See How scanning of remote storage works for more information.
Artemis (Heuristic
network check for
suspicious files)
•
Find unknown programs threats — Use Artemis scanning to detect executable
files that have code resembling malware.
•
Find unknown macro threats — Use Artemis scanning to detect unknown macro
viruses.
McAfee VirusScan Enterprise 8.8 Product Guide
133
Task tab
Specify the platforms where this on-demand task runs.
Option definitions
Option
Definition
Platforms where this
task will run
•
Run this task on servers — Run this on-demand scan task on servers.
•
Run this task on workstations — Run this on-demand scan task on workstations.
User account to use
when running task
•
Username — Specify the user’s account name. If no account information is entered,
the task runs under the system account.
•
Password — Type the password.
•
Domain — Type the domain.
NOTE:
You must have administrative rights to schedule the task. Administrative rights provide the user
with write access to the scheduled tasks registry key. For information about scheduling client
tasks, see the ePolicy Orchestrator documentation.
134
McAfee VirusScan Enterprise 8.8 Product Guide
Password Options tab
Set password security for the entire system or selected items. See How setting a password
affects users for more information.
Option definitions
Option
Definition
Settings for
Select Workstation or Server from the drop-down list.
NOTE: This option is only available via ePolicy Orchestrator.
User interface
password
Specify the user interface security:
•
No password — No password is required to access configuration settings.
•
Password protection for all items listed— Specify one password for all the items
in the list.
•
Password protection for the selected items — Specify one password for selected
items in the list.
•
Password protection for conformance to Common Criteria — Secure the
interface as required for government agencies that must use only National Information
Assurance Partnership (NIAP) Common Criteria validated security products.
This secures all configuration options from users without administrative credentials
except that workstation users can perform an immediate on-demand scan of their
own workstation. Include or exclude files from an immediate on-demand scan.
Include or exclude archives, such as a .ZIP file, from an immediate on-demand
scan. View on-demand scan and on-access scanning activity logs.
Password — Type the password.
Confirm password — Type the password again to confirm it.
User interface items to Select the items that you want to protect with the password.
password protect
• Select All — Select all items in the section.
•
Deselect All — Deselect all items in the section.
Administrators can lock or unlock the interface through the Console.
McAfee VirusScan Enterprise 8.8 Product Guide
135
Processes tab
Choose whether to configure one scanning policy for all processes or different scanning policies
for default, low-risk and high-risk processes.
See Determining the number of scanning policies and Determining which risk to assign to a
process for more information.
Option definitions
Option
Definition
Settings for
Select Workstation or Server from the drop-down list.
NOTE: This option is only available via ePolicy Orchestrator.
Process settings
136
Specify whether to configure one or more scanning policies:
•
Configure one scanning policy for all processes — If you select this
option, the policy you configure applies to all processes.
•
Configure different scanning policies for high-risk, low-risk, and
default processes — You must select this option before you can configure
policies for low-risk or high-risk processes.
McAfee VirusScan Enterprise 8.8 Product Guide
Processes tab
Specify the processes that you define as low-risk. This is a two-step process.
Option definitions for step 1
Option
Definition
Settings for
Select Workstation or Server from the drop-down list.
NOTE: This option is only available via ePolicy Orchestrator.
Process settings
Open the On-Access Default Processes Policies and select:
•
Configure different scanning policies for high-risk, low-risk, and
default processes
NOTE:
You must select this option before you can configure policies for low-risk or
high-risk processes.
Option definitions for step 2
Option
Definition
Settings for
Select Workstation or Server from the drop-down list.
NOTE: This option is only available via ePolicy Orchestrator.
Low-Risk Processes
Open the On-Access Low-Risk Processes Policies to specify the processes
that you identify as low-risk. Add and remove processes as required.
See Determining the number of scanning policies and Determining which risk to assign to a
process for more information.
McAfee VirusScan Enterprise 8.8 Product Guide
137
Processes tab
Specify the processes that you define as high-risk. This is a two step process.
Option definitions for step 1
Option
Definition
Settings for
Select Workstation or Server from the drop-down list.
NOTE: This option is only available via ePolicy Orchestrator.
Process settings
Open the On-Access Default Processes Policies and select:
•
Configure different scanning policies for high-risk, low-risk, and
default processes
NOTE:
You must select this option before you can configure policies for low-risk or
high-risk processes.
Option definitions for step 2
Option
Definition
Settings for
Select Workstation or Server from the drop-down list.
NOTE: This option is only available via ePolicy Orchestrator.
High-Risk Processes
Open the On-Access High-Risk Processes Policies to specify the processes
that you identify as high-risk. Add and remove processes as required.
See Determining the number of scanning policies and Determining which risk to assign to a
process for more information.
138
McAfee VirusScan Enterprise 8.8 Product Guide
Scan Items tab
Select categories of potentially unwanted programs to detect and create exclusions for programs
that you do not want to detect.
Option definitions
Option
Definition
Settings for
Select Workstation or Server from the drop-down list.
NOTE: This option is only available via ePolicy Orchestrator.
Select categories of
Specify the categories of potentially unwanted programs to detect.
unwanted programs to
detect
Unwanted program
exclusions
Specify exclusions by detection name. Add and remove items as required.
McAfee VirusScan Enterprise 8.8 Product Guide
139
Quarantine Policy tab
Configure the quarantine location and the length of time to keep the quarantined items.
Option definitions
Option
Definition
Settings for
Select Workstation or Server from the drop-down list.
NOTE: This option is only available via ePolicy Orchestrator.
140
Quarantine Directory
Accept the default location for the quarantine directory or specify a new location. Default
= <SYSTEM_DRIVE>\Quarantine.
Quarantined data
retention
•
Automatically delete quarantined data — Delete quarantined items after the
specified number of days.
•
Number of days to keep backed-up data in the quarantine directory —
Specify the number of days to keep the quarantined items before automatically
deleting them. Choose from 1 to 999 days.
McAfee VirusScan Enterprise 8.8 Product Guide
Policy tab
Configure the quarantine location and the length of time to keep the quarantined items.
Option definitions
Option
Definition
Settings for
Select Workstation or Server from the drop-down list.
NOTE: This option is only available via ePolicy Orchestrator.
Quarantine Directory
Accept the default location for the quarantine directory or specify a new location. Default
= <SYSTEM_DRIVE>\Quarantine.
Quarantined data
retention
•
Automatically delete quarantined data — Delete quarantined items after the
specified number of days.
•
Number of days to keep backed-up data in the quarantine directory —
Specify the number of days to keep the quarantined items before automatically
deleting them. Choose from 1 to 999 days.
McAfee VirusScan Enterprise 8.8 Product Guide
141
Manager tab
Select an item in the list , then right-click to access advanced options. You can rescan, check
for false positive, restore, delete, or view properties.
142
McAfee VirusScan Enterprise 8.8 Product Guide
Task tab
Specify account information for the user who has access to the restore location. If no account
is entered here, the restore task runs under the system account.
Option definitions
Option
Definition
User
Type the name of the user which has access to the restore location.
Password
Type a password for the specified user.
Domain
Type the domain for the specified user.
McAfee VirusScan Enterprise 8.8 Product Guide
143
Scan Locations tab
Configure the item types and locations to scan.
Option definitions
Option
Definition
Locations to scan
Select the locations to scan. Default = Memory for rootkits, running processes, all local
drives, registry, and cookies. Click Add, Edit, and Remove to change the Item
name(s).
•
Memory for rootkits. Scans system memory for installed rootkits, hidden processes
and other behavior that suggests malicious code is attempting to hide itself. This
scan occurs before all other scans.
CAUTION: Failure to enable Memory for rootkits scans leaves your system
unprotected from numerous malware attacks.
•
Running processes. Scans the memory of all running processes. Actions other
than Clean are treated as Continue scanning.
CAUTION: Failure to enable Running processes scans leaves your system
unprotected from numerous malware attacks.
•
Registered Files. Scans all files that are registered. The scanner first searches the
registry for file names, then scans the files. The scanner removes references to
potentially unwanted files from the registry.
•
My computer. Scans all drives physically attached to your computer or logically
mapped to a drive letter on your computer.
•
All local drives. Scans all drives and their subfolders on your computer.
•
All fixed drives. Scans all drives physically connected to your computer.
•
All removable drives. Scans all removable drives or other storage devices
connected to your computer.
•
All mapped drives. Scans network drives logically mapped to a network drive on
your computer.
•
Home folder. Scans the home folder of the user who starts the scan.
•
User profile folder. Scans the profile of the user who starts the scan, including
the user’s My Documents folder.
•
Windows folder. Scans the contents of the Windows folder.
•
Program Files folder. Scans the contents of the Program Files folder.
•
Temp folder. Scans the contents of the Temp folder.
•
Recycle bin. Scans the contents of the recycle bin.
•
Drive or folder. Scans the specified drive or folder.
•
File. Scans the specified file.
•
Cookies. Scans cookies in the cookies folder.
•
Registry. Scans registry entries.
NOTE: Using the default list of scan items can result in a thorough scan that is very time
consuming. Consider whether you want to narrow the scope of this scan for regular use.
144
McAfee VirusScan Enterprise 8.8 Product Guide
Scan Locations tab
Option
Definition
When the On-Demand Scan Progress dialog appears, the locations to scan appear
as a comma-separated string following Scanning in. As the scan processes are
completed, they are removed from the string.
Scan options
The type of scan for the selected item.
•
Include subfolders — The scanner examines all subfolders in the specified volumes.
Deselect this option to scan only the root level of the volumes.
• Scan boot sectors — The scanner examines the disk boot sector.
It may be appropriate to disable boot sector scanning when a disk contains a unique or
abnormal boot sector that cannot be scanned.
McAfee VirusScan Enterprise 8.8 Product Guide
145
Performance tab
Specify scan deferral and system utilization options to improve performance.
Option definitions
Option
Definition
Scan deferral options
Select the scan deferral option:
•
Defer scan when using battery power— Postpone the scan when the system
is in use and using battery power.
•
Defer scans during presentations— Postpone the scan while the system is in
presentation mode.
•
User may defer scheduled scans — Allow the user to defer scheduled scans.
•
Defer at most — Specify the length of time to defer the scan. Select between
one and 24 hours or select zero to defer the scan forever.
See How scan deferral works for more information.
System utilization
Artemis (Heuristic
network check for
suspicious files)
146
Use the list, from ePolicy Orchestrator, or the slider, from the VirusScan Console, to set
the utilization schedule for the scan. Each task runs independently; unaware of the limits
for other tasks. The increments are:
•
Low
•
Below normal — The ePolicy Orchestrator default.
•
Normal — The VirusScan Enterprise 8.8 default.
Configure the sensitivity level you wish to use when determining if a detected sample
is malware. For all levels other than Disabled, fingerprints of samples, or hashes, are
submitted to McAfee Labs to determine if they are malware. The benefit to you is that
detection may be made available as soon as McAfee Labs publishes the update, and
you would not have to wait for the next DAT release. The higher the sensitivity level
you choose, the higher the number of malware detections. However, by allowing more
detections, you may also get more false positive results. Choose from these sensitivity
levels:
•
Disabled — No fingerprints or any data are submitted to McAfee Labs to
determine if they malware.
•
Very Low —The detections and risk of false positives are the same as with
regular DATs. A detection is made available to VirusScan Enterprise when McAfee
Labs publishes it instead of waiting for the next DAT update.
•
Low — This level is defined as between Very Low and Medium.
•
Medium — Use this level when the regular risk of exposure to malware is greater
than the risk of a false positive. McAfee Labs proprietary, heuristic checks results
in detections that are likely to be malware. However, there is some risk that a
detection on a file that isn’t common may result in a false positive. McAfee Labs
checks that detections with this setting will not create a false positive on popular
applications and operating system files.
•
High — This level is defined as between Medium and Very High.
•
Very High —We recommend using this level only for email and for scanning
volumes and directories that support neither executing programs nor operating
McAfee VirusScan Enterprise 8.8 Product Guide
Performance tab
Option
Definition
systems. Detections found with this level are presumed to be malicious, but they
haven’t been fully tested to confirm that they are not false positives.
McAfee VirusScan Enterprise 8.8 Product Guide
147
ScriptScan tab
Prevent unwanted scripts from executing.
See Script scanning and how it works for more information.
Option definitions
Option
Definition
Settings for
Select Workstation or Server from the drop-down list.
NOTE: This option is only available via ePolicy Orchestrator.
ScriptScan
Enable scanning of scripts — Scan JavaScript and VBScript scripts before
they are executed.
ScriptScan process exclusions
Process — Specify ScriptScan exclusions by process name. Wildcards are not
allowed when specifying process names.
ScriptScan URL exclusions
URL — Specify ScriptScan URL exclusions by URL. Note the following:
•
•
148
Wildcards are not allowed when specifying URLs. But, for example, if the
URL msn.com is excluded, any URL with that string is excluded from
scanning. For example, the following URLs are excluded:
•
http://weather.msn.com
•
http://music.msn.com
On Windows Server 2008, Script Scan URL exclusions do not work with
Windows Internet Explorer unless you click the checkbox Enable
third-party browser extensions to enable the setting and restart
Windows Server 2008. For details, see
https://kc.mcafee.com/corporate/index?page=content&id=KB69526.
McAfee VirusScan Enterprise 8.8 Product Guide
User-Defined Detection tab
Specify individual files or programs to treat as unwanted programs.
Option definitions
Option
Definition
Settings for
Select Workstation or Server from the drop-down list.
NOTE: This option is only available via ePolicy Orchestrator.
User-defined items
•
•
file name — Specify the name of the file or program that you want to detect.
Description — Specify the description that you want to display in the notification
when the specified file is detected.
NOTE: The scanner will not detect a zero byte sized user-defined unwanted program.
McAfee VirusScan Enterprise 8.8 Product Guide
149
Repositories tab
Configure the repositories where you get updates.
NOTE:
This feature is not available from the ePolicy Orchestrator Console. Access this feature from
the VirusScan Enterprise 8.8 Console.
Option definitions
Option
Repository description
Definition
Specify the name of the repository.
The list is preconfigured with an HTTP and an FTP repository.
•
http://update.nai.com/Products/CommonUpdater
•
ftp://ftp.nai.com/CommonUpdater
The HTTP repository is the default download site.
State
Enabled — A defined repository that can be used during the AutoUpdate process.
Disabled — A defined repository that you do not want to access during the AutoUpdate
process. This might be a repository that you use occasionally, but not all of the time.
NOTE: Create as many repository sites as necessary, then enable and disable them.
150
Add
Add a new repository to the list.
Edit
Edit the selected repository.
Delete
Delete the selected repository.
Move up
Move the selected repository up in the list.
Move down
Move the selected repository down in the list.
McAfee VirusScan Enterprise 8.8 Product Guide
Adding and editing repositories
Add new repositories or edit existing repositories.
Option definitions
Option
Definition
Repository description
Specify the name of the repository.
Retrieve files from
Select the location from which to retrieve files. Default = HTTP repository.
•
HTTP repository — Retrieve files from the HTTP repository location that you
designate.
NOTE: An HTTP site, like FTP, offers updating independent of network security,
but supports higher levels of concurrent connections than FTP.
•
FTP repository — Retrieve files from the FTP repository location that you designate.
NOTE: An FTP site offers flexibility of updating without having to adhere to network
security permissions. FTP has been less prone to unwanted code attach than HTTP,
so it may offer better tolerance.
•
UNC path — Retrieve files from the UNC path location that you designate.
NOTE: A UNC site is the quickest and easiest to set up. Cross domain UNC updates
require security permissions for each domain, which makes update configuration
more involved.
•
URL
Path
Port
Local path — Retrieve files from the local path location that you designate.
Available only if you selected HTTP repository or FTP repository.
•
HTTP — Type the location for the HTTP server and folder where the update files
are located.
•
FTP — Type the location for the FTP server and folder where the update files are
located.
Available only if you selected UNC path or Local path.
•
UNC path — Using UNC notation (\\servername\path\), type the path of the
repository where the update files are located.
•
Local path — Type the path of the local folder in which you have placed the update
files, or click Browse to navigate tot he folder. The path can be that of a folder on
a local drive or a network drive.
Available only if you selected HTTP repository or FTP repository. Type the port
number for the HTTP or FTP server you specified.
Use authentication
Use the specified credentials for accessing the repository.
Use anonymous login
NOTE:
Use logged on account
The title of this option differs depending on which option you selected in the Retrieve
files from section.
The credentials you specify are used by AutoUpdate to access the repository so that
it can download the required update files. When configuring the account credentials
McAfee VirusScan Enterprise 8.8 Product Guide
151
Adding and editing repositories
Option
Definition
on the repository, you ensure that the account has read permissions to the folders
containing the update files.
152
•
Download credentials are required for FTP and UNC repositories, but are optional
for HTTP repositories.
•
FTP updates support anonymous repository connections.
•
With UNC updates you can also use the logged on account, making use of the
logged on user's permissions to access the repository.
User name
Type the user name
Password
Type the password.
Confirm
Type the password again to confirm it.
McAfee VirusScan Enterprise 8.8 Product Guide
Proxy settings tab
Proxy servers are used as part of internet security to hide internet users’ computers from the
internet and improve access speed by caching commonly accessed sites.
If your network uses a proxy server, you can specify which proxy settings to use, the address
of the proxy server, and whether to use authentication. Proxy information is stored in the
AutoUpdate repository list (sitelist.xml). The proxy settings you configure here apply to all
repositories in this repository list.
NOTE:
This feature is not available from the ePolicy Orchestrator Console. Access this feature from
the VirusScan Enterprise 8.8 Console.
Option definitions
Option
Definition
Don't use a proxy
Do not specify a proxy server.
Use Internet Explorer
proxy settings
Use the proxy settings for the currently installed version of Internet Explorer.
Manually configure the
proxy settings
Configure the proxy settings to meet your specific needs.
Exceptions
Available only if you selected Manually configure the proxy settings.
Default = Use Internet Explorer proxy settings.
Specify proxy exceptions. Click Exceptions to open the Proxy Exceptions dialog box:
•
Specify exceptions — Select this option to enter proxy exceptions.
•
Use semicolons (;) to separate entries — For example: internal1;internal2
HTTP
Type the address of the HTTP proxy server.
FTP
Type the address of the FTP proxy server.
Port
Type the port number of the HTTP or FTP proxy server.
Use authentication for
HTTP
Use the specified credentials for accessing the HTTP proxy.
HTTP user name
Type the HTTP user name.
HTTP password
Type the HTTP password.
McAfee VirusScan Enterprise 8.8 Product Guide
153
Mirror task
Configure the mirror task
VirusScan Enterprise 8.8 Console — Option definitions
Option
Definition
Log File
Enable activity logging.
Format
Select the format of the log file. Default = Unicode (UTF8).
•
Unicode (UTF8) — Recommended if you are storing eastern text (every character
is one or two bytes), or sharing information within a multi-national organization.
•
Unicode (UTF16) — Recommended if you are storing eastern text (every character
is one or two bytes), or sharing information within a multi-national organization.
•
ANSI — Recommended if you are storing western text (every character is one byte),
we recommend using ANSI format.
Get newer detection
definition files if
available
This option does not apply to mirror tasks.
Get newer detection
engine if available
This option does not apply to mirror tasks.
Get other available
updates (service packs,
upgrades, etc.)
This option does not apply to mirror tasks.
Enter the executable to
be run after the Mirror
has completed
Specify an executable file to start after the mirror task finishes running. Specify the
path to the executable you want to run, or click Browse to locate it.
For example, you can start a network message utility that notifies the administrator
that the mirror task completed successfully.
NOTE: The program file that you specify must be executable by the currently logged on
user. If the currently logged on user does not have access to the folder containing the
program files, or if there is no currently logged on user, the program does not run.
Only run after successful
mirror
Run the executable program only after a successful mirror. If the mirror is not successful,
the program you specified does not run.
Mirror Location
Specify the path to the destination on the local system that you are using for the mirror
site.
NOTE: System variables are supported.
Schedule
Define the schedule for this update task.
NOTE:
See Scheduling Tasks for more information.
We do not recommend that you schedule an AutoUpdate task and a mirror task to run
at the same time. Both tasks use the McAfee Common Framework service, consequently
running both tasks at the same time may result in a conflict.
Mirror Now
154
Perform the mirror task immediately.
McAfee VirusScan Enterprise 8.8 Product Guide
AutoUpdate task
Configure the AutoUpdate task
Option definitions
Option
Definition
Log File
Enable activity logging.
Format
Select the format of the log file. Default = Unicode (UTF8).
•
Unicode (UTF8) — Recommended if you are storing eastern text (every character
is one or two bytes), or sharing information within a multi-national organization.
•
Unicode (UTF16) — Recommended if you are storing eastern text (every character
is one or two bytes), or sharing information within a multi-national organization.
•
ANSI — Recommended if you are storing western text (every character is one byte),
we recommend using ANSI format.
Get newer detection
definition files if
available
Get the most current version of the DAT files if a newer version is available.
Get newer detection
engine if available
Get the most current version of the engine and DAT files if newer versions are available.
Get other available
updates (service
packs, upgrades, etc.)
Get the most current version of other updates, such as service packs and product
upgrades.
Enter the executable
to be run after the
Update has completed
Specify an executable file to start after the AutoUpdate task finishes running. Specify
the path to the executable you want to run, or click Browse to locate it.
For example, you can start a network message utility that notifies the administrator that
the AutoUpdate task completed successfully.
NOTE: The program file that you specify must be executable by the currently logged on
user. If the currently logged on user does not have access to the folder containing the
program files, or if there is no currently logged on user, the program does not run.
Only run after
successful update
Run the executable program only after a successful update. If the update is not successful,
the program you specified does not run.
Schedule
Define the schedule for this update task.
NOTE:
See Scheduling Tasks for more information.
We do not recommend that you schedule an AutoUpdate task and a mirror task to run
at the same time. Both tasks use the McAfee Common Framework service, consequently
running both tasks at the same time may result in a conflict.
Update Now
Perform the AutoUpdate task immediately.
McAfee VirusScan Enterprise 8.8 Product Guide
155
Schedule tab
Specify the schedule frequency and other settings for this task.
Option definitions
Option
Runtime
Definition
Run task Select the frequency for this task from these options:
Daily — Run the task daily on the specified days.
Daily tasks can be run every so many days, or every day Monday through Sunday. If you
only want to run the task on specific days of the week, other than every day Monday
through Sunday, we recommend that you use the weekly task frequency.
Weekly — Run the task daily on the specified week(s) and day(s).
Monthly — Run the task daily on the specified day(s) and month(s).
Once — Run the task once on the specified date.
At Startup — Run the task at system startup and specify whether to run the task once
per day and the number of minutes to delay the task.
At Logon — Run the task at log on and specify whether to run the task once per day and
the number of minutes to delay the task.
When Idle — Run the task when the computer is idle and specify the number of minutes
that the computer is idle before starting the task.
If the task is started and a user resumes use of the computer before the task completes,
the task continues to run until complete.
Immediately — Run the task immediately.
On Dialup — Run the task on dialup.
Start Time
Select the start time for the scheduled task.
UTC Time
Coordinated Universal Time (UTC). Select this option to run the task simultaneously in all
time zones.
Local Time
Run the task independently in each local time zone.
NOTE: Default= Local Time
Enable randomization
Run the task at a random point within the interval of time you set.
If you select this option, also specify the hours and minutes for the maximum time lapse.
NOTE:
Specify a time lapse interval between one minute (minimum) and 23 hours (maximum).
For example, setting the task schedule to 1:00 and the randomization to three hours,
would cause the task to run at any time between 1:00 and 4:00.
This option is not available when scheduling the task At Startup, At Logon, or When Idle.
Hours
156
The number of hours. Choose between 0 and 23 hours
McAfee VirusScan Enterprise 8.8 Product Guide
Schedule tab
Option
Minutes
Definition
The number of minutes.
NOTE:
The number of minutes available for selection depends on which options you have selected.
For example:
Run if missed
•
Enable randomization — Choose between 0 and 59 minutes.
•
Delay missed task by — Choose between 0 and 99 minute.
Ensure that missed tasks run when the computer starts up again. If the computer was
offline when a task was scheduled to be run, it may have been missed.
NOTE: This feature ensures that remote users and the network are fully protected if they
happen to be offline when a task is scheduled to run.
Delay missed task by
Select the number of minutes by which you want to delay the missed task. Choose between
0 to 99 minutes.
Every day(s)
Run this task every so many days as specified. Choose between 0 to 9999 days.
NOTE: This option is only available when you schedule the task Daily.
Every week(s)
Run this task every so many weeks as specified. Choose between 0 to 99 weeks.
If you select this option, also specify the number of weeks and the day(s) of the week.
NOTE:
For day of the month, choose from Sunday, Monday, Tuesday, Wednesday, Thursday,
Friday, and Saturday.
This option is only available when you schedule the task Weekly.
Day of the month
Run this task on a specific day of the month. Choose between 1 to 31 days.
If you select this option, also specify the number of day of the month.
NOTE: This option is only available when you schedule the task Monthly.
Week day of the
month
Run this task on the specified day of the month.
If you select this option, also select occurrence and day of the month.
NOTE:
For occurrence, choose from First, Second, Third, Fourth, and Last.
For day of the month, choose from Sunday, Monday, Tuesday, Wednesday, Thursday,
Friday, and Saturday.
This option is only available when scheduling the task Monthly.
Select Months
Specify which months to run this task.
NOTE: This option is only available when scheduling the task Monthly.
Run on
Specify the date on which you want to run this task.
NOTE: This option is only available when scheduling the task Once.
Only run this task
once a day
Run this task once per day.
NOTE:
If you do not select this option, the task runs every time startup or log on occurs.
This option is only available when scheduling the task At Startup, At Logon, or Run On
Dialup.
Delay task by
Specify the number of minutes by which to delay this task. Choose between 0 to 99.
NOTE:
This allows time for users to log on and logon scripts to execute.
McAfee VirusScan Enterprise 8.8 Product Guide
157
Schedule tab
Option
Definition
This option is only available when scheduling the task At Startup or At Logon.
When computer has
been idle for
Specify the number of minutes that the computer is idle before starting the task. Choose
between 0 to 999 minutes.
NOTE:
If the task is started and a user resumes use of the computer before the task completes,
the task continues to run until complete.
This option is only available when scheduling the task When Idle.
Advanced
Configure advanced options.
NOTE: See Advanced scheduling options for more information.
158
McAfee VirusScan Enterprise 8.8 Product Guide
Task tab
Enable the schedule for this task and specify user account settings.
Option definitions
Option
Enable (scheduled task
runs at specified time)
Stop the task if it runs
for
Definition
Schedule the task to run at a specified time.
NOTE: This option must be selected to schedule the task.
Stop the task after the number of hours and minutes that you specify.
NOTE: If the task is interrupted before it completes, the next time it starts it resumes
scanning from where it left off.
Hours
The number of hours after which the task will stop.
Minutes
The number of minutes after which the task will stop.
User
Type the user ID under which this task executes.
NOTE:
The use of credentials is optional. If you do not type credentials here, the scheduled
task runs under the local system account.
See Log on privileges for more information.
Domain
Type the domain for the user ID you specified.
Password
Type the password for the user ID and domain you specified.
McAfee VirusScan Enterprise 8.8 Product Guide
159
Advanced schedule options
Configure the schedule parameters.
Option definitions
Option
Definition
Start Date
Specify the date to start this task.
End Date
Specify the date to end this task.
Repeat Task
Repeat the task at the specified frequency.
If you select this option, also specify how frequently to repeat this task.
Every
Specify how frequently to repeat this task.
Also select whether you want the frequency to be hours or minutes.
Time (Local)
Repeat this task at the specified local time.
If you select this option, also select the specific time.
Duration
Repeat this task for the specified hours and minutes.
If you select this option, also select the hours and minutes.
160
Hours
The number of hours. Choose between 0 to 99.
Minutes
The number of minutes. Choose between 0 to 59.
McAfee VirusScan Enterprise 8.8 Product Guide
Global Scan Settings tab
Set scan cache options to save scan data during a system reboot and allow on-demand scans
to use that clean cache data to improve performance. See Configuring global option settings
for more information.
Option definitions
Option
Definition
Settings for
Select Workstation or Server from the drop-down list.
NOTE: This option is only available via ePolicy Orchestrator.
Scan cache
Configure the global options and settings
•
Enable saving scan data across reboots — This allows you to save clean scan
results even when you reboot the system. (Default = selected.)
NOTE: Disable this feature if the system is used where the hard drive(s) might be
altered externally. For example, if the hard drive is removed, its contents updated,
and, later, replaced (virtual machines and systems with dual boot configurations are
included in this exception).
•
Allow On-Demand Scans to utilize the scan cache — This allows the on-demand
scanner to use the existing clean scan results to reduce duplicate scanning. (Default
= selected.)
McAfee VirusScan Enterprise 8.8 Product Guide
161
Index
A
access protection
disabling during troubleshooting 98
access violations 25
anti-virus and common rules 26
common rules 23
detections and actions 73
excluding processes 32
file and folder blocking rules 31
getting started 23
log report example 20
overview 19, 23
policies, overview 26
port blocking rules 31
preconfigured rules 23
protocols, restricting 25
registry blocking rules 32
removing unused rules 33, 34
standard and maximum protection 23
threat example 20
types of rules 23
user-defined rules 23, 25, 28, 29, 30
virtual machine protection 23
AccessProtectionLog.txt, activity log 84
Actions tab, VirusScan Enterprise
on-access scanning 58, 60
on-delivery email scanning 69, 71
on-demand scanning 66
actions, VirusScan Enterprise
access protection 73
access violations 25
buffer overflow detections 73
email scanning 75
on-access scanning 72, 74
on-demand scanning 66, 75
quarantined items 75
responding to a threat 80, 84
unwanted programs 73
activity logs, VirusScan Enterprise
access violations 25
email scanning and 69, 75
on-demand scanning and 66, 75
reviewing 74
unwanted programs 73
using 84
viewing 96
adware (See unwanted programs) 38
Alert Manager
access violations 25
configuring alerts 78
events 25
Alerts tab, VirusScan Enterprise
on-delivery email scanning 69, 71
162
McAfee VirusScan Enterprise 8.8 Product Guide
alerts, VirusScan Enterprise
configuring 78
email scanning 69
on-access scanning 51
on-demand scanning 66
overview 78
All files option, VirusScan Enterprise 52
anti-spyware rules
configuring access protection 26
anti-virus rules
configuring access protection 26
preconfigured access protection 23
Artemis
heuristic network check for suspicions files 10
overview 53
VirusScan Enterprise component overview 10
audience for this guide 6
AutoUpdate
configuring 45
process overview 44
repositories, connecting to 44
repository list 47
requirements 44
strategies for VSE updates 43
B
bandwidth and updating strategies 43
best practices
removing EXTRA.DAT files from repositories 44
strategies for VSE updates 43
Blocking tab, VirusScan Enterprise
on-access scanning 54
buffer overflow protection
disabling during troubleshooting 98
alerts and notifications 78
blocking exploits 34
detections and actions 73
exploits, overview 35
BufferOverflowProtectionLog.txt, activity log 84
C
cache
configuring using ePolicy Orchestrator 4.0 68
configuring using ePolicy Orchestrator 4.5 or 4.6 67
configuring using the VirusScan Console 69
overview 67
cache, configuring 67
CATALOG.Z file
troubleshooting 101
encrypted update 44
client system, VirusScan Enterprise component 10
command line
on-demand scanning options 91
update task options 93
using it to configure the product 91
Index
common rules
access protection, configuring 26
preconfigured access protection 23
standard and maximum protection 23
comon protection rules
configuring access protection 26
components
illustration 10
of VirusScan Enterprise 10
VirusScan Console 13
conventions used in this guide 6
D
dashboards
monitoring activity 80, 84
predefined, accessing 80
DAT files
detection definitions 43
detections and defined actions 72
EXTRA.DAT files, updating 44
overview 42
rolling back, configuring 48
rolling back, overview 48
scheduling rollouts 43
script scanning and 53
update tasks, about 44
updating importance 43
updating strategies 43
VirusScan Enterprise component overview 10
DAT repository
VirusScan Enterprise component overview 10
Default + additional file types option, VirusScan Enterprise 52
Defer at most option, VirusScan Enterprise 64
deployment
scheduling VSE update tasks 43
update requirements 44
detections
access protection 73
actions in response to 72
buffer overflow 73
email scanning 69, 75
on-access scanning 74
on-demand scanning 66, 75
responding to 80, 84
dialers (See unwanted programs) 38
documentation
organization 7
typographical conventions 6
documentation for products, finding 8
ePolicy Orchestrator
retrieving DAT files 42
versions supported 9
server tasks, configuring example 89
server tasks, overview 89
VirusScan Enterprise component 10
ePolicy Orchestrator 4.0
accessing queries and dashboards 80
analyzing threat protection example 87
configuring AutoUpdate task 45
configuring mirror task 46
configuring on-demand scan tasks 65
ePolicy Orchestrator 4.5 and 4.6
accessing queries and dashboards 80
analyzing threat protection example 87
configuring AutoUpdate task 45
configuring mirror task 46
configuring on-demand scan tasks 64
events, VirusScan Enterprise
access violations 25
Alert Manager 25
exclusions
identifying processes for 73
on-demand scanning 66
unwanted programs 38, 39
using wildcards to specify scan items 49
what to exclude 49
Exclusions tab, VirusScan Enterprise
on-access scanning 58, 60
on-demand scanning 66
EXTRA.DAT files (See emergency DATs 44
EXTRA.DAT files (See emergency DATs) 81
F
false positives
creating exclusions to reduce 73
file type extensions
what to exclude 49
files and folders
blocking options 31
restricting access 25
frequently asked questions 101
G
General tab, VirusScan Enterprise
on-access scanning 54
Global Scan Settings option, VirusScan Enterprise 67
H
E
email scanning
configuring 69
detections and actions 75
unwanted programs, enabling using ePolicy Orchestrator 4.0 41
unwanted programs, enabling using ePolicy Orchestrator 4.5 or
4.6 40
unwanted programs, enabling using the VirusScan Console 42
unwanted programs, overview 40
emergency DATs
overview 81
engine updating
AutoUpdate, process overview 44
importance 43
strategies 43
McAfee VirusScan Enterprise 8.8 Product Guide
heuristics to check for suspicious files (See Artemis) 53
high-risk processes
configuring VirusScan Enterprise 54
settings 54
I
icons, system tray 14
K
KnowledgeBase, Technical Support ServicePortal 8
163
Index
McAfee Agent
icons indicate version 14
VirusScan Enterprise component overview 10
McAfee Headquarters, VirusScan Enterprise component 10
McAfee Labs
submit a sample 74
submitting samples 94
access 13
accessing Threat Library 95
Artemis sends fingerprint to 53
VirusScan Enterprise component overview 10
McAfee ServicePortal, accessing 8
McAfee Validation Trust Protection Service, disabling during
troubleshooting 98
menu bar, VirusScan Console 13
MER tool (See Minimum Escalation Requirements tool) 97
Messages tab, VirusScan Enterprise
on-access scanning 54
mfehidk.sys file, renaming during troubleshooting 98
MFEVTP (See McAfee Validation Trust Protection Service) 98
Minimum Escalation Requirements tool 97
Mirror tab, VirusScan Enterprise 46
mirror task
configuration 46
overview 45
MirrorLog.txt, activity log 84
monitoring, VirusScan Enterprise
overview 84
tools 84
msiexec.exe, command installation command 95
on-access scanning (continued)
detections and actions 72, 74
general and process settings 54
overview 51
process settings 58
reading from vs. writing to disk 52
scanning policies 54
script scanning 53
unwanted programs, enabling using ePolicy Orchestrator 4.0 41
unwanted programs, enabling using ePolicy Orchestrator 4.5 or
4.6 40
unwanted programs, enabling using the VirusScan Console 42
unwanted programs, overview 40
on-delivery email scanning
alerts and notifications 78
on-demand scanner
unwanted programs, configuring (See Configuring on-demand
scan tasks) 38
on-demand scanning
command line options 91
configuring tasks 66
configuring with ePolicy Orchestrator 4.0 65
configuring with ePolicy Orchestrator 4.5 or 4.6 64
configuring with VirusScan Console 65
detections and actions 75
exclusions 66
incremental, resumable, in-memory 63
methods 63
overview 62
remote storage scans 63
scan deferral 64
system utilization 64
on-network drives
configuring overview 60
configuring using ePolicy Orchestrator 4.0 61
configuring using ePolicy Orchestrator 4.5 and 4.6 61
configuring using the VirusScan Console 62
OnAccessScanLog.txt, activity log 84
OnDemandScanLog.txt, activity log 84
Open Remote Console feature, VirusScan Enterprise
accessing remote systems 94
overview 94
N
P
network drives
configuring overview 60
configuring using ePolicy Orchestrator 4.0 61
configuring using ePolicy Orchestrator 4.5 and 4.6 61
configuring using the VirusScan Console 62
Notes Scanner Settings tab, VirusScan Enterprise
on-delivery email scanning 69, 71
notifications, VirusScan Enterprise
configuring 78
overview 78
passwords
controlling access to VSE interface 21
protecting phone book files 23
User Interface Options policy 21
Performance tab, VirusScan Enterprise
on-demand scanning 66
policies, VirusScan Enterprise
Alert Policies 78
email scanning 69
General Options 21
on-access scanning 54
On-Delivery Email Scan Policies 69
unwanted programs 38
unwanted Programs 73
ports
access protection, options 31
blocking network traffic on 23, 25
potentially unwanted programs (See unwanted programs) 38
process settings
on-access scanning 58
L
log files, VirusScan Enterprise
access violations 25
email scanning and 69
on-demand scanning and 66
See activity logs, VirusScan Enterprise 84
low-risk processes
configuring VirusScan Enterprise 54
settings 54
M
O
On network drives option, VirusScan Enterprise 52
On-Access Scan Messages alert 51
on-access scanning
activity log file 96
configuring with ePolicy Orchestrator 4.0 59
configuring with ePolicy Orchestrator 4.5 and 4.6 58
configuring with the VirusScan Console 59
disabling during troubleshooting 98
deciding how many scanning policies 54
164
McAfee VirusScan Enterprise 8.8 Product Guide
Index
processes
include and exclude 32
Processes tab, VirusScan Enterprise
on-access scanning 58, 60
processes, VirusScan Enterprise
default, configuring 54
in memory process scanning 63
incremental or resumable scanning 63
low-risk and high-risk 54
script scanning 53
Proxy settings tab, VirusScan Enterprise 47
PUPs (See unwanted programs) 38
Q
quarantines, VirusScan Enterprise
configuring with ePolicy Orchestrator 4.0 76
configuring with ePolicy Orchestrator 4.5 or 4.6 76
configuring with VirusScan Console 77
overview 75
quarantine policy 75
queries, VirusScan Enterprise
accessing from ePO navigation bar, Reporting 80
monitoring activity 80, 84
predefined, list of 80
R
registry keys
options 32
restricting access 25
remote console
overview 94
accessing remote systems 94
remote storage scans, overview 63
reports
accessing queries 80
analyzing threats 86
configuring VirusScan Enterprise logging 69
on-demand scanning activity 66
Reports tab, VirusScan Enterprise
on-access scanning 54
On-Access Scan Statistics 88
on-delivery email scanning 69, 71
on-demand scanning 66
repositories
AutoUpdate, connecting to 44
central, using for VSE updates 43
removing EXTRA.DAT files from 44
Repositories tab, VirusScan Enterprise 47
repository list
configuring 47
AutoUpdate 47
Rollback DATs, VirusScan Enterprise 48
rules, VirusScan Enterprise
access protection 23
anti-virus 26
file and folder blocking 31
port-blocking 31
registry blocking options 32
removing unused 33, 34
user-defined, types of 25
S
scan cache (continued)
configuring using ePolicy Orchestrator 4.5 or 4.6 67
configuring using the VirusScan Console 69
overview 67
scan deferral, overview 64
scan engine
updating importance 43
VirusScan Enterprise component overview 10
Scan Items tab, VirusScan Enterprise
on-access scanning 52, 58, 60
configure unwanted programs policy using ePolicy Orchestrator
4.0 39
configure unwanted programs policy using ePolicy Orchestrator
4.5 or 4.6 38
configure unwanted programs policy using the VirusScan Console
40
on-access scanning 52, 58, 60
on-delivery email scanning 69, 71
on-demand scanning 66
unwanted programs policy 38
Scan Locations tab, VirusScan Enterprise 66
scan updating
strategies 43
scanning
activity logs 73
adding and excluding scan items 49
email scans (See email scanning) 69
exclusions, specifying 49
on-access (See on-access scanning) 51
on-demand (See on-demand scanning) 62, 63
using wildcards to specify scan items 49
Schedule tab, VirusScan Enterprise 50
scheduling
tasks 50
script scanning (See on-access scanning) 53
ScriptScan tab, VirusScan Enterprise
on-access scanning 54
scriptscan, disabling during troubleshooting 98
SDAT (See SuperDAT packages) 81
server tasks
ePolicy Orchestrator, overview 89
ePolicy Orchestrator, configuring example 89
ServicePortal, finding product documentation 8
settings, VirusScan Enterprise
general and process, defined 54
general, configuring using ePolicy Orchestrator 4.0 56
general, configuring using ePolicy Orchestrator 4.5 or 4.6 55
general, configuring using the VirusScan Console 57
SETUPVSE.exe, command installation command 95
SITELIST.XML (See repository list) 47
spyware (See unwanted programs) 38
status bar, VirusScan Console 13
SuperDAT packages
downloading 82
installing on an ePolicy Orchestrator repository 82
overview 81
system tray
icons 14
menu options 14
right-click features 14
system tray icon
access violations and 25
configuring access to VirusScan Enterprise interface 21
system utilization option, overview 64
scan cache
configuring using ePolicy Orchestrator 4.0 68
McAfee VirusScan Enterprise 8.8 Product Guide
165
Index
T
task
AutoUpdate 45
mirror 45
scheduling 50
update 44
Task list, VirusScan Console 13
task schedule
configuring 50
recommended on-demand interval 50
Task tab, VirusScan Enterprise
scheduling on-demand scanning 66
scheduling tasks 50
Technical Support ServicePortal
at McAfee 8
troubleshooting 98
using the MER tool 97
threat
ePolicy Orchestrator 4.0 analysis 87
ePolicy Orchestrator 4.5 and 4.6 analysis 87
VirusScan Console analysis 88
threat detections (See threats) 69
threats
submitting samples 94
access violations 73
accessing Threat Library 95
analyzing, examples 86
analyzing, overview 86
buffer overflow 73
email scanning 75
how they are stopped 20
on-access detections and actions 72
on-access scanning 74
on-demand scanning 75
prevention strategy 11
quarantined items 75
responding to 80, 84
unwanted programs 73
toolbar, VirusScan Console 13
troubleshooting, VirusScan Enterprise
appendix 95
disabling components 98
suggested tools 101
tuning, VirusScan Enterprise
what to scan, adding and excluding 49
U
unwanted programs
actions and on-demand scanning 66
configuring policy for 38
detections and actions 73
email scanning, actions 69
on-demand scanning 63
overview 38
unwanted programs policy
exclusions 38, 39
166
McAfee VirusScan Enterprise 8.8 Product Guide
update task, command line options 93
UpdateLog.txt, activity log 84
updating, VirusScan Enterprise
AutoUpdate 44
process overview 44
requirements 44
strategies 43
tasks 43
update sites 44
update task 43
user accounts, controlling access to VirusScan Enterprise interface 21
user interface security
configuring 21
passwords and 21
user-defined rules
access protection 28, 29, 30
types 25
user-defined rules, access protection 23
V
virtual machine protection rules
configuring access protection 26
preconfigured access protection 23
VirusScan Console
analyzing threats 88
overview 13
right-click features 14
VirusScan Enterprise
removing during troubleshooting 98
repairing the installation 95
access protection 23, 25
email scanning 69
general settings, configuring 54
general settings, configuring using ePolicy Orchestrator 4.0 56
general settings, configuring using ePolicy Orchestrator 4.5 or 4.6
55
general settings, configuring using the VirusScan Console 57
initial configuration 17
notifications and alerts 78
on-access scanning 51, 74
on-demand scanning 62, 63
product overview 9
removing unused rules 33, 34
unwanted programs policy 38
update, requirements 44
updating 43, 44
user interface security 21
what to exclude, adding and excluding 49
W
WebImmune website 94
wildcards, using in scan items 49
Windows
File Protection, exclusions 49
Windows Explorer
right-click features 14