McAfee VIRUSSCAN ENTERPRISE Guía de usuario Pagina 19

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 166
  • Tabla de contenidos
  • SOLUCIÓN DE PROBLEMAS
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 18
Part I - Prevention: Avoiding Threats
Prevention is the first step in a protection strategy, to keep threats from gaining access to your
system.
Contents
Access protection
Protecting your system access points
Blocking buffer overflow exploits
Restricting potentially unwanted programs
Updating detection definitions
Excluding scan items
Using scheduled tasks
Access protection
Preventing threat access to your client system is your first line of defense against malware. The
Access Protection feature of VirusScan Enterprise compares an action being requested against
a list of configured rules. Each rule can be configured to block or report, or block
and
report
access violations when they occur.
Access protection prevents unwanted changes to your computer by restricting access to specified
ports, files, shares, registry keys, and registry values. It also protects McAfee processes by
preventing users from stopping them. This protection is critical before and during outbreaks.
This feature uses predefined rules and user-defined rules to specify which items can and cannot
be accessed. Each rule can be configured to block or report, or block and report access violations
when they occur. Predefined rules and categories can be updated from the McAfee update sites.
NOTE: The on-access scanner, which detects access violations, must be enabled to detect
attempts to access ports, files, shares, and registry keys and registry values.
How threats gain access
The most common ways threats gain access to your system include:
Macros — As part of word processing documents and spreadsheet applications.
Executable files Seemingly benign programs can include viruses along with the expected
program. For example, some common file extensions are .EXE, .COM, .VBS, .BAT, .HLP and
.DLL.
Email — Jokes, games, and images as part of email messages with attachments.
Scripts — Associated with web pages and emails, scripts such as ActiveX and JavaScript,
if allowed to run, can include viruses.
19McAfee VirusScan Enterprise 8.8 Product Guide
Vista de pagina 18
1 2 ... 14 15 16 17 18 19 20 21 22 23 24 ... 165 166

Comentarios a estos manuales

Sin comentarios