McAfee VIRUSSCAN ENTERPRISE Guía de usuario Pagina 32

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 166
  • Tabla de contenidos
  • SOLUCIÓN DE PROBLEMAS
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 31
DefinitionOption
Block files from being deleted from the specified folder.Files being deleted
Registry blocking rule options
Registry blocking rules prevent users and unauthorized programs from altering, opening, or
deleting specified registry keys and values.
NOTE: When creating a registry blocking rule, use the best matching hive registry subtree
abbreviation. For example, to block HKLM\System\CurrentControlSet\Services\MyService, choose
the HKCCS hive rather than HKLM.
Option definitions
DefinitionOption
Specify the name for this rule.Rule Name
Restrict access to the specified processes.Processes to include
Allow access to the specified processes.Processes to exclude
Protect this registry key or value:Registry key or value to
protect
Select a root key or value from the drop-down list.
Type a key or value in the text box.
Selecting the root key or value from the drop-down list is optional. Use either of these
methods to specify the key or value:
Select the root key or value from the drop-down list, then type the remaining path
to the key or value in the text box.
Type the full path to the key or value in the text box.
Select the type of rule:Rule type
Key — This rule protects the specified key.
Value — This rule protects the specified value.
Block writing to the specified key or value.Write to key or value
Block creating the specified key or value.Create key or value
Block deleting the specified key or value.Delete key or value
Include or exclude specific process options
To change the rule details, such as the name, and which process to include or exclude, use
Access Protection and click Edit.
Option definitions
DescriptionOption
The name of this rule. For example, Prevent registry editor and Task Manager from
being disabled.
Rule Name
Restrict access to these processes. Use the exact process name or use a wildcard to
specify a broad range of processes such as *.EXE, then add exclusions for specific
Processes to include
processes that are legitimate, such as SETUP.EXE. For example, specify * to include all
processes.
Part I - Prevention: Avoiding Threats
Protecting your system access points
McAfee VirusScan Enterprise 8.8 Product Guide32
Vista de pagina 31
1 2 ... 27 28 29 30 31 32 33 34 35 36 37 ... 165 166

Comentarios a estos manuales

Sin comentarios