McAfee VirusScan (V8.5; V8.5i; V8.7) Configuration
Commissioning Manual, 08/2009, A5E02634985-01
3
Table of contents
1 Using virus scanners .................................................................................................................................
5
1.1 Preface...........................................................................................................................................
5
1.2 Using virus scanners......................................................................................................................
6
1.2.1 Introduction ....................................................................................................................................
6
1.2.2 Definitions and information ............................................................................................................
6
1.2.3 Principle structure of the virus scanner architecture......................................................................
7
1.2.4 Using antivirus software.................................................................................................................
8
2 Configuration .............................................................................................................................................
9
2.1 Introduction ....................................................................................................................................
9
2.2 Configuration of the policies...........................................................................................................
9
2.3 Central settings ............................................................................................................................
10
2.3.1 "Settings" tab................................................................................................................................
10
2.3.2 Tasks in process mode ................................................................................................................
10
2.3.3 Deploying virus definition files......................................................................................................
11
2.3.4 Checking the deployment of the virus definition files...................................................................
13
2.4 On-Access General Policies ........................................................................................................
14
2.4.1 "General" tab................................................................................................................................
14
2.4.2 "ScriptScan" tab ...........................................................................................................................
15
2.4.3 "Blocking" tab...............................................................................................................................
16
2.4.4 "Messages" tab ............................................................................................................................
17
2.5 On-Access Default Processes Policies........................................................................................
18
2.5.1 "Detection" tab .............................................................................................................................
18
2.5.2 "Advanced" tab.............................................................................................................................
19
2.5.3 "Actions" tab.................................................................................................................................
20
2.5.4 "Unwanted Programs" tab............................................................................................................
21
2.6 On-Access Low-Risk Processes Policies ....................................................................................
22
2.7 On-Access High-Risk Processes Policies ...................................................................................
22
2.8 On Delivery E-Mail Scan Policies Policies...................................................................................
22
2.9 User Interface Policies .................................................................................................................
23
2.9.1 "Display Options" tab ...................................................................................................................
23
2.9.2 "Password Options" tab ...............................................................................................................
24
2.10 Warning guidelines ......................................................................................................................
24
2.11 Access Protection Policies...........................................................................................................
25
2.12 Buffer overflow protection policies ...............................................................................................
25
2.13 Unwanted Programs Policies.......................................................................................................
25
2.14 Quarantine Manager Policies.......................................................................................................
25
Comentarios a estos manuales