McAfee SAV85E - Active VirusScan - PC Manual de usuario Pagina 18

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 24
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 17
18
White Paper Access Protection in McAfee VirusScan Enterprise and
Host Intrusion Prevention
“Prevent modification of VMware Server files and settings”
Intention: This rule protects VMware Server registry values and processes from alteration or deletion by
malicious code.
Risks: This rule protects the VMware Server product from modification by any process not listed in the
policy’s exclusion list.
“Prevent modification of VMware virtual machine files”
Intention: This rule protects VMware virtual machine files from alteration or deletion by malicious code.
Risks: This rule protects the VMware virtual machine files from modification by any process not listed in
the policy’s exclusion list.
User-defined Rules
There are three purposes a rule can have:
Prevent malicious code running in the first place
•
If malicious code is running, prevent it from spreading to other computers
•
If malicious code is running, prevent a payload from damaging the local computer
•
And for each of those categories there are two sub-divisions:
Target the rule at a known, newly discovered threat
•
Target the rule at all unknown future threats of a particular type
•
In all cases we are assuming that the regular virus detection is unable to detect the code—probably
because we are in the small window after the worm goes wild and before .DATs are released
and distributed.
Targeting Rules at New, Known Threats
Introduction
The first reference for these will be the VIL entry for the newly discovered threat. For example, if
W32/Bagle.ab@MM has just been discovered, then the VIL page
http://vil.nai.com/vil/content/v_125089.htm will exist but the .DATs will not have been released yet.
The first priority will be to create one or more rules that prevent virus from infecting your computers.
However, because the virus is known to be in the wild, you can assume that some of your computers are
infected. Therefore, the second priority is to create rules that help identify those computers, and prevent
the virus from spreading and causing damage.
Vista de pagina 17
1 2 ... 13 14 15 16 17 18 19 20 21 22 23 24

Comentarios a estos manuales

Sin comentarios