background image

Updating and Upgrading VirusScan Software

248

McAfee VirusScan Anti-Virus Software

To use a custom account, clear the 

Use Logged In Account

 

checkbox, then click 

UNC login information

 to enter a user name 

and password for an account that has access rights to the target 
server.

FTP from a remote network computer

. Click this button to tell the 

AutoUpgrade utility to look for new files on an FTP site you 
designate. To use this option, the target server must have an FTP 
service enabled.

The AutoUpgrade utility uses its own FTP implementation to 
connect to the server, but the timeout period for the connection 
attempt will depend on your existing network protocol settings.

To use a different FTP site, enter the URL for the site you want to use 
in the text box labeled Enter an FTP Computer Name and Directory. 
You must either connect to a site set for anonymous FTP login, or 
you must designate the user name and password for an account on 
the site.

To have the utility use an anonymous login, select the 

Use 

anonymous FTP login

 checkbox.

To specify an account, clear the 

Use anonymous FTP login

 

checkbox, then click 

FTP login information

 to enter a user name 

and password for an account that has access rights to the target 
server.

If your network uses a proxy server, select the 

Use proxy server 

checkbox

, then enter the server name and the logical port it uses in 

the text boxes provided. You can enter the name in UNC notation or 
as a domain name, whichever is appropriate for your environment.

Š

NOTE: 

The AutoUpgrade utility will not allow proxy 

connections that require challenge-response proxy 
authentication.

Configuring advanced upgrade options

To complete your AutoUpgrade task, you need to enter only a target server, a 
connection method, and any necessary login information. Once you enable the 
task and set a schedule for it, the AutoUpgrade utility will download the 
correct files from the target server for you, extract them, then install them into 
the VirusScan program directory.

To have AutoUpgrade do additional pre- or post-processing on the files, or to 
have it take other actions, click the Advanced Upgrade Options tab to display 
the property page shown in 

Figure 7-5 on page 238

.

Summary of Contents for AVDCDE-AA-AA - Active Virus Defense Suite

Page 1: ...McAfee VirusScan Anti Virus Software User s Guide Version 4 5...

Page 2: ...rTelnet Pretty Good Privacy PrimeSupport RecoverKey RecoverKey International ReportMagic RingFence Router PM Safe Sound SalesMagic SecureCast Service Level Manager ServiceMagic Site Meter Sniffer Snif...

Page 3: ...ack xx Reporting new items for anti virus data file updates xxi International contact information xxii Chapter 1 About VirusScan Software 25 Introducing VirusScan anti virus software 25 How does Virus...

Page 4: ...does the VShield scanner do 87 Why use the VShield scanner 88 Browser and e mail client support 89 Enabling or starting the VShield scanner 90 Using the VShield configuration wizard 95 Setting VShiel...

Page 5: ...e utility 242 Configuring the AutoUpgrade utility 243 Using the AutoUpgrade and SuperDAT utilities together 252 Chapter 8 Using Specialized Scanning Tools 255 Scanning Microsoft Exchange and Outlook m...

Page 6: ...me users 304 Network Associates consulting and training 305 Professional Services 305 Total Education Services 306 Appendix C Using the SecureCast Service to Get New Data Files 307 Introducing the Sec...

Page 7: ...the cost you incur in time and effort to track down the source of the infection and eradicate all of its traces Why worry So why worry about virus infections if most attacks do little harm The problem...

Page 8: ...ays be with us But knowing a bit about the history of computer viruses and how they work can help you better protect yourself against them Virus prehistory Historians have identified a number of progr...

Page 9: ...closely guarded mainframe systems dominated the computing world from their bastions in large corporations and universities Nor did the individual users who bought PCs have much use for the sophisticat...

Page 10: ...ny later generation viruses routinely incorporate functions that infect your hard disk boot sector or MBR even if they use other methods as their primary means of transmission Those same viruses have...

Page 11: ...ected file s size to easily detectable proportions or would consume enough system resources to point to an obvious culprit their authors also needed to tell them to leave certain files alone They addr...

Page 12: ...stripped down version of its Visual Basic language included with the suite users could create document templates that would automatically format and add other features to documents created with Word...

Page 13: ...modules or objects that programmers can write themselves or take from existing sources and fashion into the plug ins applets device drivers and other software needed to power the web Java objects are...

Page 14: ...vent malicious actions but virus writers and security hackers have found ways around these Because the benefits these innovations bring to the web generally outweigh the risks however most users find...

Page 15: ...ojan horse or other malicious program for one of your favorite shareware or commercial utilities that is until after the fact Web and Internet access poses its own risks VirusScan anti virus software...

Page 16: ...curity solutions including the PGP data security and encryption product line the Gauntlet firewall product line the WebShield E ppliance hardware line and the CyberCop Scanner and Monitor product seri...

Page 17: ...tion If you do not find what you need or do not have web access try one of our automated services If the automated services do not have the answers you need contact Network Associates at one of the fo...

Page 18: ...oad support To get help with navigating or downloading files from the Network Associates or McAfee websites or FTP sites call Network Associates training For information about scheduling on site train...

Page 19: ...or virus samples to To report items to the McAfee European research office use these e mail addresses To report items to the McAfee Asia Pacific research office or the office in Japan use one of these...

Page 20: ...lgique Phone 0032 2 478 10 29 Fax 0032 2 478 66 21 Network Associates do Brasil Rua Geraldo Flausino Gomez 78 Cj 51 Brooklin Novo S o Paulo SP 04575 060 Brasil Phone 55 11 5505 1009 Fax 55 11 5505 100...

Page 21: ...zo D 1 Via Brescia 28 20063 Cernusco sul Naviglio MI Italy Phone 39 02 92 65 01 Fax 39 02 92 14 16 44 Network Associates Japan Inc Toranomon 33 Mori Bldg 3 8 21 Toranomon Minato Ku Tokyo 105 0001 Japa...

Page 22: ...65 220 7255 Network Associates Spain Orense 4 4a Planta Edificio Trieste 28020 Madrid Spain Phone 34 9141 88 500 Fax 34 9155 61 404 Network Associates Sweden Datav gen 3A Box 596 S 175 26 J rf lla Sw...

Page 23: ...uctions in revenue as more businesses move into e commerce and online sales and as virus attacks proliferate VirusScan software first honed its technological edge as one of a handful of pioneering uti...

Page 24: ...e sun coverage from its Anti Virus Emergency Response Team AVERT Even with the rise of viruses and worms that use e mail to spread that flood e mail servers or that infect groupware products and file...

Page 25: ...virus code it can instead sample the file at well defined points to look for virus code signatures that indicate an infection The development environment brings as much speed to DAT file construction...

Page 26: ...macro virus or a file infecting virus ViruLogic looks for virus like behaviors in program functions such as covert file modifications background calls or invocations of e mail clients and other metho...

Page 27: ...ssed archive files in an attempt to tie up the scanner as it digs through the file looking for infections VirusScan software accurately scans the majority of popular compressed file and archive file f...

Page 28: ...prevents others from making unauthorized changes The same convenient dialog box controls configuration options for all VShield modules See Using the VShield Scanner on page 85 for details The E Mail S...

Page 29: ...unning in 16 bit or protected mode it will transfer control to one of the other scanners SCANPM EXE a scanner for 16 and 32 bit environments This scanner provides you with a full set of scanning optio...

Page 30: ...s Guide describes in detail how to use VirusScan and includes other information useful as background or as advanced configuration options Acrobat PDF files are flexible online documents that contain...

Page 31: ...vantage of each platform s strengths The next sections discuss other changes that this VirusScan release introduces Installation and distribution features McAfee anti virus products including VirusSca...

Page 32: ...sScan control panel to run at startup Other changes include New VShield system tray icon states tell you more about which VShield modules are active These states are All VShield modules are active The...

Page 33: ...e Even with the majority of the virus definitions it requires now incorporated directly into its engine in generic routines VirusScan software still requires regular DAT file updates to keep pace with...

Page 34: ...About VirusScan Software 34 McAfee VirusScan Anti Virus Software...

Page 35: ...ped with A processor equivalent to at least an Intel Pentium class or compatible processor McAfee recommends an Intel Pentium processor or Celeron processor running at a minimum of 166 MHz A CD ROM dr...

Page 36: ...us on page 59 If your copy of VirusScan software came on a CD ROM insert that disc into your computer s CD ROM drive If you inserted a CD ROM you should see a VirusScan welcome image appear automatica...

Page 37: ...VirusScan software follow these steps 1 If your computer runs Windows NT Workstation v4 0 or Windows 2000 Professional log on to your system as Administrator You must have administrative rights to ins...

Page 38: ...ee Determining when you must restart your computer on page 54 When your computer restarts Setup will continue from where it left off The Setup welcome panel will appear Figure 2 2 Figure 2 2 Setup wel...

Page 39: ...3 If your computer runs Windows NT Workstation v4 0 or Windows 2000 Professional Setup will remove the previous VirusScan version but will not preserve any previous VShield scanner settings Figure 2 3...

Page 40: ...t compete for access to the same files or that perform critical operations can make your system very unstable If your computer runs Windows NT Workstation v4 0 or Windows 2000 Professional Setup next...

Page 41: ...configure and run their own scan operations with the VirusScan application and save settings for those operations in a VSC file but they cannot change default VirusScan application settings To learn m...

Page 42: ...tart a scan operation the VirusScan Console the VShield System Scan module the Alert Manager Client configuration utility the Send Virus utility the Emergency Disk utility the VirusScan Command Line s...

Page 43: ...al hard drive instead You can choose this option only if a component has related modules Remove a component from the installation Click beside a component name then choose This feature will not be ava...

Page 44: ...igure 2 8 Ready to Install panel 13 Click Install to begin copying files to your hard drive Otherwise click Back to change any of the Setup options you chose Setup first removes any previous VirusScan...

Page 45: ...ions for your installation You can choose to scan your system create an emergency disk or update your virus definition files before you start the VShield scanner and the VirusScan Console To do so sel...

Page 46: ...n start the utility at any time after installation Run Default Scan for Viruses after Installation This option is active by default The option tells Setup to finish the installation then to run the Vi...

Page 47: ...ect directly to the McAfee website and download the latest incremental DAT file updates Select this option if your company has not designated a location on your network as an update site and if you do...

Page 48: ...he AutoUpdate utility the Automatic Update dialog box will appear Choose your configuration options then click Update Now to start an immediate update operation or click OK to save the options you cho...

Page 49: ...d line scanner that can scan your hard disk boot sectors and Master Boot Record MBR BOOTSCAN EXE works with a specialized set of DAT files that focus on ferreting out boot sector viruses If you have a...

Page 50: ...choose Create Emergency Disk The Emergency Disk wizard welcome panel will appear Figure 2 13 Figure 2 13 Emergency Disk welcome panel 1 Click Next to continue The next wizard panel appears Figure 2 1...

Page 51: ...t If you chose to format your disk with the NAI OS the wizard displays an informational panel Figure 2 15 Figure 2 15 Emergency Disk informational panel Follow these substeps to continue a Insert an u...

Page 52: ...iles and support files to the floppy disk Skip to Step 3 on page 53 to continue If you do not have a virus free floppy disk formatted with DOS or Windows system files you must create one in order to u...

Page 53: ...area are both selected Next click Start Windows will format your floppy disk and copy the system files necessary to start your computer e Click Close when Windows has finished formatting your disk the...

Page 54: ...fe place NOTE A locked or write protected floppy disk shows two holes near the edge of the disk opposite the metal shutter If you don t see two holes look for a plastic sliding tab at one of the disk...

Page 55: ...ave Novell Client32 for NetWare installed then restart required Restart required Installation on computer with previous VirusScan version Restart required Restart required Installation on computer wit...

Page 56: ...the line from either of these sources be sure to delete any carriage returns or spaces 2 Save the file with the name EICAR COM The file size will be 69 or 70 bytes 3 Start your VirusScan software and...

Page 57: ...Software Setup will start and display the first Maintenance wizard panel Figure 2 20 Figure 2 20 First maintenance panel 4 Click Next to continue Setup displays the Program Maintenance wizard panel F...

Page 58: ...rom the one shown on page 43 It will not allow you to change your VirusScan program directory nor will it display disk usage statistics To install VirusScan software in a different directory or on a d...

Page 59: ...you expect but it will help eliminate one potential cause of your computer problems The safest course of action you can take is to install VirusScan software then scan your system immediately and tho...

Page 60: ...mergency Disk Creation utility on page 49 3 Wait at least 15 seconds then start your computer again NOTE If you have your computer s BIOS configured to look for its boot code first on your C drive you...

Page 61: ...t number are clean or uninfected How many files contain potential infections How many files of that number the scanner cleaned How many boot sector and MBR files the scanner examined How many boot sec...

Page 62: ...d scanning when you start or shut down your computer each day Use the VShield scanner to examine your computer s memory and maintain a constant level of vigilance between scan operations Under most ci...

Page 63: ...help when your problem really results from an interrupt conflict it does allow you to eliminate one possible cause With that knowledge you can then go on to troubleshoot your system with a full featur...

Page 64: ...am then shut the computer down and turn off the power Wait a few seconds before you start the computer again so that the system can clear the other program s code signature strings from memory You hav...

Page 65: ...esponses Responding when the System Scan module detects a virus How this module reacts when it finds a virus depends on which operating system your computer runs and on Windows 95 and Windows 98 syste...

Page 66: ...3 2 Full screen Warning System Scan response options This alert message brings your system to a complete halt as it awaits your response No other programs or system operations run on your system unti...

Page 67: ...ch files it flagged as infected You can then restore deleted files from backup copies Move the file to a different location Click Move File to in the dialog box This opens a browse window you can use...

Page 68: ...ause the virus has damaged the file beyond repair it will record the incident in its log file and suggest alternative responses In the example shown in Figure 3 3 the module failed to clean the EICAR...

Page 69: ...through similar channels In its initial configuration the module will prompt you to choose a response from among three options whenever it detects a virus Figure 3 4 A fourth option provides you with...

Page 70: ...s Internet sites In its initial configuration the module will ask you whenever it encounters a potentially harmful object whether you want to Deny the object access to your system or you want to Conti...

Page 71: ...its log file but it will take no other action to respond to the virus Right click each infected file listed in the main window then choose an individual response from the shortcut menu that appears C...

Page 72: ...get with the VShield E Mail Scan module The E Mail Scan module also offers the ability to clean infected file attachments or stop the scan operation a capability that complements the continuous monit...

Page 73: ...ged the file beyond repair it will record the incident in its log file and suggest alternative responses In the example shown in Figure 3 8 Clean is not an available response option In most cases you...

Page 74: ...s of payloads it deploys The site lists the most prevalent or riskiest viruses provides a search engine you can use to search for particular virus descriptions alphabetically or by virus name displays...

Page 75: ...ency DAT files current scan engine versions regular weekly DAT and SuperDAT updates and new incremental virus definition files UPD Beta and first look software Viewing file information If you right cl...

Page 76: ...endVirus utility to submit a file sample Because the majority of later generation viruses tend to infect document and executable files VirusScan software comes with SENDVIR EXE a utility that makes it...

Page 77: ...you about your submission enter your name e mail address and any message you would like to send along with your submission in the text boxes provided then click Next to continue NOTE You may submit sa...

Page 78: ...you want to submit click Next to continue The Choose Upload Options panel appears Figure 3 15 Figure 3 15 Choose Upload options panel If the file you want to submit is a Microsoft Office document or a...

Page 79: ...or respond in any way to you SENDVIR EXE will use the e mail client you specified to send your sample You must have connected to your network or ISP in order for this process to succeed Capturing boo...

Page 80: ...cro virus that has infected any of your Microsoft Word Excel or PowerPoint files send these files to McAfee anti virus researchers either with the SENDVIR EXE utility via e mail as floppy disk images...

Page 81: ...you have a boot virus you must use RWFLOPPY to send your samples electronically otherwise you must send your samples physically on a diskette If you send them electronically without using RWFLOPPY th...

Page 82: ...age Sending samples via e mail Once you ve made disk images or created a file archive for your samples send them to McAfee researchers at one of these e mail addresses In your message include this inf...

Page 83: ...AVERT cannot return it to you AVERT does not accept or process Iomega Ditto or Jazz cartridges Iomega Zip disks or other types of removable media In the United States Network Associates Inc Virus Res...

Page 84: ...Removing Infections From Your System 84 McAfee VirusScan Anti Virus Software...

Page 85: ...you start your computer and stays in memory until you shut it or your system down The scanner also includes optional features that guard against hostile Java applets and ActiveX controls and that kee...

Page 86: ...ion for the remaining VShield modules You can protect any or all individual module property pages and set a password to prevent unauthorized changes NOTE Because the VShield scanner runs continuously...

Page 87: ...ient applications This allows the scanner to log on to and scan your e mail attachments for viruses before they ever reach your computer If you connect to the Internet or work on a network in any capa...

Page 88: ...enable the VShield scanner at that time If you agree the VShield scanner should load into memory immediately and begin working with a default set of options that give you basic anti virus protection I...

Page 89: ...ontrol panel on page 277 If your computer runs Windows 95 or Windows 98 the scanner loads in a way that mimics a Windows service on that platform This service is not visible in the Windows user interf...

Page 90: ...ule names shown without a check mark Module names that have a check mark beside them are active Those without a check mark are inactive If you use this method to enable a module it remains enabled unt...

Page 91: ...play the VShield shortcut menu point to Properties then choose System Scan to open the VShield Properties dialog box Figure 4 2 VShield Properties dialog box 2 For each module that you want to enable...

Page 92: ...load it from memory To run any tasks you have scheduled the Console must be active Understanding the VShield system tray icon states The VShield scanner displays four different icon states in the Wind...

Page 93: ...closely for viruses and malicious software The VShield configuration wizard can help you set up many of these options right away you can then tailor the program to work better in your environment as...

Page 94: ...as Microsoft Office files The System Scan module will also scan files stored on floppy disks whenever you read from or write to them or when you shut down your computer If it finds a virus the module...

Page 95: ...Internet but they usually do so through a gateway application run from the server The E Mail Scan module supports corporate e mail systems that fall into two general categories Lotus cc Mail Select t...

Page 96: ...wnload from the Internet select the Yes do scan my downloaded files for viruses checkbox then click Next to continue The module will look for viruses in those files most susceptible to infection and w...

Page 97: ...4 8 VShield configuration wizard summary panel 8 If the summary list accurately reflects your choices click Finish to save your changes and return to the VShield Properties dialog box Otherwise click...

Page 98: ...Figure 4 9 Figure 4 9 System Scan Properties dialog box Detection page Configuring the System Scan module The VShield System Scan module is at the heart of the VShield scanner It scans files that com...

Page 99: ...le susceptible to virus infection whether on your hard disk or on floppy disks and whether you read the file from or write the file to your hard disk The module will also examine compressed files by d...

Page 100: ...as outbound NOTE If you have network drives mapped to your computer from which you copy files or if other network users copy files from your computer McAfee strongly recommends that you have the VShie...

Page 101: ...s that viruses do not spread from compressed files but because the module uncompresses these files before it scans them choosing this option can lengthen the time it takes to scan a given set of files...

Page 102: ...eckbox 4 Choose VShield software management options These options let you control your interaction with the VShield scanner You can Disable the System Scan module at will Select the System Scan can be...

Page 103: ...w viruses based on their resemblance to similar viruses that the module already knows To do this the module looks for certain virus like characteristics in the files you ve asked it to scan The presen...

Page 104: ...h a sufficient number of these characteristics as potential viruses Enable macro and program file heuristics scanning Choose this option to have the module use both types of heuristics scanning McAfee...

Page 105: ...on which operating system your computer runs Follow these steps 1 Click the Action tab in the System Scan module to display the correct property page Figure 4 12 Figure 4 12 System Scan Properties dia...

Page 106: ...halt until you choose a response option GUI Click this button to see a standard graphical alert message that also offers a range of response options This range will not include Continue access As the...

Page 107: ...on computers that run Windows 95 or Windows 98 and only when you choose the BIOS prompt mode Move infected files automatically Choose this response to have the module move infected files to a quaranti...

Page 108: ...anges without closing the System Scan Properties dialog box click Apply To save your changes and close the dialog box click OK To close the dialog box without saving your changes click Cancel NOTE Cli...

Page 109: ...e the setting for this option only if you select Prompt for user action in the Action property page Otherwise the checkbox will display and use the setting it had when you last chose the Prompt for us...

Page 110: ...ote which settings you used to detect and respond to the infections the System Scan module found You can also use the incident reports recorded in the file to determine which files you need to replace...

Page 111: ...tem down You can choose to record any of this information Virus Detection Select this checkbox to have the log file record how many viruses the module finds during each scan session Clear the checkbox...

Page 112: ...close the dialog box click OK To close the dialog box without saving your changes click Cancel NOTE Clicking Cancel will not undo any changes you already saved by clicking Apply Choosing Exclusion op...

Page 113: ...ble to virus infection To choose your options follow these steps 1 Click the Exclusion tab in the System Scan module to display the correct property page Figure 4 16 Figure 4 16 System Scan Properties...

Page 114: ...ckbox c Select the File scanning checkbox to exclude the item you specified in the first step when the module looks for file infecting viruses These viruses usually appear in files stored in the visib...

Page 115: ...for viruses in earlier cc Mail versions This module can work with the Download Scan module to examine messages that arrive via POP 3 or SMTP e mail client programs such as Eudora Netscape Mail or Out...

Page 116: ...t yet logged into your e mail system the module will prompt you to choose a profile or enter account information as soon as a scan session starts even before you ve logged into your e mail account Thi...

Page 117: ...8 0 or later so that it uses the same protocol as earlier cc Mail versions To verify which system you use check with your network administrator NOTE You can select only one corporate e mail system at...

Page 118: ...e module checks once every minute Be sure to set an interval shorter than the interval you set to receive your e mail so that module has an opportunity to detect any viruses before they reach your com...

Page 119: ...ogram File Extensions dialog box See Adding file name extensions for scanning on page 287 and Current list of vulnerable file name extensions on page 288 to learn which file name extensions this modul...

Page 120: ...use Your choices are Enable macro heuristics scanning Choose this option to have the E Mail Scan module identify all Microsoft Word Microsoft Excel and other Microsoft Office files that contain embedd...

Page 121: ...it should do with the infected file or by taking an action that you determine ahead of time Use the Action property page to specify which response options you want the module to give you when it find...

Page 122: ...module to try to remove the virus code from the infected file If you have its reporting function enabled it will record a log event each time it successfully cleans or fails to clean an infected file...

Page 123: ...nable its reporting feature so that you have a record of which files the module deleted You will need to restore deleted files from backup copies See Choosing Report options on page 127 for details Co...

Page 124: ...ers Follow these steps 1 Click the Alert tab in the E mail Scan module to display the correct property page Figure 4 23 Figure 4 23 E mail Scan Properties dialog box Alert page 2 Select the Notify Ale...

Page 125: ...fections spread You can also choose to send a messages to any recipient without replying to the source of the infected attachment The E Mail Scan module can draw recipients directly from your Microsof...

Page 126: ...Whenever it detects a virus the module will send a copy of this message to each person who sends you e mail with an infected attachment It fills in the recipient s address with information found in th...

Page 127: ...anges click Cancel NOTE Clicking Cancel will not undo any changes you already saved by clicking Apply Choosing Report options The E mail Scan module lists its current settings and summarizes all of th...

Page 128: ...lect this checkbox the log file can grow to as large a size as your disk space or file system permits Enter a value between 10KB and 999KB By default the System Scan module limits the file size to 100...

Page 129: ...ow many infected files the module deleted How many infected files the module moved to a quarantine folder Your E Mail Scan module settings Clear the checkbox to leave this information out Virus Cleani...

Page 130: ...automatic actions in response You can have it report what it has done either with an alert message when it takes the action or in a log file you can examine at your leisure It can even send a message...

Page 131: ...select the Program files only button To see or designate the file name extensions that the Download Scan module will examine click Extensions to open the Program File Extensions dialog box Figure 4 1...

Page 132: ...resemblance to similar viruses that the module already knows To do this the module looks for certain virus like characteristics in the files you ve asked it to scan The presence of a sufficient numbe...

Page 133: ...t number of these characteristics as potential viruses Enable macro and program file heuristics scanning Choose this option to have the module use both types of heuristics scanning McAfee recommends t...

Page 134: ...in the Download Scan module to display the correct property page Figure 4 28 Figure 4 28 Download Scan Properties dialog box Action page 2 Choose a response from the When a virus is found list The ar...

Page 135: ...ave its reporting options enabled the module records the incident in its log file Move infected files to a folder Choose this response to have the module move infected files to a quarantine folder as...

Page 136: ...re it with the response options you want in the Action page you can let the Download Scan module look for and remove viruses from your system automatically as it finds them with almost no further inte...

Page 137: ...r user action in the Action property page Otherwise the checkbox will display and use the setting it had when you last chose the Prompt for user action item The module will sound the standard system w...

Page 138: ...can serve as an important management tool for you to track virus activity on your system and to note which settings you used to detect and respond to the infections the Download Scan module found You...

Page 139: ...ou can choose to record any of this information Virus Detection Select this checkbox to have the log file record how many viruses the module finds during each scan session Clear the checkbox to leave...

Page 140: ...t they exist Most browser software includes a feature that allows you to block Java applets or ActiveX controls altogether or to turn on security features that authenticate objects before downloading...

Page 141: ...lter checkbox is selected This activates the options in the rest of the property page 2 Specify which objects you want the Internet Filter module to examine Your options are ActiveX Controls Select th...

Page 142: ...ownload hostile Java or ActiveX objects to your machine as soon as you connect You can add other sites then password protect your settings to ensure that users do not delete them Each address consists...

Page 143: ...f you know the correct subnet mask value for the site you want to avoid Otherwise leave the default value shown c Click OK to return to the Banned IP addresses dialog box Select one of the items shown...

Page 144: ...ser to request the resource via the Hyper Text Transport Protocol http from a computer named www on a network domain named domain com Other transport protocols include ftp and gopher The Internet s Do...

Page 145: ...nd either by asking you whether it should block the object or site or by automatically blocking it Use the Action property page to specify which of these courses you want the module to take By default...

Page 146: ...og box without saving your changes click Cancel NOTE Clicking Cancel will not undo any changes you already saved by clicking Apply Choosing Alert options Once you configure it with the response option...

Page 147: ...e the setting for this option only if you select Prompt for user action in the Action property page Otherwise the checkbox will display and use the setting it had when you last chose the Prompt for us...

Page 148: ...t file for it to use You can then open and print the log file for later review from any text editor Use the Report property page to designate the file you want to serve as the Internet Filter log and...

Page 149: ...off 4 Click a different tab to change any of your Internet Filter settings or click one of the icons along the side of the Internet Filter Properties dialog box to choose options for a different modul...

Page 150: ...Enable password protection checkbox The options in the rest of the property page activate Figure 4 39 Figure 4 39 Security Properties dialog box Password page 2 Decide whether to protect the property...

Page 151: ...4 Click any of the other Security module tabs to protect individual property pages To save your password without closing the Security Properties dialog box click Apply If you chose to protect all pro...

Page 152: ...rity Properties dialog box System Scan page 2 Select the settings you want to protect in the list shown You may protect any or all of a module s property pages Protected property pages display a locke...

Page 153: ...lation Setup asks if you want to enable the VShield scanner at that time If you agree the VShield scanner should load into memory immediately and begin working with a default set of options that give...

Page 154: ...ntrol panel The VShield scanner will not stop or unload at this point but it will not start when you next start your computer Stopping the VShield scanner completely You can stop the VShield scanner c...

Page 155: ...k list then choose Disable from the Task menu the Console will stop the VShield scanner and all of its modules and unload them from memory The VShield icon will disappear from the Windows taskbar 3 Cl...

Page 156: ...l active VirusScan components will stop close all open windows or dialog boxes remove their icons from the Windows system tray and unload from memory 4 Click OK to close the control panel Disabling th...

Page 157: ...you enable the VShield icon will display a different state To learn what each icon state means see Understanding the VShield system tray icon states on page 92 Method 2 Use the System Scan Status dial...

Page 158: ...e checkbox at the top of each module page As you do so the scanner will disable that module and make all of the configuration options in that page unavailable Depending on which modules you disable th...

Page 159: ...s it scanned the number of infections it found and the number it moved or deleted Internet Filter This module reports the number of Java and ActiveX objects or Internet sites it has scanned and the nu...

Page 160: ...ield Task Properties dialog box 3 Click the tab that corresponds to the program component that you want to enable or disable or whose progress you want to check The status page will list the results o...

Page 161: ...s second method as on demand scanning The term on demand means that you as a user control when the application starts and ends a scan operation which targets it examines what it does when it finds a v...

Page 162: ...etect the virus until it deploys its payload The VirusScan application however can detect a virus as it lies in wait for an opportunity to run Viruses are sneaky Accidentally leaving a floppy disk in...

Page 163: ...ou choose depends on what sort of scan operation you want to run When you first start it the application window opens so that you can make changes to its configuration You must click Scan Now or Run N...

Page 164: ...your response reporting alerting and exclusion options in each tabbed property page To learn about Advanced options see Configuring the VirusScan Advanced interface on page 174 Next click the New Scan...

Page 165: ...tem with your left mouse button after your mouse cursor changes to You can see these same help topics if you right click an element in the VirusScan window then choose What s This from the menu that a...

Page 166: ...nt it to do when it finishes To set configuration options for the task click the Configure button at the bottom of the property page To learn about how to configure your scan task see Configuring Viru...

Page 167: ...d You can also change those settings on the fly before you run your scan task To do so either Follow Step Step 1 and Step 2 above to open the VirusScan application window then change your configuratio...

Page 168: ...y drives with DOS style names C or D for example and give complete path names for directories according to the conventions available for your operating system You may use long names on Windows NT Work...

Page 169: ...ou can start a scan operation with the options you ve chosen at any point simply click Scan Now To save your changes as default scan options choose Save As Default from the File menu or click New Scan...

Page 170: ...can targets whether they reside on your system or on other computers on your network You cannot select My Computer Network Neighborhood or multiple volumes as scan targets from VirusScan Classic to ch...

Page 171: ...ore safely narrow the scope of your scan operations to those files most susceptible to virus infection To do so click the Program files only button To see or designate the file name extensions the app...

Page 172: ...es to a quarantine folder as soon as it finds them By default the application moves these files to a folder named Infected located in the VirusScan program directory You can enter a different name in...

Page 173: ...to alert you when it finds a virus You can use the Report page to enable or disable this alert or to add an alert message to the Virus Found dialog box that appears when the application finds an infe...

Page 174: ...log file size select the Limit size of log file to checkbox then enter a value for the file size in kilobytes in the text box provided Enter a value between 10KB and 999KB By default VirusScan softwa...

Page 175: ...chosen from unauthorized changes choose Password Protect from the Tools menu to open the Password Protection dialog box To learn how to configure the settings for this dialog box see Enabling password...

Page 176: ...a scan target from the list provided Your choices are My Computer This tells the application to scan all drives physically attached to your computer or logically mapped via Windows Explorer to a driv...

Page 177: ...de subfolders checkbox to have the VirusScan application also look for viruses in any folders inside your scan target NOTE Choosing Include subfolders causes the application to scan only those files s...

Page 178: ...ns NOTE McAfee recommends that you choose this option for your first scan operation or periodically thereafter to ensure that your system is virus free You can then limit the scope of later scan opera...

Page 179: ...Select the types of heuristics scanning you want the VirusScan application to use Your choices are Enable macro heuristics scanning Choose this option to have the application identify all Microsoft Wo...

Page 180: ...roperty page to specify which response options you want VirusScan software to give you when it finds a virus or which actions you want it to take on its own Follow these steps 1 Click the Action tab i...

Page 181: ...er Move infected files automatically Choose this response to have the application move infected files to a quarantine folder By default the application moves these files to a folder named Infected loc...

Page 182: ...m with almost no further intervention To have the application tell you immediately when it finds a virus so that you can take appropriate action however configure it to send an alert message to you Fo...

Page 183: ...audible alert you can change the setting for this option only if you choose Prompt for user action in the Action property page If you do not choose that item in the Action page no alert box will appe...

Page 184: ...dvanced window to display the correct property page Figure 5 16 Figure 5 16 VirusScan Advanced Report page 2 Select the Log to file checkbox By default the VirusScan application writes log information...

Page 185: ...ation out of the log file Infected file move Select this checkbox to have the log file record how many viruses the application moves to a quarantine folder during each scan operation Clear this checkb...

Page 186: ...Once you scan your system thoroughly you can exclude the files and folders that do not change or that are not normally vulnerable to virus infection You can also rely on the VShield scanner to provid...

Page 187: ...t to exclude You can Add files folders or volumes to the exclusion list Click Add to open the Add Exclude Item dialog box Figure 5 18 Figure 5 18 Add Exclude Item dialog box Next follow these substeps...

Page 188: ...or in files that reside in your hard disk s boot sector or master boot record Use this option to exclude system files such as COMMAND COM from scan operations WARNING McAfee recommends that you do no...

Page 189: ...Advanced window to open the Password Protection dialog box Figure 5 19 Figure 5 19 Password Protection dialog box 2 Select the settings you want to protect in the list shown You may protect any or al...

Page 190: ...Using the VirusScan application 190 McAfee VirusScan Anti Virus Software...

Page 191: ...and view log files and copy and paste task definitions within the Console window For a complete overview of functions available from within the Console window see Using the Console window on page 194...

Page 192: ...you start your computer that scan all drives included in the My Computer group that scan your C drive and that update VirusScan software data files and program components You can enable any of the de...

Page 193: ...tomatically at startup by choosing Load at startup from the View menu the Console window initially shows a list of default tasks that come with the Console pre configured and ready to run A task is a...

Page 194: ...Console window then choose Properties from the Task menu or click in the Console toolbar A Task Properties dialog box will appear To learn how to schedule and enable a task see Enabling tasks on page...

Page 195: ...ion Library you must have an Internet connection and web browsing software available on your computer Open the online help file Choose Help Topics from the Help menu or click in the Console toolbar to...

Page 196: ...nsole window to the foreground Right clicking the icon displays a shortcut menu Quit VirusScan Console Choose Exit from the Task menu to quit the Console If you have any tasks pending you should minim...

Page 197: ...o download files internally You must also schedule and activate the task to get it to update your files In other respects this task closely resembles the AutoUpgrade task To learn how to schedule and...

Page 198: ...the Task Properties dialog box If the scanner is inactive this button will read Enable Open the VShield configuration property pages Click Configure to open the System Scan dialog box where you can c...

Page 199: ...g box To work with either task open the Console window then follow these steps 1 Double click the AutoUpgrade or the AutoUpdate task in the Console window The Task Properties dialog box will appear Fi...

Page 200: ...changes without closing the Task Properties dialog box then click the Schedule tab To learn how to set a task schedule see Enabling tasks on page 204 Click OK to save your changes and return to the Vi...

Page 201: ...Figure 6 5 Figure 6 5 Task Properties dialog box Program page 2 Type a name for the task in the Description text box Be sure that your name describes the task so that you can distinguish it from other...

Page 202: ...the task runs to see but not change the configuration options the task uses as it runs to see the results of the scan operation or to stop the operation at any time You can also choose any of the comm...

Page 203: ...Configure to set the properties for this task This opens the VirusScan Properties dialog box Here you can tell the VirusScan application where and what to look for during this scan operation how to re...

Page 204: ...onsole is active at the time you want your task to run To learn how to start the Console see Starting the VirusScan Console on page 192 To run a scan task that uses the VirusScan application you must...

Page 205: ...d Daily This runs your task once at the time you specify on the days you indicate Enter the time in the text box provided then select the checkboxes in the Start At area for each day that you want the...

Page 206: ...a time window of one hour the task would run at any point in the period between 14 30 and 15 30 You may set a window of up to 480 minutes or eight hours 6 You have now set a schedule for your task an...

Page 207: ...operation this task conducted and the name of the last file it scanned To see a short description of each of the items that appears in this page right click a figure or label then choose What s This f...

Page 208: ...ruses whether you want to protect the settings you chose from unauthorized changes The VirusScan Console provides a series of property pages you can use to define your task These property pages replic...

Page 209: ...dialog box Figure 6 9 Figure 6 9 Add Scan Item dialog box To scan your entire computer or a subset of the drives on your system or your network click the Select item to scan button then a Choose a sca...

Page 210: ...b Select the Include subfolders checkbox to have the VirusScan application look for viruses in any folders inside your scan target NOTE Choosing Include subfolders causes the application to scan only...

Page 211: ...McAfee recommends that you choose this option for your first scan operation or periodically thereafter to ensure that your system is virus free You can then limit the scope of later scan operations Ch...

Page 212: ...stics scanning you want the VirusScan application to use Your choices are Enable macro heuristics scanning Choose this option to have the application identify all Microsoft Word Microsoft Excel and ot...

Page 213: ...n tab to choose additional VirusScan options To save your changes without closing the VirusScan Properties dialog box click Apply To save your changes and return to the Console window click OK To retu...

Page 214: ...s an option button to appear in an alert message that the application displays when it finds a virus Selecting Delete file here for example causes a Delete button to appear in the alert message To lea...

Page 215: ...pplication to remove the virus code from the infected file as soon as it finds it If the application cannot remove the virus it will note the incident in its log file Delete infected files automatical...

Page 216: ...the task list then click in the Console toolbar 2 The VirusScan Properties dialog box appears see Figure 6 8 on page 208 Click the Alert tab to display the correct property page Figure 6 13 Figure 6...

Page 217: ...n infected file As with the audible alert you can change the setting for this option only if you choose Prompt for user action in the Action property page If you do not choose that item in the Action...

Page 218: ...data the application will record and how large the log file can get follow these steps 1 To start from the Console window select the task you created in the task list then click in the Console toolba...

Page 219: ...ct this checkbox to have the log file record how many infected files the application cleans or tries to clean during each scan operation Clear this checkbox to leave this information out of the log fi...

Page 220: ...NOTE Clicking Cancel will not undo any changes you already saved by clicking Apply Choosing Exclusion options Many of the files stored on your computer are not vulnerable to virus infection Scan opera...

Page 221: ...ximum number of exclude items text box To learn more about how to use the VirusScan control panel see Understanding the VirusScan control panel on page 277 To exclude files or folders from scan operat...

Page 222: ...ubfolders themselves The application will still scan files stored at the root level of the folder you designate To exclude the files at the folder root level clear the Include subfolders checkbox c Se...

Page 223: ...VirusScan software lets you set a password to protect the settings you choose in each property page from unauthorized changes This feature is particularly useful for system administrators who need to...

Page 224: ...ection from a property page click the locked padlock icon to unlock it 4 Click Password to open the Specify Password dialog box Figure 6 18 Figure 6 18 Specify Password dialog box a Enter a password i...

Page 225: ...settings To save your changes without closing the VirusScan Properties dialog box click Apply To save your changes and return to the Console window click OK To return to the Console window without sa...

Page 226: ...Creating and Configuring Scheduled Tasks 226 McAfee VirusScan Anti Virus Software...

Page 227: ...eleases new DAT files weekly to provide protection against the approximately 300 new viruses that appear each month With this VirusScan release McAfee has introduced a new incremental DAT or iDAT tech...

Page 228: ...Update utility on page 230 and Understanding the AutoUpgrade utility on page 240 Incremental DAT file updates The new McAfee iDAT technology works transparently with the included AutoUpdate version Th...

Page 229: ...tware A DAT package consists of an archived ZIP file named DAT XXXX ZIP The XXXX in the file name is a series number that changes with each DAT file release McAfee does not recommend this method to up...

Page 230: ...le To use it to update your VirusScan software you must Set a schedule for the AutoUpdate task and enable it to run Set a password to protect your configuration settings if you wish Configure the task...

Page 231: ...s Keeping update traffic primarily internal can also reduce the potential for network security breaches Reduce the likelihood that you will need to wait to download new DAT files Traffic on McAfee ser...

Page 232: ...rade and AutoUpdate tasks on page 199 To learn how to set a schedule for the task see Enabling tasks on page 204 2 Click Configure The Automatic Update dialog box appears with the Update Sites propert...

Page 233: ...ions on page 235 Figure 7 2 Automatic Update Properties dialog box Update Options page Change definitions for an existing update site Select a site shown in the update site list then click Edit to ope...

Page 234: ...s not find new DAT files it will connect to each of the other sites listed until it finds the most current DAT files available If you have the Force Update option selected AutoUpdate will download any...

Page 235: ...ons stop it When the file reaches the maximum size you set the AutoUpdate utility first clears it then starts the log again from where it left off To see the contents of the log file from VirusScan Co...

Page 236: ...onfiguration to look for new files on your local computer or on a computer elsewhere on your network Your network settings will govern how the utility attempts the connection and how long it waits bef...

Page 237: ...onnect to a site set for anonymous FTP login or you must designate the user name and password for an account on the site To have the utility use an anonymous login select the Use anonymous FTP login c...

Page 238: ...AutoUpdate utility rename existing VirusScan DAT files before it installs new files To rename each file the utility appends the extension SAV to the existing file name and extension CLEAN DAT for exa...

Page 239: ...twork Associates recommends that you use this option with extreme caution If you have configured your AutoUpdate task to connect to a server that stores older DAT file versions you can reduce the effe...

Page 240: ...nd file name for the program you want to run or click Browse to locate the program on your hard disk 3 To save your changes and return to the Automatic Update dialog box click OK To close the dialog b...

Page 241: ...ecify one convenient update time when you first deploy VirusScan software but set the AutoUpgrade utility to trigger at a random interval within 60 minutes of that time or set a schedule that phases i...

Page 242: ...this task To display the Automatic Upgrade dialog box follow these steps 1 Double click the AutoUpgrade task in the Console task list to open its Task Properties dialog box Figure 7 6 Figure 7 6 Auto...

Page 243: ...ether or not the AutoUpgrade utility can connect with the site You will not see any sites listed initially because the AutoUpgrade utility does not come configured to connect to any upgrade site You m...

Page 244: ...7 8 Make the changes you want to make then click OK to save them and return to this dialog box To see descriptions and instructions for configuring the available options see Configuring upgrade optio...

Page 245: ...7 9 Automatic Upgrade dialog box Log Activity page 5 Select the Log activity into the Activity Log File checkbox By default the AutoUpgrade utility records what happens during update attempts and save...

Page 246: ...Click OK to save your changes and close the Automatic Upgrade dialog box Click Cancel to close the dialog box without saving your changes Configuring upgrade options To create a new update site or ch...

Page 247: ...stops the connection attempt Next use Universal Naming Convention UNC notation to enter the path to the computer that holds the new files you want to download in the text box labeled Select a Computer...

Page 248: ...elect the Use anonymous FTP login checkbox To specify an account clear the Use anonymous FTP login checkbox then click FTP login information to enter a user name and password for an account that has a...

Page 249: ...also selects the Save the Upgrade files for later usage checkbox To tell AutoUpgrade where to save the program file archive enter a path and folder name in the text box below this checkbox or click B...

Page 250: ...the XXXX refers to the SuperDAT version number included as part of the file name 2 Download the file AUTOUPG ZIP which you will find on the Network Associates FTP site in this location ftp username p...

Page 251: ...t the target computer if it must do so in order to finish updating or upgrading your anti virus software If you do not want the target computer to restart after it updates your files set the value of...

Page 252: ...pies on your workstation computers to download new files from the share you created on that central server The AutoUpgrade utilities will download and install the new files from this package To learn...

Page 253: ...as VBS BUBBLEBOY demonstrated might even be able to work without users having to open or read even the e mail message itself The Microsoft Exchange and Outlook e mail clients are particularly vulnerab...

Page 254: ...n catch infections before they spread or do any harm Using the E Mail Scan extension To use the E Mail Scan Extension you must install VirusScan software with a Custom installation and choose the E Ma...

Page 255: ...finds an infected file the E Mail Scan extension will ask you how to respond to the virus See Responding when the E Mail Scan extension detects a virus on page 72 for details Configuring the E Mail Sc...

Page 256: ...ft Exchange or Outlook client and log in to your e mail server NOTE If you have already logged into the network domain that hosts your e mail server you might not need to log into to your e mail serve...

Page 257: ...their own regular scan operations unless you specifically exclude them To change these settings follow these steps 1 Choose which e mail messages you want the E Mail Scan extension to examine for viru...

Page 258: ...list of compressed files scanned on page 292 Scan all files Select the All Files checkbox to have the E Mail Scan extension scan all file types in your mailbox whatever their file name extensions NOT...

Page 259: ...you want the E Mail Scan extension to use Your choices are Enable macro heuristics scanning Choose this option to have the extension identify all Microsoft Word Microsoft Excel and other Microsoft Off...

Page 260: ...extension detects a virus it can respond either by asking you what it should do with the infected file or by automatically taking an action that you determine ahead of time Use the Action property pag...

Page 261: ...o a quarantine folder The alert message will display a Move file to button that allows you to send the infected item to a quarantine folder on your Microsoft Exchange server You can move infected item...

Page 262: ...e names of infected files so that you can delete them at your next opportunity WARNING The E mail Scan extension will not try to break any encrypted messages to scan them If an infected attachment inc...

Page 263: ...o set up the Alert Manager Client Configuration utility See Using the Alert Manager Client Configuration utility on page 281 for details You can pass alert messages directly to an Alert Manager server...

Page 264: ...tension will not give you an opportunity to edit the message before it sends it You may send one message to reply to the source of the infected message and a different message to other recipients but...

Page 265: ...p d above In this case however you can fill out both the To and the Cc text boxes Whenever it detects a virus the E Mail Scan extension sends a copy of this message to all of the addresses that you en...

Page 266: ...AILSCAN TXT You can have E Mail Scan write its log to this file or you can use any text editor to create a text file for E Mail Scan to use You can then open and print the log file for later review fr...

Page 267: ...ccess Error message when it detects a virus 3 To minimize the log file size select the Limit size of log file to checkbox then enter a value for the file size in kilobytes in the text box provided If...

Page 268: ...w many files the extension examined How many infected files the extension cleaned How many infected files the extension deleted How many infected files the extension moved to a quarantine folder Your...

Page 269: ...it can get access to your cc Mail server and scan your Inbox Enter your cc Mail user name and password just as if you were logging directly into cc Mail then click OK to continue Next start your cc Ma...

Page 270: ...ws taskbar point to Settings then choose Control Panel 2 Locate and double click the Display control panel in the window that appears in order to open the Display Properties dialog box Next click the...

Page 271: ...o the folder you want scanned or click Browse to locate the scan target on your computer All fixed drives This tells the utility to scan hard disks physically connected to your computer When you ve ch...

Page 272: ...specified whatever their extensions NOTE McAfee recommends that you choose this option for your first scan operation or periodically thereafter to ensure that your system is virus free You can then l...

Page 273: ...teps a Select the Enable heuristics scanning checkbox The remaining options in the dialog box activate b Select the types of heuristics scanning you want the ScreenScan utility to use Your choices are...

Page 274: ...eft off If you do not select this checkbox the utility will begin its scan operation again from the root level of the first drive you specified as a scan target each time your screen saver starts to r...

Page 275: ...ut your system down If you would prefer to log this data to a different text file enter its path and filename in the text box provided or click Browse to locate the file The ScreenScan utility will no...

Page 276: ...Using Specialized Scanning Tools 276 McAfee VirusScan Anti Virus Software...

Page 277: ...iling for the number of scan targets the VirusScan application can examine or exclude during a scan session limit the number of scan tasks that you can create configure and run from the VirusScan Cons...

Page 278: ...ad into memory the Console and the VShield scanner normally are inactive this button will read Start Click it to reload inactive VirusScan components You can also restart the VirusScan application and...

Page 279: ...Figure 9 2 VirusScan control panel Components page 5 To have the VShield scanner load when you start your computer select the Load VShield on startup checkbox This same setting appears in the System S...

Page 280: ...ve the VirusScan Console start as soon as you start your computer The Console must be running in order to execute any tasks you have scheduled including scan tasks AutoUpgrade tasks and AutoUpdate tas...

Page 281: ...need a method to collect and manage alert messages from all over the network in a central repository so that you can respond whenever any workstation detects an infected file McAfee provides Alert Ma...

Page 282: ...tor software to tie alert messages into the Network Associates Magic HelpDesk application for trouble ticket generation and other features Alert Manager messages also contain much richer data than do...

Page 283: ...Configuration The Alert Manager Client Configuration page appears Figure 9 3 2 Figure 9 3 Alert Manager Client Configuration dialog box 2 Verify that the Disable Alerting checkbox is clear This activ...

Page 284: ...enter just the computer name The Alert Manager Client Configuration utility will validate the form of the name you enter here but will not verify that the Alert Manager server exists on the target com...

Page 285: ...en a destination click OK to close the dialog box You can designate any directory on your network as a destination for Centralized Alerting messages but the directory must contain a copy of the file C...

Page 286: ...oftware running somewhere on your network VirusScan software comes packaged with a Management Information File AMG MIF that identifies VirusScan alerting attributes to your DMI client application The...

Page 287: ...shown in the Program Extensions dialog box follow these steps 1 Click Extensions in the Detection property page for whichever VirusScan component you are configuring 2 The Program File Extensions dial...

Page 288: ...ee recommends that you scan your system thoroughly during your first scan operation or periodically thereafter without limiting the scope of the scan operation to these file types This ensures that yo...

Page 289: ...m Executable files Most software uses this extension to identify files that start its command shell or program kernel GMS Macro Corel Global Macro Storage files GZ Compressed UNIX GNU Gzip compressed...

Page 290: ...are in their own right OLE Program Microsoft Object Linking and Embedding object files These files are similar to ActiveX controls They are files created in one application to be embedded in another a...

Page 291: ...es Later Visio versions include infectable scripting extensions VXD Program Windows virtual device drivers These are executable fiels that often reside in memory WBK Macro Microsoft Word backup files...

Page 292: ...marizes how each VirusScan component treats each file type Table 9 1 Compressed file and archive scanning treatment VirusScan component Archived file Compressed file VirusScan application Select the C...

Page 293: ...if listed in Program Extensions dialog box Scans compressed file if listed in Program Extensions dialog box TD0 Teledisk compressed file Scans compressed file if listed in Program Extensions dialog bo...

Page 294: ...rchive Scans files within archive Scans archive as a file if listed in the Program Extensions dialog box Will not scan files within archive TAR UNIX tape archive file Scans archive Scans files within...

Page 295: ...ort under the Network Associates Corporate PrimeSupport program If you are a home user you can choose a plan geared toward your needs from the Home User PrimeSupport program PrimeSupport options for c...

Page 296: ...lan The PrimeSupport Connect plan gives you telephone access to essential product assistance from experienced technical support staff members With this plan you get In North America unlimited toll fre...

Page 297: ...nlimited telephone access to technical support at standard long distance or international rates Monday through Friday from 9 00 a m to 5 00 p m Central Time Priority access to technical support staff...

Page 298: ...at intervals you designate Committed response times from your support engineer who will respond to pages within half an hour to voice mail within one hour and to e mail within four hours Assignable c...

Page 299: ...pe Middle East Africa 9am 6pm local time Asia Pacific 8 a m 6 p m AEST Latin America 9 a m 5 p m CT Monday Friday after hours emergency access North America 8 a m 8 p m CT Europe Middle East Africa 9a...

Page 300: ...et download upgrade login asp Free 24 hour per day seven days per week access to online or electronic support through the Network Associates voice and fax system the Network Associates website and thr...

Page 301: ...iness hours Monday through Friday from 7 00 a m to 6 00 p m Pacific Time You call a toll free number use a credit card to take care of the transaction and get transferred to the technical support team...

Page 302: ...lan Pay Per Incident Plan Pay Per Minute Plan Online Upgrades Plan or Quarterly Disk CD Plan for your Network Associates products In North America call Network Associates Customer Service at 972 855 7...

Page 303: ...network performance Network Associates consultants also develop and deliver custom solutions to help accomplish your project goals from lengthy large scale implementations to brief problem solving as...

Page 304: ...p_set services introduction default asp Total Education Services Network Associates Total Education Services builds and enhances the skills of all network professionals through practical hands on inst...

Page 305: ...re a corporate customer you must first have a grant number or product serial number to subscribe to the Enterprise SecureCast channel If you do not have a grant number please contact your purchasing a...

Page 306: ...ion properly with newer scan engines When the older scan engine version becomes obsolete Network Associates will discontinue development of DAT files for it You should upgrade your software before you...

Page 307: ...indows 98 Windows NT or Windows 2000 At least 10MB free hard disk space plus sufficient space for product and other downloads An active Internet connection direct or dial up for a minimum of one hour...

Page 308: ...ackWeb client welcome panel 3 Read the instructions and warnings on this panel then click Next to continue 4 The BackWeb license agreement appears Figure C 2 Figure C 2 BackWeb Software License Agreem...

Page 309: ...ion for Setup to install the client software if you wish or click Browse to locate a suitable folder Click Next to continue Setup will begin to copy BackWeb program files to your computer As it does s...

Page 310: ...el appears Figure C 5 Figure C 5 Communication Method panel 9 Choose a communication method Your choices are HTTP Choose this option if you can connect directly to the Internet without going through a...

Page 311: ...server in the Proxy text box then enter the port the server uses for communication in the Port text box When you have finished click Next to continue The Proxy Authentication panel appears Figure C 7...

Page 312: ...n Phase 2 Register with the Enterprise SecureCast service After you install the BackWeb client and start it the SecureCast service immediately opens the client application and sends its first InfoPak...

Page 313: ...Cast service site or your site the window might not list any InfoPaks In that case minimize or close the BackWeb window After some time you will receive a Flash message Click the flashing message then...

Page 314: ...the grant number you received when you purchased your software or that you received from Network Associates Customer Service NOTE If your company is not a subsidiary of another company clear the Subsi...

Page 315: ...work requires you to connect to the Internet through a proxy server select the Use HTTP proxy at address checkbox then enter the server name or its Internet Protocol IP address in the text box provide...

Page 316: ...ill connect to the Network Associates SecureCast service electronic customer care page If you are a corporate user the window resembles the one shown in Figure C 16 Figure C 16 SecureCast Electronic C...

Page 317: ...from the SecureCast service You can stop the SecureCast service from delivering InfoPaks at any time you want to To do so right click the BackWeb icon in your Windows system tray then choose Start Se...

Page 318: ...rvice to Get New Data Files 318 McAfee VirusScan Anti Virus Software BackWeb client For a comprehensive guide to BackWeb including additional troubleshooting advice see the online BackWeb User s Manua...

Page 319: ...uch faster and at a far lower cost in bandwidth than ever before Better still the AutoUpdate utility makes this process completely transparent it will download as many incremental DAT files as it need...

Page 320: ...ld extract and install all of the virus definition files it needed to bring your existing DAT files up to date The utility finds the information it needs to determine which packages to download in the...

Page 321: ...e the iDAT files patch the existing DAT files you may not download the iDAT files through the AutoUpdate utility and use the utility to save them for later updates You can download the UPD packages in...

Page 322: ...s brings your network to a workable baseline state You can then download and install iDAT files to keep current 2 From the baseline state use a web browser or FTP client software each week to download...

Page 323: ...ers are off or if they do not have the VirusScan Console running the AutoUpdate utility will resume its scheduled task when you next start the computer or the VirusScan Console To learn how to use thi...

Page 324: ...than 15 weeks out of date After that point it becomes more efficient to download a full DAT file set Network configuration issues Q Do all the machines I want to update need to be able to connect to t...

Page 325: ...nderstanding and using 281 to 282 alert messages audible sounding 174 alert mode BIOS 106 alert options choosing for VirusScan in Console 216 to 217 in Download Scan module 136 to 137 in E mail Scan m...

Page 326: ...systems 106 possible VirusScan conflicts with anti virus features of 64 boot blocks scanning 213 BOOTSCAN EXE use of on Emergency Disk 60 boot sector viruses definition and behavior of ix to x Brain v...

Page 327: ...sks in 194 208 to 225 copying and pasting tasks in 194 creating new tasks in 194 200 204 default scan tasks included with 196 definition of scan task in 193 deleting tasks from 194 detection options f...

Page 328: ...ts 27 to 31 Desktop Management Interface DMI alerts use of with Alert Manager server 286 detection options adding scan targets 170 176 to 178 209 to 272 adding scan targets in ScreenScan 270 to 271 ch...

Page 329: ...to test installation 55 electronic services contacting for technical support 300 e mail addresses for reporting new viruses to McAfee xix as agent for virus transmission xii client software choosing i...

Page 330: ...stic scanning options for 103 to 104 119 132 to 133 178 to 180 211 258 272 files choosing as scan targets 170 176 to 178 209 to 211 258 to 260 270 to 272 infected cleaning 105 to 108 122 to 123 134 13...

Page 331: ...log file 111 128 139 removing viruses from 59 to 73 use of quarantine folder to isolate 107 122 135 installation aborting if virus detected during 59 testing effectiveness of 55 Internet e mail client...

Page 332: ...ostile objects and viruses xiii Java classes as xiii to xiv payload ix script viruses as xiv spread via World Wide Web xii to xiv types Trojan horses ix worms viii MAPI Messaging Application Programmi...

Page 333: ...ii Olympus scan engine what it is 227 online help opening from the Console 195 opening from VirusScan Classic and VirusScan Advanced 165 options Download Scan module configuring 130 to 140 E mail Scan...

Page 334: ...99 KnowledgeCenter 295 ordering 298 PrimeSupport Connect 296 PrimeSupport Enterprise 297 PrimeSupport Prioity 297 for home users Online Upgrades plan 301 ordering 302 Pay Per Minute plan 301 Quarterly...

Page 335: ...8 report options choosing for VirusScan in Console 217 to 220 in Download Scan module 138 to 140 in E mail Scan module 127 to 129 in Internet Filter module 148 to 149 in System Scan module 110 to 112...

Page 336: ...196 definition of 193 deleting 194 detection options choosing for VirusScan in Console 209 configuring in VirusScan Advanced 175 to 180 disabling 195 entering schedule times for 206 excluding items fr...

Page 337: ...152 security options choosing for VirusScan Advanced 189 choosing for VirusScan in Console 223 to 225 Select 194 session settings recorded in log file 111 128 139 session summary recorded in log file...

Page 338: ...lability 300 resources for SecureCast 317 via electronic services 300 system crashes attributing to viruses 59 system files as agents for virus transmission x system requirements for VirusScan 35 Secu...

Page 339: ...intervals available for 205 scheduling and enabling 194 204 to 206 security options configuring 189 223 to 225 starting 195 automatically 213 need for Console to be running 206 status checking 206 to...

Page 340: ...nfected computer use of to create Emergency Disk 60 Universal Naming Convention UNC notation use of to designate update and upgrade sites 236 247 UPD files description and use of 320 update and upgrad...

Page 341: ...80 211 258 272 mutating definition of xi origins of vii to xiv payload ix polymorphic definition of xi programs similar to Trojan horses ix worms viii recognizing when computer problems do not result...

Page 342: ...to 225 Where What 169 to 171 report options choosing in Console 217 to 220 configuring in VirusScan Advanced 183 to 186 security options choosing in Console 223 to 225 updating via AutoUpdate 230 to 2...

Page 343: ...responses to virus detection 65 to 70 disabling and enabling 153 to 158 Download Scan module configuring 130 to 140 default response options for 69 to 70 E mail Scan module configuring 115 to 129 def...

Page 344: ...t options choosing in VirusScan Classic 169 to 171 why worry about viruses vii to viii window elements in VirusScan Console 193 Wizard button in VShield Properties dialog box 93 Word files as agents f...

Reviews: