background image

Using the SecureCast Service to Get New Data Files

178

McAfee VirusScan Anti-Virus Software

The Setup Complete

 

panel appears (

Figure D-8

).

Figure D-8. Setup Complete panel

13. To start immediately, leave both checkboxes selected in this panel, then 

click 

Finish

 to complete your installation.

Phase 2: Register with the Enterprise SecureCast service

After you install the BackWeb client and start it, the SecureCast service 
immediately opens the client application and sends its first InfoPak: the 
SecureCast registration forms (

Figure D-9

).

Figure D-9. The Enterprise SecureCast client window

InfoPaks 
downloaded 
to your 
system 
appear here.

SecureCast

Flash Banner

SecureCast

channels to

which you

subscribe

appear here.

Choose

which

service

information

you want to

see in this

area.

Summary of Contents for VIRUSSCAN 4.5 -

Page 1: ...McAfee VirusScan Administrator s Guide Version 4 5...

Page 2: ...retty Good Privacy PrimeSupport RecoverKey RecoverKey International ReportMagic RingFence Router PM Safe Sound SalesMagic SecureCast Service Level Manager ServiceMagic Site Meter Sniffer SniffMaster S...

Page 3: ...tems for anti virus data file updates xvii International contact information xviii Chapter 1 About VirusScan Software 21 Introducing VirusScan anti virus software 21 How does VirusScan software work 2...

Page 4: ...on t have a virus 75 Understanding false detections 76 Responding to viruses or malicious software 77 Submitting a virus sample 88 Using the SendVirus utility to submit a file sample 88 Capturing boot...

Page 5: ...panel files 147 ScreenScan 148 VirusScan Emergency Disk files 150 Dependent and related files for the E Mail Scan extension 152 Appendix C Using VirusScan Command line Options 155 Adding advanced Viru...

Page 6: ...Support options for home users 190 How to reach international home user support 192 Ordering a PrimeSupport plan for home users 192 Network Associates consulting and training 193 Professional Services...

Page 7: ...authenticity availability and non repudiation of information and information processing systems Virus payloads had always threatened or damaged data integrity but by the time she wrote her survey art...

Page 8: ...H Spacefiller infection Throughout much of 1999 virus and worm attacks suddenly stepped up in intensity and in the public eye Part of the reason for this of course is that many of the more notorious v...

Page 9: ...W32 FunLove 4099 which infected ActiveX OCX files among others This meant that it could lurk on web pages with ActiveX content and infect systems with low or nonexistent browser security settings as t...

Page 10: ...tial customer lists secure credit card data and purchase verification reliable communications and hundreds of other computer aided transactional details The costs from these virus attacks in the digit...

Page 11: ...s armor Desktop workstations for example can spread viruses by any of a variety of means via floppy disks by downloading them from the Internet by mapping server shares or other workstations hard disk...

Page 12: ...bsites waiting to deploy sophisticated virus like payloads The Internet Filter module can even block entire websites preventing network users from visiting sites that pose a threat to network integrit...

Page 13: ...McAfee anti virus research Even the best anti virus software is only as good as its latest update Because as many as 200 to 300 viruses and variants appear each month the DAT files that enable McAfee...

Page 14: ...curity solutions including the PGP data security and encryption product line the Gauntlet firewall product line the WebShield E ppliance hardware line and the CyberCop Scanner and Monitor product seri...

Page 15: ...ormation If you do not find what you need or do not have web access try one of our automated services If the automated services do not have the answers you need contact Network Associates at one of th...

Page 16: ...ad support To get help with navigating or downloading files from the Network Associates or McAfee websites or FTP sites call Network Associates training For information about scheduling on site traini...

Page 17: ...ions or virus samples to To report items to the McAfee European research office use these e mail addresses To report items to the McAfee Asia Pacific research office or the office in Japan use one of...

Page 18: ...elgique Phone 0032 2 478 10 29 Fax 0032 2 478 66 21 Network Associates do Brasil Rua Geraldo Flausino Gomez 78 Cj 51 Brooklin Novo S o Paulo SP 04575 060 Brasil Phone 55 11 5505 1009 Fax 55 11 5505 10...

Page 19: ...Palazzo D 1 Via Brescia 28 20063 Cernusco sul Naviglio MI Italy Phone 39 02 92 65 01 Fax 39 02 92 14 16 44 Network Associates Japan Inc Toranomon 33 Mori Bldg 3 8 21 Toranomon Minato Ku Tokyo 105 0001...

Page 20: ...65 220 7255 Network Associates Spain Orense 4 4a Planta Edificio Trieste 28020 Madrid Spain Phone 34 9141 88 500 Fax 34 9155 61 404 Network Associates Sweden Datav gen 3A Box 596 S 175 26 J rf lla Swe...

Page 21: ...e reductions in revenue as more businesses move into e commerce and online sales and as virus attacks proliferate VirusScan software first honed its technological edge as one of a handful of pioneerin...

Page 22: ...e sun coverage from its Anti Virus Emergency Response Team AVERT Even with the rise of viruses and worms that use e mail to spread that flood e mail servers or that infect groupware products and file...

Page 23: ...for virus code it can instead sample the file at well defined points to look for virus code signatures that indicate an infection The development environment brings as much speed to DAT file construc...

Page 24: ...macro virus or a file infecting virus ViruLogic looks for virus like behaviors in program functions such as covert file modifications background calls or invocations of e mail clients and other metho...

Page 25: ...hly recursive and very large compressed archive files in an attempt to tie up the scanner as it digs through the file looking for infections VirusScan software accurately scans the majority of popular...

Page 26: ...ce MAPI standard and that block access to dangerous Internet sites Secure password protection for your configuration options prevents others from making unauthorized changes The same convenient dialog...

Page 27: ...the other scanners SCANPM EXE a scanner for 16 and 32 bit environments This scanner provides you with a full set of scanning options for 16 and 32 bit protected mode DOS environments It also includes...

Page 28: ...s Guide describes in detail how to use VirusScan and includes other information useful as background or as advanced configuration options Acrobat PDF files are flexible online documents that contain...

Page 29: ...l advantage of each platform s strengths The next sections discuss other changes that this VirusScan release introduces Installation and distribution features McAfee anti virus products including Viru...

Page 30: ...sScan control panel to run at startup Other changes include New VShield system tray icon states tell you more about which VShield modules are active These states are All VShield modules are active The...

Page 31: ...ftware Even with the majority of the virus definitions it requires now incorporated directly into its engine in generic routines VirusScan software still requires regular DAT file updates to keep pace...

Page 32: ...About VirusScan Software 32 McAfee VirusScan Anti Virus Software...

Page 33: ...rivileges for the workstation on which you plan to install the program Review the items shown in System requirements to determine whether your target workstations can run VirusScan software System req...

Page 34: ...VirusScan software came on a CD ROM insert that disc into your computer s CD ROM drive If you inserted a CD ROM you should see a VirusScan welcome image appear automatically To install VirusScan soft...

Page 35: ...tion Setup first asks you whether it should check to see whether you have previous VirusScan versions installed on your computer Figure 2 2 Figure 2 2 Previous versions dialog box 4 Click Yes to conti...

Page 36: ...Click Restart System If Setup removed a previous VirusScan version from your system Setup will also ask you to restart your computer For a list of circumstances in which Setup or system upgrades requ...

Page 37: ...pe panel see Figure 2 6 on page 39 or Figure 2 7 on page 40 Skip to Step 9 on page 39 to continue If your computer runs Windows 95 or Windows 98 Setup also gives you the option to preserve the VShield...

Page 38: ...low it to remove the software The uninstallation utility might tell you that you need to restart your computer to completely remove the other software You do not need to do so to continue with your Vi...

Page 39: ...Type panel 9 Select the security mode you prefer Your choices are Use Maximum Security Select this option to require users to have Administrator rights to your computer in order to change any configu...

Page 40: ...n and application extensions that allow you to right click any object on your hard disk to start a scan operation the VirusScan Console the VShield System Scan module the Alert Manager Client configur...

Page 41: ...k beside a component name then choose This feature will be installed on local hard drive from the menu that appears To add a component and any related modules within the component choose This feature...

Page 42: ...nsufficient space 13 When you have chosen the components you want to install click Next to continue Setup will show you a wizard panel that confirms its readiness to begin installing files Figure 2 9...

Page 43: ...your system Choose configuration options for your installation You can choose to scan your system create an emergency disk or update your virus definition files before you start the VShield scanner an...

Page 44: ...er in turn will pause if it detects a virus on your system so that you can shut down and use the VirusScan Emergency Disk to restart Create Emergency Disk This option is active by default It tells Set...

Page 45: ...not choose Scan boot record at startup but you may choose either of the other options Neither Windows NT Workstation nor Windows 2000 permit software to scan or make changes to hard disk boot sectors...

Page 46: ...te firewall or proxy server settings for example To learn more about how to configure the AutoUpdate utility see Configuring update options on page 113 Wait and Run AutoUpdate Later This option skips...

Page 47: ...m Using the Emergency Disk Creation utility If you choose to create an Emergency Disk during installation Setup will start the Emergency Disk wizard in the middle of the VirusScan software installatio...

Page 48: ...MSCAN DAT McAfee periodically updates these DAT files to detect new boot sector viruses You can download new Emergency DAT files from this location http www nai com asp_set anti_virus avert tools asp...

Page 49: ...files to create your Emergency Disk because Windows NT Workstation v4 0 and Windows 2000 Professional system files do not fit on a floppy disk If your computer runs Windows 95 or Windows 98 the wizar...

Page 50: ...reated your disk Next remove the disk from your floppy drive lock it label it McAfee Emergency Boot Disk and store it in a safe place If you chose to format your disk with Windows system files the wiz...

Page 51: ...on your Emergency Disk b Verify that the Don t format checkbox is clear c Click Next The Windows disk format dialog box appears Figure 2 18 Figure 2 18 Windows Format dialog box d Verify that the Ful...

Page 52: ...a virus on page 63 to learn what to do next 4 When the wizard finishes copying the Emergency Disk files it displays the final wizard panel Figure 2 20 Figure 2 20 Final Emergency Disk panel 5 Click Fi...

Page 53: ...ith no previous VirusScan version and no incompatible software No restart required unless you have Novell Client32 for NetWare installed then restart required Restart required Installation on computer...

Page 54: ...aximize your text editor window and delete any carriage returns Also be sure to type the letter O not the number 0 in the X5O that begins the test message If you are reading this manual on your comput...

Page 55: ...Scan software follow these steps 1 Click Start in the Windows taskbar point to Settings then choose Control Panel 2 Locate and double click the Add Remove Programs control panel 3 In the Add Remove Pr...

Page 56: ...e 41 Start with Step 12 on page 41 to choose the components you want to add or remove NOTE This panel differs from the one shown on page 41 It will not allow you to change your VirusScan program direc...

Page 57: ...on options Using Active Directory and Group Policies If you use Active Directory services in Windows 2000 you must distribute the software per machine not per user Set up the installation in the Micro...

Page 58: ...terminate the line with the i option so that Setup knows to look for a particular MSI file it needs for installation The syntax consists of the name of the executable file setup exe any options you c...

Page 59: ...finishes the installation By default its value is True USEADMINONLYSECURITY This property tells Setup which security mode you want this VirusScan copy to use when it runs Possible values are 0 which r...

Page 60: ...e the shown in the command line example with one or more of these parameters to limit the type of data that the log file records qb shows a small progress bar during installation with a cancel button...

Page 61: ...lls those components according to a preexisting hierarchy This means that if you choose to install only the VirusScan shell extensions for example Setup knows that you must have SCAN32 EXE the VirusSc...

Page 62: ...nstall all components except for one the SendVirus component in this example type this line at the command prompt setup exe ADDLOCAL ALL REMOVE SendVirus q i You can also choose different components f...

Page 63: ...indows NT Workstation v4 0 or Windows 2000 Professional systems you can choose to run the software with regular or maximum security To set this value from the command line run Setup with the USEADMINO...

Page 64: ...without previous settings add the PRESERVESETTINGS property to the command line with the value False setup PRESERVESETTINGS False Running Setup from a login script To install VirusScan software at th...

Page 65: ...can software from a remote location on the network use McAfee Management Edition or McAfee ePolicy Orchestrator management software NOTE If you plan to install VirusScan software to a Windows NT Works...

Page 66: ...se WinZip PKZip or a similar utility to extract the files VSC_9X INI and VSC_NT INI from the VirusScan package 2 Locate this line in each file REGSETVAL LOCAL VS_EXEC_KEY ExecCmdLine SZ I_CMD_LINE Cha...

Page 67: ...t a Software Package dialog box displays your network Locate the VirusScan software package that you want to place in the repository 3 Click VirusScan 4 Click Open VirusScan software is loaded in your...

Page 68: ...ngs McAfee provides a small utility that you can use to put a VirusScan installation package together with all of the configuration settings you want to use for each target computer McAfee releases th...

Page 69: ...0x00000001h Export E Mail Scan 0x00000002h Export Internet Scan 0x00000004h Export AvConsol exe settings 0x00000008h Export Scheduled Tasks 0x00000010h Export Default On Demand Scan 0x00000020h Expor...

Page 70: ...RT option PRESERVE PREVIOUS Preserves the settings from previous VShield scanner settings This option tells MSI_INST EXE to read settings from a previous INI file and set new installation settings app...

Page 71: ...results you expect but it will help eliminate one potential cause of your computer problems The safest course of action you can take is to install VirusScan software then scan your system immediately...

Page 72: ...mergency Disk Creation utility on page 47 3 Wait at least 15 seconds then start your computer again NOTE If you have your computer s BIOS configured to look for its boot code first on your C drive you...

Page 73: ...f that number are clean or uninfected How many files contain potential infections How many files of that number the scanner cleaned How many boot sector and MBR files the scanner examined How many boo...

Page 74: ...d scanning when you start or shut down your computer each day Use the VShield scanner to examine your computer s memory and maintain a constant level of vigilance between scan operations Under most ci...

Page 75: ...uch help when your problem really results from an interrupt conflict it does allow you to eliminate one possible cause With that knowledge you can then go on to troubleshoot your system with a full fe...

Page 76: ...am then shut the computer down and turn off the power Wait a few seconds before you start the computer again so that the system can clear the other program s code signature strings from memory You hav...

Page 77: ...nts each has a different set of default responses Responding when the System Scan module detects a virus How this module reacts when it finds a virus depends on which operating system your computer ru...

Page 78: ...3 2 Full screen Warning System Scan response options This alert message brings your system to a complete halt as it awaits your response No other programs or system operations run on your system unti...

Page 79: ...f which files it flagged as infected You can then restore deleted files from backup copies Move the file to a different location Click Move File to in the dialog box This opens a browse window you can...

Page 80: ...ause the virus has damaged the file beyond repair it will record the incident in its log file and suggest alternative responses In the example shown in Figure 3 3 the module failed to clean the EICAR...

Page 81: ...s or through similar channels In its initial configuration the module will prompt you to choose a response from among three options whenever it detects a virus Figure 3 4 A fourth option provides you...

Page 82: ...s Internet sites In its initial configuration the module will ask you whenever it encounters a potentially harmful object whether you want to Deny the object access to your system or you want to Conti...

Page 83: ...n in its log file but it will take no other action to respond to the virus Right click each infected file listed in the main window then choose an individual response from the shortcut menu that appea...

Page 84: ...get with the VShield E Mail Scan module The E Mail Scan module also offers the ability to clean infected file attachments or stop the scan operation a capability that complements the continuous monit...

Page 85: ...damaged the file beyond repair it will record the incident in its log file and suggest alternative responses In the example shown in Figure 3 8 Clean is not an available response option In most cases...

Page 86: ...t deploys The site lists the most prevalent or riskiest viruses provides a search engine you can use to search for particular virus descriptions alphabetically or by virus name displays prevalence tab...

Page 87: ...Emergency DAT files current scan engine versions regular weekly DAT and SuperDAT updates and new incremental virus definition files UPD Beta and first look software Viewing file information If you rig...

Page 88: ...endVirus utility to submit a file sample Because the majority of later generation viruses tend to infect document and executable files VirusScan software comes with SENDVIR EXE a utility that makes it...

Page 89: ...act you about your submission enter your name e mail address and any message you would like to send along with your submission in the text boxes provided then click Next to continue NOTE You may submi...

Page 90: ...you want to submit click Next to continue The Choose Upload Options panel appears Figure 3 15 Figure 3 15 Choose Upload options panel If the file you want to submit is a Microsoft Office document or a...

Page 91: ...medy or respond in any way to you SENDVIR EXE will use the e mail client you specified to send your sample You must have connected to your network or ISP in order for this process to succeed Capturing...

Page 92: ...cro virus that has infected any of your Microsoft Word Excel or PowerPoint files send these files to McAfee anti virus researchers either with the SENDVIR EXE utility via e mail as floppy disk images...

Page 93: ...spect you have a boot virus you must use RWFLOPPY to send your samples electronically otherwise you must send your samples physically on a diskette If you send them electronically without using RWFLOP...

Page 94: ...age Sending samples via e mail Once you ve made disk images or created a file archive for your samples send them to McAfee researchers at one of these e mail addresses In your message include this inf...

Page 95: ...ample AVERT cannot return it to you AVERT does not accept or process Iomega Ditto or Jazz cartridges Iomega Zip disks or other types of removable media In the United States Network Associates Inc Viru...

Page 96: ...Removing Infections From Your System 96 McAfee VirusScan Anti Virus Software...

Page 97: ...Guide Using the VirusScan application The VirusScan name applies both to the entire set of desktop anti virus program components described in the User s Guide and to a particular component of that se...

Page 98: ...pter 6 Creating and Configuring Scheduled Tasks in the VirusScan User s Guide Using specialized scanning tools In addition to the continuous background scanning that the VShield scanner provides you w...

Page 99: ...You also need a method to collect and manage alert messages from all over the network in a central repository so that you can respond whenever any workstation detects an infected file McAfee provides...

Page 100: ...or software to tie alert messages into the Network Associates Magic HelpDesk application for trouble ticket generation and other features Alert Manager messages also contain much richer data than do t...

Page 101: ...Alerting Configuration The Alert Manager Client Configuration page appears 2 Figure 5 1 Alert Manager Client Configuration dialog box 2 Verify that the Disable Alerting checkbox is clear This activat...

Page 102: ...ust the computer name The Alert Manager Client Configuration utility will validate the form of the name you enter here but will not verify that the Alert Manager server exists on the target computer T...

Page 103: ...a destination click OK to close the dialog box You can designate any directory on your network as a destination for Centralized Alerting messages but the directory must contain a copy of the file CENT...

Page 104: ...running somewhere on your network VirusScan software comes packaged with a Management Information File AMG MIF that identifies VirusScan alerting attributes to your DMI client application The DMI cli...

Page 105: ...r viruses in circulation McAfee releases new DAT files weekly to provide protection against the approximately 500 new viruses that appear each month With this VirusScan release McAfee has introduced a...

Page 106: ...ility on page 108 and Understanding the AutoUpgrade utility on page 118 Incremental DAT file updates The new McAfee iDAT technology works transparently with the included AutoUpdate version The new iDA...

Page 107: ...of an archived ZIP file named DAT XXXX ZIP The XXXX in the file name is a series number that changes with each DAT file release McAfee does not recommend this method to update your software but you c...

Page 108: ...sole To use it to update your VirusScan software you must Set a schedule for the AutoUpdate task and enable it to run Set a password to protect your configuration settings if you wish Configure the ta...

Page 109: ...etwork divisions Keeping update traffic primarily internal can also reduce the potential for network security breaches Reduce the likelihood that you will need to wait to download new DAT files Traffi...

Page 110: ...utoUpdate tasks on page 203 of the VirusScan User s Guide To learn how to set a schedule for the task see Enabling tasks on page 208 of the User s Guide 2 Click Configure The Automatic Update dialog b...

Page 111: ...ions on page 113 Figure 6 2 Automatic Update Properties dialog box Update Options page Change definitions for an existing update site Select a site shown in the update site list then click Edit to ope...

Page 112: ...s not find new DAT files it will connect to each of the other sites listed until it finds the most current DAT files available If you have the Force Update option selected AutoUpdate will download any...

Page 113: ...ons stop it When the file reaches the maximum size you set the AutoUpdate utility first clears it then starts the log again from where it left off To see the contents of the log file from VirusScan Co...

Page 114: ...onfiguration to look for new files on your local computer or on a computer elsewhere on your network Your network settings will govern how the utility attempts the connection and how long it waits bef...

Page 115: ...onnect to a site set for anonymous FTP login or you must designate the user name and password for an account on the site To have the utility use an anonymous login select the Use anonymous FTP login c...

Page 116: ...AutoUpdate utility rename existing VirusScan DAT files before it installs new files To rename each file the utility appends the extension SAV to the existing file name and extension CLEAN DAT for exa...

Page 117: ...ING McAfee recommends that you use this option with extreme caution If you have configured your AutoUpdate task to connect to a server that stores older DAT file versions you can reduce the effectiven...

Page 118: ...path and file name for the program you want to run or click Browse to locate the program on your hard disk 3 To save your changes and return to the Automatic Update dialog box click OK To close the di...

Page 119: ...convenient update time when you first deploy VirusScan software but set the AutoUpgrade utility to trigger at a random interval within 60 minutes of that time or set a schedule that phases in or rotat...

Page 120: ...Automatic Upgrade dialog box follow these steps 1 Double click the AutoUpgrade task in the Console task list to open its Task Properties dialog box Figure 6 6 Figure 6 6 AutoUpgrade Task Properties d...

Page 121: ...ether or not the AutoUpgrade utility can connect with the site You will not see any sites listed initially because the AutoUpgrade utility does not come configured to connect to any upgrade site You m...

Page 122: ...6 8 Make the changes you want to make then click OK to save them and return to this dialog box To see descriptions and instructions for configuring the available options see Configuring upgrade optio...

Page 123: ...6 9 Automatic Upgrade dialog box Log Activity page 5 Select the Log activity into the Activity Log File checkbox By default the AutoUpgrade utility records what happens during update attempts and save...

Page 124: ...Click OK to save your changes and close the Automatic Upgrade dialog box Click Cancel to close the dialog box without saving your changes Configuring upgrade options To create a new update site or ch...

Page 125: ...stops the connection attempt Next use Universal Naming Convention UNC notation to enter the path to the computer that holds the new files you want to download in the text box labeled Select a Computer...

Page 126: ...elect the Use anonymous FTP login checkbox To specify an account clear the Use anonymous FTP login checkbox then click FTP login information to enter a user name and password for an account that has a...

Page 127: ...also selects the Save the Upgrade files for later usage checkbox To tell AutoUpgrade where to save the program file archive enter a path and folder name in the text box below this checkbox or click B...

Page 128: ...the XXXX refers to the SuperDAT version number included as part of the file name 2 Download the file AUTOUPG ZIP which you will find on the Network Associates FTP site in this location ftp username p...

Page 129: ...t the target computer if it must do so in order to finish updating or upgrading your anti virus software If you do not want the target computer to restart after it updates your files set the value of...

Page 130: ...at constitutes a medium on watch or high risk or about McAfee AVERT risk assessment in general visit the AVERT website at http www mcafeeb2b com asp_set anti_virus alerts ara asp A high prevalence vir...

Page 131: ...131 Updating and Upgrading VirusScan Software For VirusScan v4 5 and later releases copy any EXTRA DAT files you download to this directory C Program Files Common Files Network Associates VirusScan E...

Page 132: ...Updating and Upgrading VirusScan Software 132 McAfee VirusScan Anti Virus Software...

Page 133: ...r and VirusScan Console to load as soon as your computer starts set a ceiling for the number of scan targets the VirusScan application can examine or exclude during a scan session limit the number of...

Page 134: ...ick Stop If all VirusScan components that normally load into memory the Console and the VShield scanner normally are inactive this button will read Start Click it to reload inactive VirusScan componen...

Page 135: ...ntinue Figure A 2 VirusScan control panel Components page 5 To have the VShield scanner load when you start your computer select the Load VShield on startup checkbox This same setting appears in the S...

Page 136: ...ea to have the VirusScan Console start as soon as you start your computer The Console must be running in order to execute any tasks you have scheduled including scan tasks AutoUpgrade tasks and AutoUp...

Page 137: ...umber of support files to function including some that enable its various modules This table lists VShield scanner and related files Program files These files run directly as VShield components or are...

Page 138: ...ystems C Program Files Common Files Network Associates McShield MCSHIELD DLL Resource file for System Scan module Runs only on Windows NT and Windows 2000 systems C Program Files Common Files Network...

Page 139: ...ows virtual device driver only on Windows 95 and Windows 98 systems C Windows System VSHINIT VXD VShield support file Initializes services for DOS protected mode interface Runs only on Windows 95 and...

Page 140: ...Associates VirusScan CCM_SCAN EXE Scans e mail you receive via Lotus cc Mail v7 x and earlier cc Mail systems C Program Files Network Associates VirusScan WEBSCANX EXE Provides functionality for VShie...

Page 141: ...n utilities for components C Program Files Network Associates VirusScan AVSMCPA CPL VirusScan control panel applet C Windows System or C Winnt System 32 RESDLL DLL Resource file for all components C P...

Page 142: ...CONS MMF Memory map file for SYNCUTIL DLL C Program Files Network Associates VirusScan DAV_EXCL MMF Memory map file for SYNCUTIL DLL C Program Files Network Associates VirusScan DAV_SCAN MMF Memory ma...

Page 143: ...irusScan application files or are dedicated VirusScan application library or support files Dependent files The VirusScan application requires these files to run at various points during its operation...

Page 144: ...en components C Program Files Network Associates VirusScan VSUTIL DLL Provides common utilities for components C Program Files Network Associates VirusScan AVSMCPA CPL VirusScan control panel applet C...

Page 145: ...application temporary files File Function Location SYNC_MAP MMF Memory map file for AVSYNCH DLL C Program Files Network Associates VirusScan AVCONSOLE MMF Memory map file for SYNCUTIL DLL C Program F...

Page 146: ...ogram Files Common Files Network Associates McPal AMG MIF Management Information File for use with Desktop Management Interface client application software C Program Files Common Files Network Associa...

Page 147: ...ile for various VirusScan utilities C Program Files Common Files Network Associates McPal NAUTIL32 DLL Library file for various VirusScan utilities C Program Files Common Files Network Associates McPa...

Page 148: ...Files Network Associates VirusScan DAV_CONS MMF Memory map file for SYNCUTIL DLL C Program Files Network Associates VirusScan DAV_EXCL MMF Memory map file for SYNCUTIL DLL C Program Files Network Ass...

Page 149: ...dows Display Properties dialog box C Program Files Network Associates VirusScan Table B 11 ScreenScan dependent files File Function Location RESDLL DLL Resource file for all VirusScan components C Pro...

Page 150: ...t Table B 12 VirusScan Emergency Disk files File Function Location AUTOEXEC BAT MS DOS batch file This file leads you through an immediate scan operation as soon as the Emergency Disk finishes startin...

Page 151: ...se during scan operations A NAMES DAT McAfee virus definition file This file is a smaller specialized version of the NAMES DAT file that other VirusScan components use You may not use a NAMES DAT file...

Page 152: ...cluding some related to the McAfee scan engine This table lists extension and related files Program files Dependent files The E Mail Scan extension requires these files to run at various points but th...

Page 153: ...m Files Network Associates VirusScan SYNCUTIL DLL Stores data shared between components C Program Files Network Associates VirusScan VSUTIL DLL Provides common utilities for components C Program Files...

Page 154: ...k Associates VirusScan DAV_SCAN MMF Memory map file for SYNCUTIL DLL C Program Files Network Associates VirusScan DEXCLDEF MFF Memory map file for SYNCUTIL DLL C Program Files Network Associates Virus...

Page 155: ...ser s Guide Running the VirusScan Command Line program A typical installation of VirusScan software includes the VirusScan Command Line program You can run VirusScan Command Line either from a Windows...

Page 156: ...the VirusScan program directory The following table lists the options that can be added to the SCAN command Table C 1 VirusScan command line scanner options Command line Option Limitations Descriptio...

Page 157: ...les APPEND On demand scanning only Used with REPORT to append report message text to the specified report file instead of overwriting it BOOT On demand scanning only Scan boot sector and master boot r...

Page 158: ...complete path to each file that you want to exclude on its own line You may use wildcards and FILEACCESS On access scanning only Scans executable files when you modify them in any way including execu...

Page 159: ...ck multiple floppy disks quickly You cannot use the MANY option if you run the scanner from a boot disk and you have only one floppy drive MAXFILESIZE xxx x On demand scanning only Scan only files no...

Page 160: ...s NODDA On demand scanning only No direct disk access This prevents the scanner from examining the boot record This feature has been added to allow the scanner to run under Windows NT You might need t...

Page 161: ...l appear when the scanner fills a screen with messages Otherwise by default the scanner fills and scrolls a screen continuously without stopping which allows it to run on PCs with multiple drives or t...

Page 162: ...delete files on that drive McAfee recommends omitting PAUSE when using any report option RPTALL On demand scanning only Include all scanned files in the REPORT file When used with REPORT this option a...

Page 163: ...nside compressed files VIRLIST On demand scanning only Displays the name and a brief description of each virus that the scanner detects You may use the PAUSE option on the same command line as VIRLIST...

Page 164: ...5 for details To run the VirusScan on demand scanner follow these steps 1 Open an MS DOS Prompt window from within Windows or restart your computer in DOS mode 2 Change to the VirusScan program direct...

Page 165: ...w will open for you to set configuration options If you set the user interface option to UICONFIG the application will default to NOAUTOSCAN If you set the user interface option to UINONE the applicat...

Page 166: ...oot level of the folder you designate To scan those files run the application with the NOSUB option NOSUB This option tells the VirusScan application not to look for viruses in any subfolders inside t...

Page 167: ...plication to automatically move any infected files it finds to a predefined quarantine directory BEEP This option tells the VirusScan application to beep when it finds a virus Your computer will play...

Page 168: ...ng Use this option if your task fails but the VirusScan Scheduler still shows it as running LOG This option tells the VirusScan application to record its actions in a predefined log file By default th...

Page 169: ...ation to summarize the results of all the events it has recorded for each virus detection and response event NOLOGSUMMARY This option tells the VirusScan application not to summarize the results of al...

Page 170: ...Using VirusScan Command line Options 170 McAfee VirusScan Anti Virus Software...

Page 171: ...you are a corporate customer you must first have a grant number or product serial number to subscribe to the Enterprise SecureCast channel If you do not have a grant number please contact your purchas...

Page 172: ...ion properly with newer scan engines When the older scan engine version becomes obsolete Network Associates will discontinue development of DAT files for it You should upgrade your software before you...

Page 173: ...95 Windows 98 Windows NT or Windows 2000 At least 10MB free hard disk space plus sufficient space for product and other downloads An active Internet connection direct or dial up for a minimum of one h...

Page 174: ...ackWeb client welcome panel 3 Read the instructions and warnings on this panel then click Next to continue 4 The BackWeb license agreement appears Figure D 2 Figure D 2 BackWeb Software License Agreem...

Page 175: ...ocation for Setup to install the client software if you wish or click Browse to locate a suitable folder Click Next to continue Setup will begin to copy BackWeb program files to your computer As it do...

Page 176: ...el appears Figure D 5 Figure D 5 Communication Method panel 9 Choose a communication method Your choices are HTTP Choose this option if you can connect directly to the Internet without going through a...

Page 177: ...roxy server in the Proxy text box then enter the port the server uses for communication in the Port text box When you have finished click Next to continue The Proxy Authentication panel appears Figure...

Page 178: ...n Phase 2 Register with the Enterprise SecureCast service After you install the BackWeb client and start it the SecureCast service immediately opens the client application and sends its first InfoPak...

Page 179: ...ecureCast service site or your site the window might not list any InfoPaks In that case minimize or close the BackWeb window After some time you will receive a Flash message Click the flashing message...

Page 180: ...the grant number you received when you purchased your software or that you received from Network Associates Customer Service NOTE If your company is not a subsidiary of another company clear the Subsi...

Page 181: ...r network requires you to connect to the Internet through a proxy server select the Use HTTP proxy at address checkbox then enter the server name or its Internet Protocol IP address in the text box pr...

Page 182: ...ill connect to the Network Associates SecureCast service electronic customer care page If you are a corporate user the window resembles the one shown in Figure D 16 Figure D 16 SecureCast Electronic C...

Page 183: ...bing from the SecureCast service You can stop the SecureCast service from delivering InfoPaks at any time you want to To do so right click the BackWeb icon in your Windows system tray then choose Star...

Page 184: ...rvice to Get New Data Files 184 McAfee VirusScan Anti Virus Software BackWeb client For a comprehensive guide to BackWeb including additional troubleshooting advice see the online BackWeb User s Manua...

Page 185: ...support under the Network Associates Corporate PrimeSupport program If you are a home user you can choose a plan geared toward your needs from the Home User PrimeSupport program PrimeSupport options...

Page 186: ...lan The PrimeSupport Connect plan gives you telephone access to essential product assistance from experienced technical support staff members With this plan you get In North America unlimited toll fre...

Page 187: ...ca unlimited telephone access to technical support at standard long distance or international rates Monday through Friday from 9 00 a m to 5 00 p m Central time Priority access to technical support st...

Page 188: ...at intervals you designate Committed response times from your support engineer who will respond to pages within half an hour to voice mail within one hour and to e mail within four hours Assignable c...

Page 189: ...Europe Middle East Africa 9am 6pm local time Asia Pacific 8 a m 6 p m AEST Latin America 9 a m 5 p m CT Monday Friday after hours emergency access North America 8 a m 8 p m CT Europe Middle East Afri...

Page 190: ...et download upgrade login asp Free 24 hour per day seven days per week access to online or electronic support through the Network Associates voice and fax system the Network Associates website and thr...

Page 191: ...business hours Monday through Friday from 7 00 a m to 6 00 p m Pacific time You call a toll free number use a credit card to take care of the transaction and get transferred to the technical support...

Page 192: ...Plan Pay Per Minute Plan Online Upgrades Plan or Quarterly Disk CD Plan for your Network Associates products In North America call Network Associates Customer Service at 972 855 7044 In international...

Page 193: ...for network performance Network Associates consultants also develop and deliver custom solutions to help accomplish your project goals from lengthy large scale implementations to brief problem solvin...

Page 194: ...oduction default asp Total Education Services Network Associates Total Education Services builds and enhances the skills of all network professionals through practical hands on instruction The Total E...

Page 195: ...uch faster and at a far lower cost in bandwidth than ever before Better still the AutoUpdate utility makes this process completely transparent it will download as many incremental DAT files as it need...

Page 196: ...ld extract and install all of the virus definition files it needed to bring your existing DAT files up to date The utility finds the information it needs to determine which packages to download in the...

Page 197: ...e the iDAT files patch the existing DAT files you may not download the iDAT files through the AutoUpdate utility and use the utility to save them for later updates You can download the UPD packages in...

Page 198: ...s brings your network to a workable baseline state You can then download and install iDAT files to keep current 2 From the baseline state use a web browser or FTP client software each week to download...

Page 199: ...ers are off or if they do not have the VirusScan Console running the AutoUpdate utility will resume its scheduled task when you next start the computer or the VirusScan Console To learn how to use thi...

Page 200: ...ut of date After that point it becomes more efficient to download a full DAT file set Network configuration issues Q Do all the machines I want to update need to be able to connect to the Internet A N...

Page 201: ...ecureCast 108 119 using iDAT files with 195 AutoUpgrade advanced options for configuring 126 to 128 number of connection attempts made for update sites 125 options for configuring 118 to 128 use of wi...

Page 202: ...ew viruses to McAfee xvii E Mail Scan dependent files 152 program files 152 temporary files 153 E Mail Scan program component default responses when virus found 84 to 85 Emergency DAT files location a...

Page 203: ...INI file for 196 infected files cleaning yourself when VirusScan cannot 73 removing viruses from 71 to 85 installation aborting if virus detected during 71 logging 60 silent 59 specific features 61 t...

Page 204: ...130 preserving settings 64 PrimeSupport corporate at a glance 189 KnowledgeCenter 185 ordering 188 PrimeSupport Connect 186 PrimeSupport Connect 24 By 7 187 PrimeSupport Enterprise 187 for home users...

Page 205: ...Scheduler purpose of 98 ScreenScan dependent files 149 program files 148 SecureCast common data files delivered via 172 Enterprise SecureCast 171 setting up 183 troubleshooting 183 unsubscribing from...

Page 206: ...for VirusScan 33 SecureCast 173 System Scan module default response options for 77 to 79 T Task menu View Activity Log 113 124 technical support corporate at a glance 189 KnowledgeCenter 185 ordering...

Page 207: ...g and distributing 108 to 119 updates and upgrades use of anonymous FTP to log into sites for 115 126 use of UNC notation to designate 114 125 updates and upgrades website address for obtaining 190 up...

Page 208: ...hat it does 97 VirusScan application dependent files 143 program files 143 temporary files 145 VirusScan Command Line use of when booting with Emergency Disk 72 VirusScan control panel 133 files 147 o...

Reviews: