background image

COPYRIGHT

Copyright © 2004 Networks Associates Technology, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a 
retrieval system, or translated into any language in any form or by any means without the written permission of Networks Associates Technology, Inc., or its 
suppliers or affiliate companies. To obtain this permission, write to the attention of the McAfee legal department at: 5000 Headquarters Drive, Plano, Texas 75024, or 
call +1-972-963-8000.

TRADEMARK ATTRIBUTIONS

ACTIVE FIREWALL, ACTIVE SECURITY, ACTIVESECURITY (AND IN KATAKANA), ACTIVESHIELD, ANTIVIRUS ANYWARE AND DESIGN, CLEAN-UP, 
DESIGN (STYLIZED E), DESIGN (STYLIZED N), ENTERCEPT, ENTERPRISE SECURECAST, ENTERPRISE SECURECAST (AND IN KATAKANA), EPOLICY 
ORCHESTRATOR,  FIRST AID, FORCEFIELD, GMT, GROUPSHIELD, GROUPSHIELD (AND IN KATAKANA), GUARD DOG,  HOMEGUARD, HUNTER, 
INTRUSHIELD, INTRUSION PREVENTION THROUGH INNOVATION, M AND DESIGN, MCAFEE, MCAFEE (AND IN KATAKANA), MCAFEE AND DESIGN, 
MCAFEE.COM, MCAFEE VIRUSSCAN, NA NETWORK ASSOCIATES, NET TOOLS, NET TOOLS (AND IN KATAKANA), NETCRYPTO, NETOCTOPUS, 
NETSCAN, NETSHIELD, NETWORK ASSOCIATES, NETWORK ASSOCIATES COLLISEUM, NETXRAY, NOTESGUARD, NUTS & BOLTS, OIL CHANGE, PC 
MEDIC, PCNOTARY,  PRIMESUPPORT, RINGFENCE, ROUTER PM, SECURECAST, SECURESELECT, SPAMKILLER, STALKER, THREATSCAN, TIS, TMEG, 
TOTAL VIRUS DEFENSE, TRUSTED MAIL, UNINSTALLER, VIREX, VIRUS FORUM, VIRUSCAN, VIRUSSCAN, VIRUSSCAN (AND IN KATAKANA), 
WEBSCAN, WEBSHIELD, WEBSHIELD (AND IN KATAKANA), WEBSTALKER, WEBWALL, WHAT'S THE STATE OF YOUR IDS?, WHO'S WATCHING YOUR 
NETWORK, YOUR E-BUSINESS DEFENDER, YOUR NETWORK. OUR BUSINESS.  are registered trademarks or trademarks of McAfee, Inc. and/or its affiliates in 
the US and/or other countries.  Red in connection with security is distinctive of McAfee brand products.  All other registered and unregistered trademarks herein 
are the sole property of their respective owners.

LICENSE INFORMATION
License Agreement

NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, WHICH
SETS FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH TYPE OF LICENSE
YOU HAVE ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT
ACCOMPANIES YOUR SOFTWARE PACKAGING OR THAT YOU HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET, A FILE
ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEB SITE FROM WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF YOU DO NOT
AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT
TO MCAFEE, INC. OR THE PLACE OF PURCHASE FOR A FULL REFUND. 

Attributions

This product includes or may include:

Software developed by the OpenSSL Project for use in the OpenSSL Toolkit (

http://www.openssl.org/

).

 

Cryptographic software written by Eric A. Young and

software written by Tim J. Hudson.

 

Some software programs that are licensed (or sublicensed) to the user under the GNU General Public License (GPL) or other

similar Free Software licenses which, among other rights, permit the user to copy, modify and redistribute certain programs, or portions thereof, and have access to
the source code. The GPL requires that for any software covered under the GPL which is distributed to someone in an executable binary format, that the source code
also be made available to those users. For any such software covered under the GPL, the source code is made available on this CD. If any Free Software licenses
require that McAfee, Inc. provide rights to use, copy or modify a software program that are broader than the rights granted in this agreement, then such rights shall
take precedence over the rights and restrictions herein.

 

Software originally written by Henry Spencer, Copyright 1992, 1993, 1994, 1997 Henry Spencer.

Software originally written by Robert Nordier, Copyright © 1996-7 Robert Nordier.

 

Software written by Douglas W. Sauder.

 

Software developed by the

Apache Software Foundation (

http://www.apache.org/

). A copy of the license agreement for this software can be found at 

www.apache.org/licenses/LICENSE-

2.0.txt

.

 

International Components for Unicode (“ICU”) Copyright © 1995-2002 International Business Machines Corporation and others.

 

Software developed

by CrystalClear Software, Inc., Copyright © 2000 CrystalClear Software, Inc.

 

 FEAD

®

 Optimizer

®

 technology, Copyright Netopsystems AG, Berlin, Germany.

Outside In

®

 Viewer Technology © 1992-2001 Stellent Chicago, Inc. and/or Outside In

®

 HTML Export, © 2001 Stellent Chicago, Inc.

 

Software copyrighted by

Thai Open Source Software Center Ltd. and Clark Cooper, © 1998, 1999, 2000.

 

Software copyrighted by Expat maintainers.

 

Software copyrighted by The

Regents of the University of California, © 1989. 

 

Software copyrighted by Gunnar Ritter.

 

Software copyrighted by Sun Microsystems

®

, Inc.© 2003.

 

Software

copyrighted by Gisle Aas. © 1995-2003.

 

Software copyrighted by Michael A. Chase, © 1999-2000.

 

Software copyrighted by Neil Winton, © 1995-1996.

Software copyrighted by RSA Data Security, Inc., © 1990-1992.

 

Software copyrighted by Sean M. Burke, © 1999, 2000.

 

Software copyrighted by Martijn

Koster, © 1995.

 

Software copyrighted by Brad Appleton, © 1996-1999. 

 

Software copyrighted by Michael G. Schwern, © 2001.

 

Software copyrighted by

Graham Barr, © 1998.

 

Software copyrighted by Larry Wall and Clark Cooper, © 1998-2000.

 

Software copyrighted by Frodo Looijaard, © 1997.

 

Software

copyrighted by the Python Software Foundation, Copyright © 2001, 2002, 2003. A copy of the license agreement for this software can be found at 

www.python.org

.

Software copyrighted by Beman Dawes, © 1994-1999, 2002.

 

Software written by Andrew Lumsdaine, Lie-Quan Lee, Jeremy G. Siek © 1997-2000 University of

Notre Dame.

 

Software copyrighted by Simone Bordet & Marco Cravero, © 2002.

 

Software copyrighted by Stephen Purcell, © 2001.

 

Software developed

by the Indiana University Extreme! Lab (

http://www.extreme.indiana.edu/

).

 

Software copyrighted by International Business Machines Corporation and others,

© 1995-2003.

 

Software developed by the University of California, Berkeley and its contributors.

 

Software developed by Ralf S. Engelschall

<[email protected]> for use in the mod_ssl project (

http://www.modssl.org/

).

 

Software copyrighted by Kevlin Henney, © 2000-2002.

 

Software

copyrighted by Peter Dimov and Multi Media Ltd. © 2001, 2002.

 

Software copyrighted by David Abrahams, © 2001, 2002. See 

http://www.boost.org/libs/bind/

bind.html

 for documentation.

 

Software copyrighted by Steve Cleary, Beman Dawes, Howard Hinnant & John Maddock, © 2000.

 

Software copyrighted by

Boost.org, © 1999-2002.

 

Software copyrighted by Nicolai M. Josuttis, © 1999.

 

Software copyrighted by Jeremy Siek, © 1999-2001.

 

Software copyrighted

by Daryle Walker, © 2001.

 

Software copyrighted by Chuck Allison and Jeremy Siek, © 2001, 2002.

 

Software copyrighted by Samuel Krempp, © 2001. See

http://www.boost.org

 for updates, documentation, and revision history.

 

Software copyrighted by Doug Gregor ([email protected]), © 2001, 2002.

 

Software

copyrighted by Cadenza New Zealand Ltd., © 2000.

 

Software copyrighted by Jens Maurer, © 2000, 2001.

 

Software copyrighted by Jaakko Järvi

([email protected]), © 1999, 2000.

 

Software copyrighted by Ronald Garcia, © 2002.

 

Software copyrighted by David Abrahams, Jeremy Siek, and Daryle

Walker, © 1999-2001.

 

Software copyrighted by Stephen Cleary ([email protected]), © 2000.

 

Software copyrighted by Housemarque Oy <

http://

www.housemarque.com

>, © 2001.

 

Software copyrighted by Paul Moore, © 1999.

 

Software copyrighted by Dr. John Maddock, © 1998-2002.

 

Software

copyrighted by Greg Colvin and Beman Dawes, © 1998, 1999.

 

Software copyrighted by Peter Dimov, © 2001, 2002.

 

Software copyrighted by Jeremy Siek and

John R. Bandela, © 2001.

 

Software copyrighted by Joerg Walter and Mathias Koch, © 2000-2002.

Issued October 2004 / McAfee

®

 VirusScan

®

 Professional Edition software version 9.0

Summary of Contents for VirusScan Professional

Page 1: ...User Guide Version 9 0...

Page 2: ...y written by Henry Spencer Copyright 1992 1993 1994 1997 Henry Spencer Software originally written by Robert Nordier Copyright 1996 7 Robert Nordier Software written by Douglas W Sauder Software devel...

Page 3: ...l rights reserved Are you installing your product from a CD Are you installing your product from a web site Yes Yes No 3 Click OK 2 In the Run dialog box type D SETUP EXE where D is the letter of your...

Page 4: ...tional year of virus signatures 60 day warranty that guarantees replacement of your software CD if it is defective or damaged SpamKiller filter updates for one year after installation when you purchas...

Page 5: ...25 Manually scanning for viruses and potentially unwanted programs 25 Automatically scanning for viruses and potentially unwanted programs 28 If Scan finds a virus or potentially unwanted program 30 M...

Page 6: ...Contents vi McAfee VirusScan Professional Edition software version 9 0...

Page 7: ...ted programs in hard drives floppy disks and individual files and folders Quarantine Encrypt and temporarily isolate infected and suspicious files in the quarantine folder until an appropriate action...

Page 8: ...your computer for viruses File quarantine You can use the Quarantine feature to encrypt and temporarily isolate infected and suspicious files in the quarantine folder until an appropriate action can...

Page 9: ...n you must disable ActiveShield to prevent it from detecting the infected files before Scan does then download the test files To download the test files 1 Disable ActiveShield Right click the McAfee i...

Page 10: ...e dialog box go to the VSO Scan Folder where you saved the files a Click the sign next to the C drive icon b Click the VSO Scan Folder to highlight it do not click the sign next to it This tells Scan...

Page 11: ...nt details at the McAfee web site NOTE For more information about its features click Help in the SecurityCenter dialog box While SecurityCenter is running and all of the McAfee features installed on y...

Page 12: ...Getting Started 12 McAfee VirusScan Professional Edition software version 9 0...

Page 13: ...oted by the red icon in your Windows system tray by default as soon as you restart your computer after the installation process If ActiveShield is stopped not loaded or is disabled denoted by the blac...

Page 14: ...gain when you restart your computer Configuring ActiveShield options You can modify ActiveShield starting and scanning options in the ActiveShield tab of the VirusScan Options dialog box Figure 2 1 wh...

Page 15: ...rnet To stop ActiveShield from starting when Windows starts 1 Right click the McAfee icon point to VirusScan then click Options The VirusScan Options dialog box opens Figure 2 1 on page 14 2 Deselect...

Page 16: ...our e mail scanning options you must restart your e mail program to complete the changes Inbound e mail If an inbound e mail message or attachment is infected ActiveShield performs the following steps...

Page 17: ...mail messages then click OK If your e mail server is set to only send and receive e mail while you are at your computer you can choose to have alerts prompt you to clean infected e mail by disabling...

Page 18: ...r later NOTE For your protection you cannot disable auto cleaning of instant message attachments If an inbound instant message attachment is infected VirusScan performs the following steps Tries to cl...

Page 19: ...hen click the ActiveShield tab Figure 2 3 3 Click Program files and documents only then click OK Scanning for new unknown viruses If you set ActiveShield to use the default Scan for new unknown viruse...

Page 20: ...iles or the opening of your Windows registry An attempt to forward e mail to a large portion of your address book Attempts to forward multiple e mail messages in rapid succession If you set ActiveShie...

Page 21: ...e mails are sent within 30 seconds NOTE If you modify the number of recipients or seconds for monitoring sent e mails it might result in invalid detections McAfee recommends that you click No to retai...

Page 22: ...t similar to Figure 2 6 appears For most viruses Trojan horses and worms ActiveShield automatically tries to clean the file You can then choose how to manage infected files infected e mail suspicious...

Page 23: ...subject associated with the infected e mail b Click Clean the infected attachment 2 If ActiveShield cannot clean the e mail click Quarantine the infected attachment to encrypt and temporarily isolate...

Page 24: ...o initiate it a Click Find out more information to view the recipient list subject line message body and description of the suspicious activity associated with the infected e mail message b Click Stop...

Page 25: ...e file Manually scanning for viruses and potentially unwanted programs To scan your computer 1 Right click the McAfee icon point to VirusScan then click Scan for Viruses The Scan for Viruses dialog bo...

Page 26: ...virus authors plant viruses in a ZIP file then insert that ZIP file into another ZIP file in an effort to bypass anti virus scanners Scan can detect these viruses as long as you leave this option sele...

Page 27: ...iles you have the longer the scan takes 4 Click Scan to start scanning files When the scan is finished a scan summary shows the number of files scanned the number of files detected the number of poten...

Page 28: ...look VirusScan provides a toolbar icon to scan for viruses and potentially unwanted programs in selected message stores and their subfolders mailbox folders or e mail messages containing attachments f...

Page 29: ...dit the schedule a Click Edit b Select how often to scan your computer in the Schedule Task list and then select additional options in the dynamic area below it Daily Specify the number of days betwee...

Page 30: ...For most viruses Trojans and worms Scan automatically tries to clean the file You can then choose how to manage detected files including whether to submit them to the McAfee AVERT labs for research If...

Page 31: ...ng a Rescue Disk to start your computer The Rescue Disk in many cases can start a computer if a detected file disables it See Creating a Rescue Disk in the online help for details For more help consul...

Page 32: ...o move it back to its original location 5 If VirusScan cannot clean the virus click Delete to remove the file 6 If VirusScan cannot clean or delete the file and if it is not a potentially unwanted pro...

Page 33: ...t currently does not filter AOL Yahoo or other web based e mail accounts Overview During installation you configured one or more e mail accounts to block unwanted messages from You also imported e mai...

Page 34: ...ntegration You can access core SpamKiller features from directly within Outlook Express 6 0 Outlook 98 Outlook 2000 and Outlook XP You can block spam add people to your Friends List and view quarantin...

Page 35: ...t message appears first The bottom preview pane contains the message text for the selected message NOTE If your computer runs Windows 2000 or Windows XP multiple users have been added to SpamKiller an...

Page 36: ...e mail appears in the Blocked E mail list you can move the messages back to your Inbox and the Accepted E mail list by selecting the messages and then clicking Rescue this message Like the Blocked E...

Page 37: ...scue Options dialog box This option appears on the Blocked E mail page only You can automatically add the sender to your Friends list and rescue all messages from the sender Delete this message remove...

Page 38: ...l folder To block a message from Microsoft Outlook 1 Open your Microsoft Outlook or Outlook Express Inbox You can only block external messages messages coming from an Internet server 2 Select a messag...

Page 39: ...delete a message manually 1 View your blocked e mail messages In SpamKiller click the Messages tab and then click the Blocked E mail tab In your Microsoft Outlook or Outlook Express Inbox click to op...

Page 40: ...you want to send the complaint to WARNING In most cases you should not select Sender Sending a complaint to the sender of the spam validates your e mail address which can increase the number of spam...

Page 41: ...orary copies of those documents We recommend that you periodically shred the free space on your disk drive to insure that these temporary copies are permanently deleted NOTE With computer forensics to...

Page 42: ...ur Shredder Settings Specify the number of shredding passes Show a warning message when you shred files Check your hard disk for errors before shredding Add McAfee Shredder to your Send To menu Place...

Page 43: ...alerts for infected e mail 23 for infected files 23 for potential worms 24 for suspicious scripts 23 for viruses 22 AVERT submitting suspicious files to 32 B Blocked E mail page blocked message icons...

Page 44: ...ed files option 26 testing 9 to 10 Scan all files option Scan 26 Scan for new unknown viruses option Scan 26 Scan for potentially unwanted programs option Scan 27 scan options ActiveShield 14 18 to 19...

Page 45: ...l attachments 23 deleting infected files 23 detecting 30 detecting with ActiveShield 22 quarantining 22 30 quarantining infected e mail attachments 23 quarantining infected files 23 stopping potential...

Page 46: ...rmation on products worldwide services and support contact your authorized McAfee sales representative or visit us at McAfee 5000 Headquarters Drive Plano TX 75024 972 963 8000 www mcafee com N A I 6...

Reviews: