background image

Installing VirusScan Software

40

McAfee VirusScan Anti-Virus Software

Figure 2-4. Incompatible software panel

7. Select the checkbox shown, then click 

Next>

. Setup will start the 

uninstallation utility that the conflicting software normally uses, and 
allow it to remove the software. The uninstallation utility might tell you 
that you need to restart your computer to completely remove the other 
software. You do 

not

 need to do so to continue with your VirusScan 

installation—so long as the other software is not active, Setup can 
continue without conflicts.

Š

NOTE: 

McAfee strongly recommends that you remove 

incompatible software. Because most anti-virus software operates at 
a very low level within your system, two anti-virus programs that 
compete for access to the same files or that perform critical 
operations can make your system very unstable.

If your computer runs Windows NT Workstation v4.0 or Windows 2000 
Professional, Setup next asks you which security mode you want to use 
to run VirusScan software on your system (see 

Figure 2-5 on page 41

).

The options in this panel govern whether others who use your computer 
can make changes to the configuration options you choose, can schedule 
and run tasks, or can enable and disable VirusScan components. 
VirusScan software includes extensive security measures to ensure that 
unauthorized users cannot make any changes to software configurations 
in Maximum Security mode. The Standard Security mode allows all 
users to have access to all configuration options.

Either option you choose here will install the same VirusScan version, 
with the same configuration options, and with the same scheduled tasks 
for all system users.

Содержание AVDCDE-AA-AA - Active Virus Defense Suite

Страница 1: ...McAfee VirusScan Anti Virus Software User s Guide Version 4 5...

Страница 2: ...rTelnet Pretty Good Privacy PrimeSupport RecoverKey RecoverKey International ReportMagic RingFence Router PM Safe Sound SalesMagic SecureCast Service Level Manager ServiceMagic Site Meter Sniffer Snif...

Страница 3: ...ack xx Reporting new items for anti virus data file updates xxi International contact information xxii Chapter 1 About VirusScan Software 25 Introducing VirusScan anti virus software 25 How does Virus...

Страница 4: ...does the VShield scanner do 87 Why use the VShield scanner 88 Browser and e mail client support 89 Enabling or starting the VShield scanner 90 Using the VShield configuration wizard 95 Setting VShiel...

Страница 5: ...e utility 242 Configuring the AutoUpgrade utility 243 Using the AutoUpgrade and SuperDAT utilities together 252 Chapter 8 Using Specialized Scanning Tools 255 Scanning Microsoft Exchange and Outlook m...

Страница 6: ...me users 304 Network Associates consulting and training 305 Professional Services 305 Total Education Services 306 Appendix C Using the SecureCast Service to Get New Data Files 307 Introducing the Sec...

Страница 7: ...the cost you incur in time and effort to track down the source of the infection and eradicate all of its traces Why worry So why worry about virus infections if most attacks do little harm The problem...

Страница 8: ...ays be with us But knowing a bit about the history of computer viruses and how they work can help you better protect yourself against them Virus prehistory Historians have identified a number of progr...

Страница 9: ...closely guarded mainframe systems dominated the computing world from their bastions in large corporations and universities Nor did the individual users who bought PCs have much use for the sophisticat...

Страница 10: ...ny later generation viruses routinely incorporate functions that infect your hard disk boot sector or MBR even if they use other methods as their primary means of transmission Those same viruses have...

Страница 11: ...ected file s size to easily detectable proportions or would consume enough system resources to point to an obvious culprit their authors also needed to tell them to leave certain files alone They addr...

Страница 12: ...stripped down version of its Visual Basic language included with the suite users could create document templates that would automatically format and add other features to documents created with Word...

Страница 13: ...modules or objects that programmers can write themselves or take from existing sources and fashion into the plug ins applets device drivers and other software needed to power the web Java objects are...

Страница 14: ...vent malicious actions but virus writers and security hackers have found ways around these Because the benefits these innovations bring to the web generally outweigh the risks however most users find...

Страница 15: ...ojan horse or other malicious program for one of your favorite shareware or commercial utilities that is until after the fact Web and Internet access poses its own risks VirusScan anti virus software...

Страница 16: ...curity solutions including the PGP data security and encryption product line the Gauntlet firewall product line the WebShield E ppliance hardware line and the CyberCop Scanner and Monitor product seri...

Страница 17: ...tion If you do not find what you need or do not have web access try one of our automated services If the automated services do not have the answers you need contact Network Associates at one of the fo...

Страница 18: ...oad support To get help with navigating or downloading files from the Network Associates or McAfee websites or FTP sites call Network Associates training For information about scheduling on site train...

Страница 19: ...or virus samples to To report items to the McAfee European research office use these e mail addresses To report items to the McAfee Asia Pacific research office or the office in Japan use one of these...

Страница 20: ...lgique Phone 0032 2 478 10 29 Fax 0032 2 478 66 21 Network Associates do Brasil Rua Geraldo Flausino Gomez 78 Cj 51 Brooklin Novo S o Paulo SP 04575 060 Brasil Phone 55 11 5505 1009 Fax 55 11 5505 100...

Страница 21: ...zo D 1 Via Brescia 28 20063 Cernusco sul Naviglio MI Italy Phone 39 02 92 65 01 Fax 39 02 92 14 16 44 Network Associates Japan Inc Toranomon 33 Mori Bldg 3 8 21 Toranomon Minato Ku Tokyo 105 0001 Japa...

Страница 22: ...65 220 7255 Network Associates Spain Orense 4 4a Planta Edificio Trieste 28020 Madrid Spain Phone 34 9141 88 500 Fax 34 9155 61 404 Network Associates Sweden Datav gen 3A Box 596 S 175 26 J rf lla Sw...

Страница 23: ...uctions in revenue as more businesses move into e commerce and online sales and as virus attacks proliferate VirusScan software first honed its technological edge as one of a handful of pioneering uti...

Страница 24: ...e sun coverage from its Anti Virus Emergency Response Team AVERT Even with the rise of viruses and worms that use e mail to spread that flood e mail servers or that infect groupware products and file...

Страница 25: ...virus code it can instead sample the file at well defined points to look for virus code signatures that indicate an infection The development environment brings as much speed to DAT file construction...

Страница 26: ...macro virus or a file infecting virus ViruLogic looks for virus like behaviors in program functions such as covert file modifications background calls or invocations of e mail clients and other metho...

Страница 27: ...ssed archive files in an attempt to tie up the scanner as it digs through the file looking for infections VirusScan software accurately scans the majority of popular compressed file and archive file f...

Страница 28: ...prevents others from making unauthorized changes The same convenient dialog box controls configuration options for all VShield modules See Using the VShield Scanner on page 85 for details The E Mail S...

Страница 29: ...unning in 16 bit or protected mode it will transfer control to one of the other scanners SCANPM EXE a scanner for 16 and 32 bit environments This scanner provides you with a full set of scanning optio...

Страница 30: ...s Guide describes in detail how to use VirusScan and includes other information useful as background or as advanced configuration options Acrobat PDF files are flexible online documents that contain...

Страница 31: ...vantage of each platform s strengths The next sections discuss other changes that this VirusScan release introduces Installation and distribution features McAfee anti virus products including VirusSca...

Страница 32: ...sScan control panel to run at startup Other changes include New VShield system tray icon states tell you more about which VShield modules are active These states are All VShield modules are active The...

Страница 33: ...e Even with the majority of the virus definitions it requires now incorporated directly into its engine in generic routines VirusScan software still requires regular DAT file updates to keep pace with...

Страница 34: ...About VirusScan Software 34 McAfee VirusScan Anti Virus Software...

Страница 35: ...ped with A processor equivalent to at least an Intel Pentium class or compatible processor McAfee recommends an Intel Pentium processor or Celeron processor running at a minimum of 166 MHz A CD ROM dr...

Страница 36: ...us on page 59 If your copy of VirusScan software came on a CD ROM insert that disc into your computer s CD ROM drive If you inserted a CD ROM you should see a VirusScan welcome image appear automatica...

Страница 37: ...VirusScan software follow these steps 1 If your computer runs Windows NT Workstation v4 0 or Windows 2000 Professional log on to your system as Administrator You must have administrative rights to ins...

Страница 38: ...ee Determining when you must restart your computer on page 54 When your computer restarts Setup will continue from where it left off The Setup welcome panel will appear Figure 2 2 Figure 2 2 Setup wel...

Страница 39: ...3 If your computer runs Windows NT Workstation v4 0 or Windows 2000 Professional Setup will remove the previous VirusScan version but will not preserve any previous VShield scanner settings Figure 2 3...

Страница 40: ...t compete for access to the same files or that perform critical operations can make your system very unstable If your computer runs Windows NT Workstation v4 0 or Windows 2000 Professional Setup next...

Страница 41: ...configure and run their own scan operations with the VirusScan application and save settings for those operations in a VSC file but they cannot change default VirusScan application settings To learn m...

Страница 42: ...tart a scan operation the VirusScan Console the VShield System Scan module the Alert Manager Client configuration utility the Send Virus utility the Emergency Disk utility the VirusScan Command Line s...

Страница 43: ...al hard drive instead You can choose this option only if a component has related modules Remove a component from the installation Click beside a component name then choose This feature will not be ava...

Страница 44: ...igure 2 8 Ready to Install panel 13 Click Install to begin copying files to your hard drive Otherwise click Back to change any of the Setup options you chose Setup first removes any previous VirusScan...

Страница 45: ...ions for your installation You can choose to scan your system create an emergency disk or update your virus definition files before you start the VShield scanner and the VirusScan Console To do so sel...

Страница 46: ...n start the utility at any time after installation Run Default Scan for Viruses after Installation This option is active by default The option tells Setup to finish the installation then to run the Vi...

Страница 47: ...ect directly to the McAfee website and download the latest incremental DAT file updates Select this option if your company has not designated a location on your network as an update site and if you do...

Страница 48: ...he AutoUpdate utility the Automatic Update dialog box will appear Choose your configuration options then click Update Now to start an immediate update operation or click OK to save the options you cho...

Страница 49: ...d line scanner that can scan your hard disk boot sectors and Master Boot Record MBR BOOTSCAN EXE works with a specialized set of DAT files that focus on ferreting out boot sector viruses If you have a...

Страница 50: ...choose Create Emergency Disk The Emergency Disk wizard welcome panel will appear Figure 2 13 Figure 2 13 Emergency Disk welcome panel 1 Click Next to continue The next wizard panel appears Figure 2 1...

Страница 51: ...t If you chose to format your disk with the NAI OS the wizard displays an informational panel Figure 2 15 Figure 2 15 Emergency Disk informational panel Follow these substeps to continue a Insert an u...

Страница 52: ...iles and support files to the floppy disk Skip to Step 3 on page 53 to continue If you do not have a virus free floppy disk formatted with DOS or Windows system files you must create one in order to u...

Страница 53: ...area are both selected Next click Start Windows will format your floppy disk and copy the system files necessary to start your computer e Click Close when Windows has finished formatting your disk the...

Страница 54: ...fe place NOTE A locked or write protected floppy disk shows two holes near the edge of the disk opposite the metal shutter If you don t see two holes look for a plastic sliding tab at one of the disk...

Страница 55: ...ave Novell Client32 for NetWare installed then restart required Restart required Installation on computer with previous VirusScan version Restart required Restart required Installation on computer wit...

Страница 56: ...the line from either of these sources be sure to delete any carriage returns or spaces 2 Save the file with the name EICAR COM The file size will be 69 or 70 bytes 3 Start your VirusScan software and...

Страница 57: ...Software Setup will start and display the first Maintenance wizard panel Figure 2 20 Figure 2 20 First maintenance panel 4 Click Next to continue Setup displays the Program Maintenance wizard panel F...

Страница 58: ...rom the one shown on page 43 It will not allow you to change your VirusScan program directory nor will it display disk usage statistics To install VirusScan software in a different directory or on a d...

Страница 59: ...you expect but it will help eliminate one potential cause of your computer problems The safest course of action you can take is to install VirusScan software then scan your system immediately and tho...

Страница 60: ...mergency Disk Creation utility on page 49 3 Wait at least 15 seconds then start your computer again NOTE If you have your computer s BIOS configured to look for its boot code first on your C drive you...

Страница 61: ...t number are clean or uninfected How many files contain potential infections How many files of that number the scanner cleaned How many boot sector and MBR files the scanner examined How many boot sec...

Страница 62: ...d scanning when you start or shut down your computer each day Use the VShield scanner to examine your computer s memory and maintain a constant level of vigilance between scan operations Under most ci...

Страница 63: ...help when your problem really results from an interrupt conflict it does allow you to eliminate one possible cause With that knowledge you can then go on to troubleshoot your system with a full featur...

Страница 64: ...am then shut the computer down and turn off the power Wait a few seconds before you start the computer again so that the system can clear the other program s code signature strings from memory You hav...

Страница 65: ...esponses Responding when the System Scan module detects a virus How this module reacts when it finds a virus depends on which operating system your computer runs and on Windows 95 and Windows 98 syste...

Страница 66: ...3 2 Full screen Warning System Scan response options This alert message brings your system to a complete halt as it awaits your response No other programs or system operations run on your system unti...

Страница 67: ...ch files it flagged as infected You can then restore deleted files from backup copies Move the file to a different location Click Move File to in the dialog box This opens a browse window you can use...

Страница 68: ...ause the virus has damaged the file beyond repair it will record the incident in its log file and suggest alternative responses In the example shown in Figure 3 3 the module failed to clean the EICAR...

Страница 69: ...through similar channels In its initial configuration the module will prompt you to choose a response from among three options whenever it detects a virus Figure 3 4 A fourth option provides you with...

Страница 70: ...s Internet sites In its initial configuration the module will ask you whenever it encounters a potentially harmful object whether you want to Deny the object access to your system or you want to Conti...

Страница 71: ...its log file but it will take no other action to respond to the virus Right click each infected file listed in the main window then choose an individual response from the shortcut menu that appears C...

Страница 72: ...get with the VShield E Mail Scan module The E Mail Scan module also offers the ability to clean infected file attachments or stop the scan operation a capability that complements the continuous monit...

Страница 73: ...ged the file beyond repair it will record the incident in its log file and suggest alternative responses In the example shown in Figure 3 8 Clean is not an available response option In most cases you...

Страница 74: ...s of payloads it deploys The site lists the most prevalent or riskiest viruses provides a search engine you can use to search for particular virus descriptions alphabetically or by virus name displays...

Страница 75: ...ency DAT files current scan engine versions regular weekly DAT and SuperDAT updates and new incremental virus definition files UPD Beta and first look software Viewing file information If you right cl...

Страница 76: ...endVirus utility to submit a file sample Because the majority of later generation viruses tend to infect document and executable files VirusScan software comes with SENDVIR EXE a utility that makes it...

Страница 77: ...you about your submission enter your name e mail address and any message you would like to send along with your submission in the text boxes provided then click Next to continue NOTE You may submit sa...

Страница 78: ...you want to submit click Next to continue The Choose Upload Options panel appears Figure 3 15 Figure 3 15 Choose Upload options panel If the file you want to submit is a Microsoft Office document or a...

Страница 79: ...or respond in any way to you SENDVIR EXE will use the e mail client you specified to send your sample You must have connected to your network or ISP in order for this process to succeed Capturing boo...

Страница 80: ...cro virus that has infected any of your Microsoft Word Excel or PowerPoint files send these files to McAfee anti virus researchers either with the SENDVIR EXE utility via e mail as floppy disk images...

Страница 81: ...you have a boot virus you must use RWFLOPPY to send your samples electronically otherwise you must send your samples physically on a diskette If you send them electronically without using RWFLOPPY th...

Страница 82: ...age Sending samples via e mail Once you ve made disk images or created a file archive for your samples send them to McAfee researchers at one of these e mail addresses In your message include this inf...

Страница 83: ...AVERT cannot return it to you AVERT does not accept or process Iomega Ditto or Jazz cartridges Iomega Zip disks or other types of removable media In the United States Network Associates Inc Virus Res...

Страница 84: ...Removing Infections From Your System 84 McAfee VirusScan Anti Virus Software...

Страница 85: ...you start your computer and stays in memory until you shut it or your system down The scanner also includes optional features that guard against hostile Java applets and ActiveX controls and that kee...

Страница 86: ...ion for the remaining VShield modules You can protect any or all individual module property pages and set a password to prevent unauthorized changes NOTE Because the VShield scanner runs continuously...

Страница 87: ...ient applications This allows the scanner to log on to and scan your e mail attachments for viruses before they ever reach your computer If you connect to the Internet or work on a network in any capa...

Страница 88: ...enable the VShield scanner at that time If you agree the VShield scanner should load into memory immediately and begin working with a default set of options that give you basic anti virus protection I...

Страница 89: ...ontrol panel on page 277 If your computer runs Windows 95 or Windows 98 the scanner loads in a way that mimics a Windows service on that platform This service is not visible in the Windows user interf...

Страница 90: ...ule names shown without a check mark Module names that have a check mark beside them are active Those without a check mark are inactive If you use this method to enable a module it remains enabled unt...

Страница 91: ...play the VShield shortcut menu point to Properties then choose System Scan to open the VShield Properties dialog box Figure 4 2 VShield Properties dialog box 2 For each module that you want to enable...

Страница 92: ...load it from memory To run any tasks you have scheduled the Console must be active Understanding the VShield system tray icon states The VShield scanner displays four different icon states in the Wind...

Страница 93: ...closely for viruses and malicious software The VShield configuration wizard can help you set up many of these options right away you can then tailor the program to work better in your environment as...

Страница 94: ...as Microsoft Office files The System Scan module will also scan files stored on floppy disks whenever you read from or write to them or when you shut down your computer If it finds a virus the module...

Страница 95: ...Internet but they usually do so through a gateway application run from the server The E Mail Scan module supports corporate e mail systems that fall into two general categories Lotus cc Mail Select t...

Страница 96: ...wnload from the Internet select the Yes do scan my downloaded files for viruses checkbox then click Next to continue The module will look for viruses in those files most susceptible to infection and w...

Страница 97: ...4 8 VShield configuration wizard summary panel 8 If the summary list accurately reflects your choices click Finish to save your changes and return to the VShield Properties dialog box Otherwise click...

Страница 98: ...Figure 4 9 Figure 4 9 System Scan Properties dialog box Detection page Configuring the System Scan module The VShield System Scan module is at the heart of the VShield scanner It scans files that com...

Страница 99: ...le susceptible to virus infection whether on your hard disk or on floppy disks and whether you read the file from or write the file to your hard disk The module will also examine compressed files by d...

Страница 100: ...as outbound NOTE If you have network drives mapped to your computer from which you copy files or if other network users copy files from your computer McAfee strongly recommends that you have the VShie...

Страница 101: ...s that viruses do not spread from compressed files but because the module uncompresses these files before it scans them choosing this option can lengthen the time it takes to scan a given set of files...

Страница 102: ...eckbox 4 Choose VShield software management options These options let you control your interaction with the VShield scanner You can Disable the System Scan module at will Select the System Scan can be...

Страница 103: ...w viruses based on their resemblance to similar viruses that the module already knows To do this the module looks for certain virus like characteristics in the files you ve asked it to scan The presen...

Страница 104: ...h a sufficient number of these characteristics as potential viruses Enable macro and program file heuristics scanning Choose this option to have the module use both types of heuristics scanning McAfee...

Страница 105: ...on which operating system your computer runs Follow these steps 1 Click the Action tab in the System Scan module to display the correct property page Figure 4 12 Figure 4 12 System Scan Properties dia...

Страница 106: ...halt until you choose a response option GUI Click this button to see a standard graphical alert message that also offers a range of response options This range will not include Continue access As the...

Страница 107: ...on computers that run Windows 95 or Windows 98 and only when you choose the BIOS prompt mode Move infected files automatically Choose this response to have the module move infected files to a quaranti...

Страница 108: ...anges without closing the System Scan Properties dialog box click Apply To save your changes and close the dialog box click OK To close the dialog box without saving your changes click Cancel NOTE Cli...

Страница 109: ...e the setting for this option only if you select Prompt for user action in the Action property page Otherwise the checkbox will display and use the setting it had when you last chose the Prompt for us...

Страница 110: ...ote which settings you used to detect and respond to the infections the System Scan module found You can also use the incident reports recorded in the file to determine which files you need to replace...

Страница 111: ...tem down You can choose to record any of this information Virus Detection Select this checkbox to have the log file record how many viruses the module finds during each scan session Clear the checkbox...

Страница 112: ...close the dialog box click OK To close the dialog box without saving your changes click Cancel NOTE Clicking Cancel will not undo any changes you already saved by clicking Apply Choosing Exclusion op...

Страница 113: ...ble to virus infection To choose your options follow these steps 1 Click the Exclusion tab in the System Scan module to display the correct property page Figure 4 16 Figure 4 16 System Scan Properties...

Страница 114: ...ckbox c Select the File scanning checkbox to exclude the item you specified in the first step when the module looks for file infecting viruses These viruses usually appear in files stored in the visib...

Страница 115: ...for viruses in earlier cc Mail versions This module can work with the Download Scan module to examine messages that arrive via POP 3 or SMTP e mail client programs such as Eudora Netscape Mail or Out...

Страница 116: ...t yet logged into your e mail system the module will prompt you to choose a profile or enter account information as soon as a scan session starts even before you ve logged into your e mail account Thi...

Страница 117: ...8 0 or later so that it uses the same protocol as earlier cc Mail versions To verify which system you use check with your network administrator NOTE You can select only one corporate e mail system at...

Страница 118: ...e module checks once every minute Be sure to set an interval shorter than the interval you set to receive your e mail so that module has an opportunity to detect any viruses before they reach your com...

Страница 119: ...ogram File Extensions dialog box See Adding file name extensions for scanning on page 287 and Current list of vulnerable file name extensions on page 288 to learn which file name extensions this modul...

Страница 120: ...use Your choices are Enable macro heuristics scanning Choose this option to have the E Mail Scan module identify all Microsoft Word Microsoft Excel and other Microsoft Office files that contain embedd...

Страница 121: ...it should do with the infected file or by taking an action that you determine ahead of time Use the Action property page to specify which response options you want the module to give you when it find...

Страница 122: ...module to try to remove the virus code from the infected file If you have its reporting function enabled it will record a log event each time it successfully cleans or fails to clean an infected file...

Страница 123: ...nable its reporting feature so that you have a record of which files the module deleted You will need to restore deleted files from backup copies See Choosing Report options on page 127 for details Co...

Страница 124: ...ers Follow these steps 1 Click the Alert tab in the E mail Scan module to display the correct property page Figure 4 23 Figure 4 23 E mail Scan Properties dialog box Alert page 2 Select the Notify Ale...

Страница 125: ...fections spread You can also choose to send a messages to any recipient without replying to the source of the infected attachment The E Mail Scan module can draw recipients directly from your Microsof...

Страница 126: ...Whenever it detects a virus the module will send a copy of this message to each person who sends you e mail with an infected attachment It fills in the recipient s address with information found in th...

Страница 127: ...anges click Cancel NOTE Clicking Cancel will not undo any changes you already saved by clicking Apply Choosing Report options The E mail Scan module lists its current settings and summarizes all of th...

Страница 128: ...lect this checkbox the log file can grow to as large a size as your disk space or file system permits Enter a value between 10KB and 999KB By default the System Scan module limits the file size to 100...

Страница 129: ...ow many infected files the module deleted How many infected files the module moved to a quarantine folder Your E Mail Scan module settings Clear the checkbox to leave this information out Virus Cleani...

Страница 130: ...automatic actions in response You can have it report what it has done either with an alert message when it takes the action or in a log file you can examine at your leisure It can even send a message...

Страница 131: ...select the Program files only button To see or designate the file name extensions that the Download Scan module will examine click Extensions to open the Program File Extensions dialog box Figure 4 1...

Страница 132: ...resemblance to similar viruses that the module already knows To do this the module looks for certain virus like characteristics in the files you ve asked it to scan The presence of a sufficient numbe...

Страница 133: ...t number of these characteristics as potential viruses Enable macro and program file heuristics scanning Choose this option to have the module use both types of heuristics scanning McAfee recommends t...

Страница 134: ...in the Download Scan module to display the correct property page Figure 4 28 Figure 4 28 Download Scan Properties dialog box Action page 2 Choose a response from the When a virus is found list The ar...

Страница 135: ...ave its reporting options enabled the module records the incident in its log file Move infected files to a folder Choose this response to have the module move infected files to a quarantine folder as...

Страница 136: ...re it with the response options you want in the Action page you can let the Download Scan module look for and remove viruses from your system automatically as it finds them with almost no further inte...

Страница 137: ...r user action in the Action property page Otherwise the checkbox will display and use the setting it had when you last chose the Prompt for user action item The module will sound the standard system w...

Страница 138: ...can serve as an important management tool for you to track virus activity on your system and to note which settings you used to detect and respond to the infections the Download Scan module found You...

Страница 139: ...ou can choose to record any of this information Virus Detection Select this checkbox to have the log file record how many viruses the module finds during each scan session Clear the checkbox to leave...

Страница 140: ...t they exist Most browser software includes a feature that allows you to block Java applets or ActiveX controls altogether or to turn on security features that authenticate objects before downloading...

Страница 141: ...lter checkbox is selected This activates the options in the rest of the property page 2 Specify which objects you want the Internet Filter module to examine Your options are ActiveX Controls Select th...

Страница 142: ...ownload hostile Java or ActiveX objects to your machine as soon as you connect You can add other sites then password protect your settings to ensure that users do not delete them Each address consists...

Страница 143: ...f you know the correct subnet mask value for the site you want to avoid Otherwise leave the default value shown c Click OK to return to the Banned IP addresses dialog box Select one of the items shown...

Страница 144: ...ser to request the resource via the Hyper Text Transport Protocol http from a computer named www on a network domain named domain com Other transport protocols include ftp and gopher The Internet s Do...

Страница 145: ...nd either by asking you whether it should block the object or site or by automatically blocking it Use the Action property page to specify which of these courses you want the module to take By default...

Страница 146: ...og box without saving your changes click Cancel NOTE Clicking Cancel will not undo any changes you already saved by clicking Apply Choosing Alert options Once you configure it with the response option...

Страница 147: ...e the setting for this option only if you select Prompt for user action in the Action property page Otherwise the checkbox will display and use the setting it had when you last chose the Prompt for us...

Страница 148: ...t file for it to use You can then open and print the log file for later review from any text editor Use the Report property page to designate the file you want to serve as the Internet Filter log and...

Страница 149: ...off 4 Click a different tab to change any of your Internet Filter settings or click one of the icons along the side of the Internet Filter Properties dialog box to choose options for a different modul...

Страница 150: ...Enable password protection checkbox The options in the rest of the property page activate Figure 4 39 Figure 4 39 Security Properties dialog box Password page 2 Decide whether to protect the property...

Страница 151: ...4 Click any of the other Security module tabs to protect individual property pages To save your password without closing the Security Properties dialog box click Apply If you chose to protect all pro...

Страница 152: ...rity Properties dialog box System Scan page 2 Select the settings you want to protect in the list shown You may protect any or all of a module s property pages Protected property pages display a locke...

Страница 153: ...lation Setup asks if you want to enable the VShield scanner at that time If you agree the VShield scanner should load into memory immediately and begin working with a default set of options that give...

Страница 154: ...ntrol panel The VShield scanner will not stop or unload at this point but it will not start when you next start your computer Stopping the VShield scanner completely You can stop the VShield scanner c...

Страница 155: ...k list then choose Disable from the Task menu the Console will stop the VShield scanner and all of its modules and unload them from memory The VShield icon will disappear from the Windows taskbar 3 Cl...

Страница 156: ...l active VirusScan components will stop close all open windows or dialog boxes remove their icons from the Windows system tray and unload from memory 4 Click OK to close the control panel Disabling th...

Страница 157: ...you enable the VShield icon will display a different state To learn what each icon state means see Understanding the VShield system tray icon states on page 92 Method 2 Use the System Scan Status dial...

Страница 158: ...e checkbox at the top of each module page As you do so the scanner will disable that module and make all of the configuration options in that page unavailable Depending on which modules you disable th...

Страница 159: ...s it scanned the number of infections it found and the number it moved or deleted Internet Filter This module reports the number of Java and ActiveX objects or Internet sites it has scanned and the nu...

Страница 160: ...ield Task Properties dialog box 3 Click the tab that corresponds to the program component that you want to enable or disable or whose progress you want to check The status page will list the results o...

Страница 161: ...s second method as on demand scanning The term on demand means that you as a user control when the application starts and ends a scan operation which targets it examines what it does when it finds a v...

Страница 162: ...etect the virus until it deploys its payload The VirusScan application however can detect a virus as it lies in wait for an opportunity to run Viruses are sneaky Accidentally leaving a floppy disk in...

Страница 163: ...ou choose depends on what sort of scan operation you want to run When you first start it the application window opens so that you can make changes to its configuration You must click Scan Now or Run N...

Страница 164: ...your response reporting alerting and exclusion options in each tabbed property page To learn about Advanced options see Configuring the VirusScan Advanced interface on page 174 Next click the New Scan...

Страница 165: ...tem with your left mouse button after your mouse cursor changes to You can see these same help topics if you right click an element in the VirusScan window then choose What s This from the menu that a...

Страница 166: ...nt it to do when it finishes To set configuration options for the task click the Configure button at the bottom of the property page To learn about how to configure your scan task see Configuring Viru...

Страница 167: ...d You can also change those settings on the fly before you run your scan task To do so either Follow Step Step 1 and Step 2 above to open the VirusScan application window then change your configuratio...

Страница 168: ...y drives with DOS style names C or D for example and give complete path names for directories according to the conventions available for your operating system You may use long names on Windows NT Work...

Страница 169: ...ou can start a scan operation with the options you ve chosen at any point simply click Scan Now To save your changes as default scan options choose Save As Default from the File menu or click New Scan...

Страница 170: ...can targets whether they reside on your system or on other computers on your network You cannot select My Computer Network Neighborhood or multiple volumes as scan targets from VirusScan Classic to ch...

Страница 171: ...ore safely narrow the scope of your scan operations to those files most susceptible to virus infection To do so click the Program files only button To see or designate the file name extensions the app...

Страница 172: ...es to a quarantine folder as soon as it finds them By default the application moves these files to a folder named Infected located in the VirusScan program directory You can enter a different name in...

Страница 173: ...to alert you when it finds a virus You can use the Report page to enable or disable this alert or to add an alert message to the Virus Found dialog box that appears when the application finds an infe...

Страница 174: ...log file size select the Limit size of log file to checkbox then enter a value for the file size in kilobytes in the text box provided Enter a value between 10KB and 999KB By default VirusScan softwa...

Страница 175: ...chosen from unauthorized changes choose Password Protect from the Tools menu to open the Password Protection dialog box To learn how to configure the settings for this dialog box see Enabling password...

Страница 176: ...a scan target from the list provided Your choices are My Computer This tells the application to scan all drives physically attached to your computer or logically mapped via Windows Explorer to a driv...

Страница 177: ...de subfolders checkbox to have the VirusScan application also look for viruses in any folders inside your scan target NOTE Choosing Include subfolders causes the application to scan only those files s...

Страница 178: ...ns NOTE McAfee recommends that you choose this option for your first scan operation or periodically thereafter to ensure that your system is virus free You can then limit the scope of later scan opera...

Страница 179: ...Select the types of heuristics scanning you want the VirusScan application to use Your choices are Enable macro heuristics scanning Choose this option to have the application identify all Microsoft Wo...

Страница 180: ...roperty page to specify which response options you want VirusScan software to give you when it finds a virus or which actions you want it to take on its own Follow these steps 1 Click the Action tab i...

Страница 181: ...er Move infected files automatically Choose this response to have the application move infected files to a quarantine folder By default the application moves these files to a folder named Infected loc...

Страница 182: ...m with almost no further intervention To have the application tell you immediately when it finds a virus so that you can take appropriate action however configure it to send an alert message to you Fo...

Страница 183: ...audible alert you can change the setting for this option only if you choose Prompt for user action in the Action property page If you do not choose that item in the Action page no alert box will appe...

Страница 184: ...dvanced window to display the correct property page Figure 5 16 Figure 5 16 VirusScan Advanced Report page 2 Select the Log to file checkbox By default the VirusScan application writes log information...

Страница 185: ...ation out of the log file Infected file move Select this checkbox to have the log file record how many viruses the application moves to a quarantine folder during each scan operation Clear this checkb...

Страница 186: ...Once you scan your system thoroughly you can exclude the files and folders that do not change or that are not normally vulnerable to virus infection You can also rely on the VShield scanner to provid...

Страница 187: ...t to exclude You can Add files folders or volumes to the exclusion list Click Add to open the Add Exclude Item dialog box Figure 5 18 Figure 5 18 Add Exclude Item dialog box Next follow these substeps...

Страница 188: ...or in files that reside in your hard disk s boot sector or master boot record Use this option to exclude system files such as COMMAND COM from scan operations WARNING McAfee recommends that you do no...

Страница 189: ...Advanced window to open the Password Protection dialog box Figure 5 19 Figure 5 19 Password Protection dialog box 2 Select the settings you want to protect in the list shown You may protect any or al...

Страница 190: ...Using the VirusScan application 190 McAfee VirusScan Anti Virus Software...

Страница 191: ...and view log files and copy and paste task definitions within the Console window For a complete overview of functions available from within the Console window see Using the Console window on page 194...

Страница 192: ...you start your computer that scan all drives included in the My Computer group that scan your C drive and that update VirusScan software data files and program components You can enable any of the de...

Страница 193: ...tomatically at startup by choosing Load at startup from the View menu the Console window initially shows a list of default tasks that come with the Console pre configured and ready to run A task is a...

Страница 194: ...Console window then choose Properties from the Task menu or click in the Console toolbar A Task Properties dialog box will appear To learn how to schedule and enable a task see Enabling tasks on page...

Страница 195: ...ion Library you must have an Internet connection and web browsing software available on your computer Open the online help file Choose Help Topics from the Help menu or click in the Console toolbar to...

Страница 196: ...nsole window to the foreground Right clicking the icon displays a shortcut menu Quit VirusScan Console Choose Exit from the Task menu to quit the Console If you have any tasks pending you should minim...

Страница 197: ...o download files internally You must also schedule and activate the task to get it to update your files In other respects this task closely resembles the AutoUpgrade task To learn how to schedule and...

Страница 198: ...the Task Properties dialog box If the scanner is inactive this button will read Enable Open the VShield configuration property pages Click Configure to open the System Scan dialog box where you can c...

Страница 199: ...g box To work with either task open the Console window then follow these steps 1 Double click the AutoUpgrade or the AutoUpdate task in the Console window The Task Properties dialog box will appear Fi...

Страница 200: ...changes without closing the Task Properties dialog box then click the Schedule tab To learn how to set a task schedule see Enabling tasks on page 204 Click OK to save your changes and return to the Vi...

Страница 201: ...Figure 6 5 Figure 6 5 Task Properties dialog box Program page 2 Type a name for the task in the Description text box Be sure that your name describes the task so that you can distinguish it from other...

Страница 202: ...the task runs to see but not change the configuration options the task uses as it runs to see the results of the scan operation or to stop the operation at any time You can also choose any of the comm...

Страница 203: ...Configure to set the properties for this task This opens the VirusScan Properties dialog box Here you can tell the VirusScan application where and what to look for during this scan operation how to re...

Страница 204: ...onsole is active at the time you want your task to run To learn how to start the Console see Starting the VirusScan Console on page 192 To run a scan task that uses the VirusScan application you must...

Страница 205: ...d Daily This runs your task once at the time you specify on the days you indicate Enter the time in the text box provided then select the checkboxes in the Start At area for each day that you want the...

Страница 206: ...a time window of one hour the task would run at any point in the period between 14 30 and 15 30 You may set a window of up to 480 minutes or eight hours 6 You have now set a schedule for your task an...

Страница 207: ...operation this task conducted and the name of the last file it scanned To see a short description of each of the items that appears in this page right click a figure or label then choose What s This f...

Страница 208: ...ruses whether you want to protect the settings you chose from unauthorized changes The VirusScan Console provides a series of property pages you can use to define your task These property pages replic...

Страница 209: ...dialog box Figure 6 9 Figure 6 9 Add Scan Item dialog box To scan your entire computer or a subset of the drives on your system or your network click the Select item to scan button then a Choose a sca...

Страница 210: ...b Select the Include subfolders checkbox to have the VirusScan application look for viruses in any folders inside your scan target NOTE Choosing Include subfolders causes the application to scan only...

Страница 211: ...McAfee recommends that you choose this option for your first scan operation or periodically thereafter to ensure that your system is virus free You can then limit the scope of later scan operations Ch...

Страница 212: ...stics scanning you want the VirusScan application to use Your choices are Enable macro heuristics scanning Choose this option to have the application identify all Microsoft Word Microsoft Excel and ot...

Страница 213: ...n tab to choose additional VirusScan options To save your changes without closing the VirusScan Properties dialog box click Apply To save your changes and return to the Console window click OK To retu...

Страница 214: ...s an option button to appear in an alert message that the application displays when it finds a virus Selecting Delete file here for example causes a Delete button to appear in the alert message To lea...

Страница 215: ...pplication to remove the virus code from the infected file as soon as it finds it If the application cannot remove the virus it will note the incident in its log file Delete infected files automatical...

Страница 216: ...the task list then click in the Console toolbar 2 The VirusScan Properties dialog box appears see Figure 6 8 on page 208 Click the Alert tab to display the correct property page Figure 6 13 Figure 6...

Страница 217: ...n infected file As with the audible alert you can change the setting for this option only if you choose Prompt for user action in the Action property page If you do not choose that item in the Action...

Страница 218: ...data the application will record and how large the log file can get follow these steps 1 To start from the Console window select the task you created in the task list then click in the Console toolba...

Страница 219: ...ct this checkbox to have the log file record how many infected files the application cleans or tries to clean during each scan operation Clear this checkbox to leave this information out of the log fi...

Страница 220: ...NOTE Clicking Cancel will not undo any changes you already saved by clicking Apply Choosing Exclusion options Many of the files stored on your computer are not vulnerable to virus infection Scan opera...

Страница 221: ...ximum number of exclude items text box To learn more about how to use the VirusScan control panel see Understanding the VirusScan control panel on page 277 To exclude files or folders from scan operat...

Страница 222: ...ubfolders themselves The application will still scan files stored at the root level of the folder you designate To exclude the files at the folder root level clear the Include subfolders checkbox c Se...

Страница 223: ...VirusScan software lets you set a password to protect the settings you choose in each property page from unauthorized changes This feature is particularly useful for system administrators who need to...

Страница 224: ...ection from a property page click the locked padlock icon to unlock it 4 Click Password to open the Specify Password dialog box Figure 6 18 Figure 6 18 Specify Password dialog box a Enter a password i...

Страница 225: ...settings To save your changes without closing the VirusScan Properties dialog box click Apply To save your changes and return to the Console window click OK To return to the Console window without sa...

Страница 226: ...Creating and Configuring Scheduled Tasks 226 McAfee VirusScan Anti Virus Software...

Страница 227: ...eleases new DAT files weekly to provide protection against the approximately 300 new viruses that appear each month With this VirusScan release McAfee has introduced a new incremental DAT or iDAT tech...

Страница 228: ...Update utility on page 230 and Understanding the AutoUpgrade utility on page 240 Incremental DAT file updates The new McAfee iDAT technology works transparently with the included AutoUpdate version Th...

Страница 229: ...tware A DAT package consists of an archived ZIP file named DAT XXXX ZIP The XXXX in the file name is a series number that changes with each DAT file release McAfee does not recommend this method to up...

Страница 230: ...le To use it to update your VirusScan software you must Set a schedule for the AutoUpdate task and enable it to run Set a password to protect your configuration settings if you wish Configure the task...

Страница 231: ...s Keeping update traffic primarily internal can also reduce the potential for network security breaches Reduce the likelihood that you will need to wait to download new DAT files Traffic on McAfee ser...

Страница 232: ...rade and AutoUpdate tasks on page 199 To learn how to set a schedule for the task see Enabling tasks on page 204 2 Click Configure The Automatic Update dialog box appears with the Update Sites propert...

Страница 233: ...ions on page 235 Figure 7 2 Automatic Update Properties dialog box Update Options page Change definitions for an existing update site Select a site shown in the update site list then click Edit to ope...

Страница 234: ...s not find new DAT files it will connect to each of the other sites listed until it finds the most current DAT files available If you have the Force Update option selected AutoUpdate will download any...

Страница 235: ...ons stop it When the file reaches the maximum size you set the AutoUpdate utility first clears it then starts the log again from where it left off To see the contents of the log file from VirusScan Co...

Страница 236: ...onfiguration to look for new files on your local computer or on a computer elsewhere on your network Your network settings will govern how the utility attempts the connection and how long it waits bef...

Страница 237: ...onnect to a site set for anonymous FTP login or you must designate the user name and password for an account on the site To have the utility use an anonymous login select the Use anonymous FTP login c...

Страница 238: ...AutoUpdate utility rename existing VirusScan DAT files before it installs new files To rename each file the utility appends the extension SAV to the existing file name and extension CLEAN DAT for exa...

Страница 239: ...twork Associates recommends that you use this option with extreme caution If you have configured your AutoUpdate task to connect to a server that stores older DAT file versions you can reduce the effe...

Страница 240: ...nd file name for the program you want to run or click Browse to locate the program on your hard disk 3 To save your changes and return to the Automatic Update dialog box click OK To close the dialog b...

Страница 241: ...ecify one convenient update time when you first deploy VirusScan software but set the AutoUpgrade utility to trigger at a random interval within 60 minutes of that time or set a schedule that phases i...

Страница 242: ...this task To display the Automatic Upgrade dialog box follow these steps 1 Double click the AutoUpgrade task in the Console task list to open its Task Properties dialog box Figure 7 6 Figure 7 6 Auto...

Страница 243: ...ether or not the AutoUpgrade utility can connect with the site You will not see any sites listed initially because the AutoUpgrade utility does not come configured to connect to any upgrade site You m...

Страница 244: ...7 8 Make the changes you want to make then click OK to save them and return to this dialog box To see descriptions and instructions for configuring the available options see Configuring upgrade optio...

Страница 245: ...7 9 Automatic Upgrade dialog box Log Activity page 5 Select the Log activity into the Activity Log File checkbox By default the AutoUpgrade utility records what happens during update attempts and save...

Страница 246: ...Click OK to save your changes and close the Automatic Upgrade dialog box Click Cancel to close the dialog box without saving your changes Configuring upgrade options To create a new update site or ch...

Страница 247: ...stops the connection attempt Next use Universal Naming Convention UNC notation to enter the path to the computer that holds the new files you want to download in the text box labeled Select a Computer...

Страница 248: ...elect the Use anonymous FTP login checkbox To specify an account clear the Use anonymous FTP login checkbox then click FTP login information to enter a user name and password for an account that has a...

Страница 249: ...also selects the Save the Upgrade files for later usage checkbox To tell AutoUpgrade where to save the program file archive enter a path and folder name in the text box below this checkbox or click B...

Страница 250: ...the XXXX refers to the SuperDAT version number included as part of the file name 2 Download the file AUTOUPG ZIP which you will find on the Network Associates FTP site in this location ftp username p...

Страница 251: ...t the target computer if it must do so in order to finish updating or upgrading your anti virus software If you do not want the target computer to restart after it updates your files set the value of...

Страница 252: ...pies on your workstation computers to download new files from the share you created on that central server The AutoUpgrade utilities will download and install the new files from this package To learn...

Страница 253: ...as VBS BUBBLEBOY demonstrated might even be able to work without users having to open or read even the e mail message itself The Microsoft Exchange and Outlook e mail clients are particularly vulnerab...

Страница 254: ...n catch infections before they spread or do any harm Using the E Mail Scan extension To use the E Mail Scan Extension you must install VirusScan software with a Custom installation and choose the E Ma...

Страница 255: ...finds an infected file the E Mail Scan extension will ask you how to respond to the virus See Responding when the E Mail Scan extension detects a virus on page 72 for details Configuring the E Mail Sc...

Страница 256: ...ft Exchange or Outlook client and log in to your e mail server NOTE If you have already logged into the network domain that hosts your e mail server you might not need to log into to your e mail serve...

Страница 257: ...their own regular scan operations unless you specifically exclude them To change these settings follow these steps 1 Choose which e mail messages you want the E Mail Scan extension to examine for viru...

Страница 258: ...list of compressed files scanned on page 292 Scan all files Select the All Files checkbox to have the E Mail Scan extension scan all file types in your mailbox whatever their file name extensions NOT...

Страница 259: ...you want the E Mail Scan extension to use Your choices are Enable macro heuristics scanning Choose this option to have the extension identify all Microsoft Word Microsoft Excel and other Microsoft Off...

Страница 260: ...extension detects a virus it can respond either by asking you what it should do with the infected file or by automatically taking an action that you determine ahead of time Use the Action property pag...

Страница 261: ...o a quarantine folder The alert message will display a Move file to button that allows you to send the infected item to a quarantine folder on your Microsoft Exchange server You can move infected item...

Страница 262: ...e names of infected files so that you can delete them at your next opportunity WARNING The E mail Scan extension will not try to break any encrypted messages to scan them If an infected attachment inc...

Страница 263: ...o set up the Alert Manager Client Configuration utility See Using the Alert Manager Client Configuration utility on page 281 for details You can pass alert messages directly to an Alert Manager server...

Страница 264: ...tension will not give you an opportunity to edit the message before it sends it You may send one message to reply to the source of the infected message and a different message to other recipients but...

Страница 265: ...p d above In this case however you can fill out both the To and the Cc text boxes Whenever it detects a virus the E Mail Scan extension sends a copy of this message to all of the addresses that you en...

Страница 266: ...AILSCAN TXT You can have E Mail Scan write its log to this file or you can use any text editor to create a text file for E Mail Scan to use You can then open and print the log file for later review fr...

Страница 267: ...ccess Error message when it detects a virus 3 To minimize the log file size select the Limit size of log file to checkbox then enter a value for the file size in kilobytes in the text box provided If...

Страница 268: ...w many files the extension examined How many infected files the extension cleaned How many infected files the extension deleted How many infected files the extension moved to a quarantine folder Your...

Страница 269: ...it can get access to your cc Mail server and scan your Inbox Enter your cc Mail user name and password just as if you were logging directly into cc Mail then click OK to continue Next start your cc Ma...

Страница 270: ...ws taskbar point to Settings then choose Control Panel 2 Locate and double click the Display control panel in the window that appears in order to open the Display Properties dialog box Next click the...

Страница 271: ...o the folder you want scanned or click Browse to locate the scan target on your computer All fixed drives This tells the utility to scan hard disks physically connected to your computer When you ve ch...

Страница 272: ...specified whatever their extensions NOTE McAfee recommends that you choose this option for your first scan operation or periodically thereafter to ensure that your system is virus free You can then l...

Страница 273: ...teps a Select the Enable heuristics scanning checkbox The remaining options in the dialog box activate b Select the types of heuristics scanning you want the ScreenScan utility to use Your choices are...

Страница 274: ...eft off If you do not select this checkbox the utility will begin its scan operation again from the root level of the first drive you specified as a scan target each time your screen saver starts to r...

Страница 275: ...ut your system down If you would prefer to log this data to a different text file enter its path and filename in the text box provided or click Browse to locate the file The ScreenScan utility will no...

Страница 276: ...Using Specialized Scanning Tools 276 McAfee VirusScan Anti Virus Software...

Страница 277: ...iling for the number of scan targets the VirusScan application can examine or exclude during a scan session limit the number of scan tasks that you can create configure and run from the VirusScan Cons...

Страница 278: ...ad into memory the Console and the VShield scanner normally are inactive this button will read Start Click it to reload inactive VirusScan components You can also restart the VirusScan application and...

Страница 279: ...Figure 9 2 VirusScan control panel Components page 5 To have the VShield scanner load when you start your computer select the Load VShield on startup checkbox This same setting appears in the System S...

Страница 280: ...ve the VirusScan Console start as soon as you start your computer The Console must be running in order to execute any tasks you have scheduled including scan tasks AutoUpgrade tasks and AutoUpdate tas...

Страница 281: ...need a method to collect and manage alert messages from all over the network in a central repository so that you can respond whenever any workstation detects an infected file McAfee provides Alert Ma...

Страница 282: ...tor software to tie alert messages into the Network Associates Magic HelpDesk application for trouble ticket generation and other features Alert Manager messages also contain much richer data than do...

Страница 283: ...Configuration The Alert Manager Client Configuration page appears Figure 9 3 2 Figure 9 3 Alert Manager Client Configuration dialog box 2 Verify that the Disable Alerting checkbox is clear This activ...

Страница 284: ...enter just the computer name The Alert Manager Client Configuration utility will validate the form of the name you enter here but will not verify that the Alert Manager server exists on the target com...

Страница 285: ...en a destination click OK to close the dialog box You can designate any directory on your network as a destination for Centralized Alerting messages but the directory must contain a copy of the file C...

Страница 286: ...oftware running somewhere on your network VirusScan software comes packaged with a Management Information File AMG MIF that identifies VirusScan alerting attributes to your DMI client application The...

Страница 287: ...shown in the Program Extensions dialog box follow these steps 1 Click Extensions in the Detection property page for whichever VirusScan component you are configuring 2 The Program File Extensions dial...

Страница 288: ...ee recommends that you scan your system thoroughly during your first scan operation or periodically thereafter without limiting the scope of the scan operation to these file types This ensures that yo...

Страница 289: ...m Executable files Most software uses this extension to identify files that start its command shell or program kernel GMS Macro Corel Global Macro Storage files GZ Compressed UNIX GNU Gzip compressed...

Страница 290: ...are in their own right OLE Program Microsoft Object Linking and Embedding object files These files are similar to ActiveX controls They are files created in one application to be embedded in another a...

Страница 291: ...es Later Visio versions include infectable scripting extensions VXD Program Windows virtual device drivers These are executable fiels that often reside in memory WBK Macro Microsoft Word backup files...

Страница 292: ...marizes how each VirusScan component treats each file type Table 9 1 Compressed file and archive scanning treatment VirusScan component Archived file Compressed file VirusScan application Select the C...

Страница 293: ...if listed in Program Extensions dialog box Scans compressed file if listed in Program Extensions dialog box TD0 Teledisk compressed file Scans compressed file if listed in Program Extensions dialog bo...

Страница 294: ...rchive Scans files within archive Scans archive as a file if listed in the Program Extensions dialog box Will not scan files within archive TAR UNIX tape archive file Scans archive Scans files within...

Страница 295: ...ort under the Network Associates Corporate PrimeSupport program If you are a home user you can choose a plan geared toward your needs from the Home User PrimeSupport program PrimeSupport options for c...

Страница 296: ...lan The PrimeSupport Connect plan gives you telephone access to essential product assistance from experienced technical support staff members With this plan you get In North America unlimited toll fre...

Страница 297: ...nlimited telephone access to technical support at standard long distance or international rates Monday through Friday from 9 00 a m to 5 00 p m Central Time Priority access to technical support staff...

Страница 298: ...at intervals you designate Committed response times from your support engineer who will respond to pages within half an hour to voice mail within one hour and to e mail within four hours Assignable c...

Страница 299: ...pe Middle East Africa 9am 6pm local time Asia Pacific 8 a m 6 p m AEST Latin America 9 a m 5 p m CT Monday Friday after hours emergency access North America 8 a m 8 p m CT Europe Middle East Africa 9a...

Страница 300: ...et download upgrade login asp Free 24 hour per day seven days per week access to online or electronic support through the Network Associates voice and fax system the Network Associates website and thr...

Страница 301: ...iness hours Monday through Friday from 7 00 a m to 6 00 p m Pacific Time You call a toll free number use a credit card to take care of the transaction and get transferred to the technical support team...

Страница 302: ...lan Pay Per Incident Plan Pay Per Minute Plan Online Upgrades Plan or Quarterly Disk CD Plan for your Network Associates products In North America call Network Associates Customer Service at 972 855 7...

Страница 303: ...network performance Network Associates consultants also develop and deliver custom solutions to help accomplish your project goals from lengthy large scale implementations to brief problem solving as...

Страница 304: ...p_set services introduction default asp Total Education Services Network Associates Total Education Services builds and enhances the skills of all network professionals through practical hands on inst...

Страница 305: ...re a corporate customer you must first have a grant number or product serial number to subscribe to the Enterprise SecureCast channel If you do not have a grant number please contact your purchasing a...

Страница 306: ...ion properly with newer scan engines When the older scan engine version becomes obsolete Network Associates will discontinue development of DAT files for it You should upgrade your software before you...

Страница 307: ...indows 98 Windows NT or Windows 2000 At least 10MB free hard disk space plus sufficient space for product and other downloads An active Internet connection direct or dial up for a minimum of one hour...

Страница 308: ...ackWeb client welcome panel 3 Read the instructions and warnings on this panel then click Next to continue 4 The BackWeb license agreement appears Figure C 2 Figure C 2 BackWeb Software License Agreem...

Страница 309: ...ion for Setup to install the client software if you wish or click Browse to locate a suitable folder Click Next to continue Setup will begin to copy BackWeb program files to your computer As it does s...

Страница 310: ...el appears Figure C 5 Figure C 5 Communication Method panel 9 Choose a communication method Your choices are HTTP Choose this option if you can connect directly to the Internet without going through a...

Страница 311: ...server in the Proxy text box then enter the port the server uses for communication in the Port text box When you have finished click Next to continue The Proxy Authentication panel appears Figure C 7...

Страница 312: ...n Phase 2 Register with the Enterprise SecureCast service After you install the BackWeb client and start it the SecureCast service immediately opens the client application and sends its first InfoPak...

Страница 313: ...Cast service site or your site the window might not list any InfoPaks In that case minimize or close the BackWeb window After some time you will receive a Flash message Click the flashing message then...

Страница 314: ...the grant number you received when you purchased your software or that you received from Network Associates Customer Service NOTE If your company is not a subsidiary of another company clear the Subsi...

Страница 315: ...work requires you to connect to the Internet through a proxy server select the Use HTTP proxy at address checkbox then enter the server name or its Internet Protocol IP address in the text box provide...

Страница 316: ...ill connect to the Network Associates SecureCast service electronic customer care page If you are a corporate user the window resembles the one shown in Figure C 16 Figure C 16 SecureCast Electronic C...

Страница 317: ...from the SecureCast service You can stop the SecureCast service from delivering InfoPaks at any time you want to To do so right click the BackWeb icon in your Windows system tray then choose Start Se...

Страница 318: ...rvice to Get New Data Files 318 McAfee VirusScan Anti Virus Software BackWeb client For a comprehensive guide to BackWeb including additional troubleshooting advice see the online BackWeb User s Manua...

Страница 319: ...uch faster and at a far lower cost in bandwidth than ever before Better still the AutoUpdate utility makes this process completely transparent it will download as many incremental DAT files as it need...

Страница 320: ...ld extract and install all of the virus definition files it needed to bring your existing DAT files up to date The utility finds the information it needs to determine which packages to download in the...

Страница 321: ...e the iDAT files patch the existing DAT files you may not download the iDAT files through the AutoUpdate utility and use the utility to save them for later updates You can download the UPD packages in...

Страница 322: ...s brings your network to a workable baseline state You can then download and install iDAT files to keep current 2 From the baseline state use a web browser or FTP client software each week to download...

Страница 323: ...ers are off or if they do not have the VirusScan Console running the AutoUpdate utility will resume its scheduled task when you next start the computer or the VirusScan Console To learn how to use thi...

Страница 324: ...than 15 weeks out of date After that point it becomes more efficient to download a full DAT file set Network configuration issues Q Do all the machines I want to update need to be able to connect to t...

Страница 325: ...nderstanding and using 281 to 282 alert messages audible sounding 174 alert mode BIOS 106 alert options choosing for VirusScan in Console 216 to 217 in Download Scan module 136 to 137 in E mail Scan m...

Страница 326: ...systems 106 possible VirusScan conflicts with anti virus features of 64 boot blocks scanning 213 BOOTSCAN EXE use of on Emergency Disk 60 boot sector viruses definition and behavior of ix to x Brain v...

Страница 327: ...sks in 194 208 to 225 copying and pasting tasks in 194 creating new tasks in 194 200 204 default scan tasks included with 196 definition of scan task in 193 deleting tasks from 194 detection options f...

Страница 328: ...ts 27 to 31 Desktop Management Interface DMI alerts use of with Alert Manager server 286 detection options adding scan targets 170 176 to 178 209 to 272 adding scan targets in ScreenScan 270 to 271 ch...

Страница 329: ...to test installation 55 electronic services contacting for technical support 300 e mail addresses for reporting new viruses to McAfee xix as agent for virus transmission xii client software choosing i...

Страница 330: ...stic scanning options for 103 to 104 119 132 to 133 178 to 180 211 258 272 files choosing as scan targets 170 176 to 178 209 to 211 258 to 260 270 to 272 infected cleaning 105 to 108 122 to 123 134 13...

Страница 331: ...log file 111 128 139 removing viruses from 59 to 73 use of quarantine folder to isolate 107 122 135 installation aborting if virus detected during 59 testing effectiveness of 55 Internet e mail client...

Страница 332: ...ostile objects and viruses xiii Java classes as xiii to xiv payload ix script viruses as xiv spread via World Wide Web xii to xiv types Trojan horses ix worms viii MAPI Messaging Application Programmi...

Страница 333: ...ii Olympus scan engine what it is 227 online help opening from the Console 195 opening from VirusScan Classic and VirusScan Advanced 165 options Download Scan module configuring 130 to 140 E mail Scan...

Страница 334: ...99 KnowledgeCenter 295 ordering 298 PrimeSupport Connect 296 PrimeSupport Enterprise 297 PrimeSupport Prioity 297 for home users Online Upgrades plan 301 ordering 302 Pay Per Minute plan 301 Quarterly...

Страница 335: ...8 report options choosing for VirusScan in Console 217 to 220 in Download Scan module 138 to 140 in E mail Scan module 127 to 129 in Internet Filter module 148 to 149 in System Scan module 110 to 112...

Страница 336: ...196 definition of 193 deleting 194 detection options choosing for VirusScan in Console 209 configuring in VirusScan Advanced 175 to 180 disabling 195 entering schedule times for 206 excluding items fr...

Страница 337: ...152 security options choosing for VirusScan Advanced 189 choosing for VirusScan in Console 223 to 225 Select 194 session settings recorded in log file 111 128 139 session summary recorded in log file...

Страница 338: ...lability 300 resources for SecureCast 317 via electronic services 300 system crashes attributing to viruses 59 system files as agents for virus transmission x system requirements for VirusScan 35 Secu...

Страница 339: ...intervals available for 205 scheduling and enabling 194 204 to 206 security options configuring 189 223 to 225 starting 195 automatically 213 need for Console to be running 206 status checking 206 to...

Страница 340: ...nfected computer use of to create Emergency Disk 60 Universal Naming Convention UNC notation use of to designate update and upgrade sites 236 247 UPD files description and use of 320 update and upgrad...

Страница 341: ...80 211 258 272 mutating definition of xi origins of vii to xiv payload ix polymorphic definition of xi programs similar to Trojan horses ix worms viii recognizing when computer problems do not result...

Страница 342: ...to 225 Where What 169 to 171 report options choosing in Console 217 to 220 configuring in VirusScan Advanced 183 to 186 security options choosing in Console 223 to 225 updating via AutoUpdate 230 to 2...

Страница 343: ...responses to virus detection 65 to 70 disabling and enabling 153 to 158 Download Scan module configuring 130 to 140 default response options for 69 to 70 E mail Scan module configuring 115 to 129 def...

Страница 344: ...t options choosing in VirusScan Classic 169 to 171 why worry about viruses vii to viii window elements in VirusScan Console 193 Wizard button in VShield Properties dialog box 93 Word files as agents f...

Отзывы: