background image

COPYRIGHT

Copyright © 2005 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated 
into any language in any form or by any means without the written permission of McAfee, Inc., or its suppliers or affiliate companies.

TRADEMARK ATTRIBUTIONS

ACTIVE FIREWALL, ACTIVE SECURITY, ACTIVESECURITY (AND IN KATAKANA), ACTIVESHIELD, ANTIVIRUS ANYWARE AND DESIGN, CLEAN-UP, 
DESIGN (STYLIZED E), DESIGN (STYLIZED N), ENTERCEPT, ENTERPRISE SECURECAST, ENTERPRISE SECURECAST (AND IN KATAKANA), EPOLICY 
ORCHESTRATOR,  FIRST AID, FORCEFIELD, GMT, GROUPSHIELD, GROUPSHIELD (AND IN KATAKANA), GUARD DOG,  HOMEGUARD, HUNTER, 
INTRUSHIELD, INTRUSION PREVENTION THROUGH INNOVATION, M AND DESIGN, MCAFEE, MCAFEE (AND IN KATAKANA), MCAFEE AND DESIGN, 
MCAFEE.COM, MCAFEE VIRUSSCAN, NA NETWORK ASSOCIATES, NET TOOLS, NET TOOLS (AND IN KATAKANA), NETCRYPTO, NETOCTOPUS, 
NETSCAN, NETSHIELD, NETWORK ASSOCIATES, NETWORK ASSOCIATES COLLISEUM, NETXRAY, NOTESGUARD, NUTS & BOLTS, OIL CHANGE, PC 
MEDIC, PCNOTARY,  PRIMESUPPORT, RINGFENCE, ROUTER PM, SECURECAST, SECURESELECT, SPAMKILLER, STALKER, THREATSCAN, TIS, TMEG, 
TOTAL VIRUS DEFENSE, TRUSTED MAIL, UNINSTALLER, VIREX, VIRUS FORUM, VIRUSCAN, VIRUSSCAN, VIRUSSCAN (AND IN KATAKANA), 
WEBSCAN, WEBSHIELD, WEBSHIELD (AND IN KATAKANA), WEBSTALKER, WEBWALL, WHAT'S THE STATE OF YOUR IDS?, WHO'S WATCHING YOUR 
NETWORK, YOUR E-BUSINESS DEFENDER, YOUR NETWORK. OUR BUSINESS.  are registered trademarks or trademarks of McAfee, Inc. and/or its affiliates in 
the US and/or other countries.  Red in connection with security is distinctive of McAfee brand products.  All other registered and unregistered trademarks herein 
are the sole property of their respective owners.

LICENSE INFORMATION
License Agreement

NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, WHICH
SETS FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH TYPE OF LICENSE
YOU HAVE ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT
ACCOMPANIES YOUR SOFTWARE PACKAGING OR THAT YOU HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET, A FILE
ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEB SITE FROM WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF YOU DO NOT
AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT
TO MCAFEE, INC. OR THE PLACE OF PURCHASE FOR A FULL REFUND. 

Attributions

This product includes or may include:

Software developed by the OpenSSL Project for use in the OpenSSL Toolkit (

http://www.openssl.org/

).

 

Cryptographic software written by Eric A. Young and

software written by Tim J. Hudson.

 

Some software programs that are licensed (or sublicensed) to the user under the GNU General Public License (GPL) or other

similar Free Software licenses which, among other rights, permit the user to copy, modify and redistribute certain programs, or portions thereof, and have access to
the source code. The GPL requires that for any software covered under the GPL which is distributed to someone in an executable binary format, that the source code
also be made available to those users. For any such software covered under the GPL, the source code is made available on this CD. If any Free Software licenses
require that McAfee, Inc. provide rights to use, copy or modify a software program that are broader than the rights granted in this agreement, then such rights shall
take precedence over the rights and restrictions herein.

 

Software originally written by Henry Spencer, Copyright 1992, 1993, 1994, 1997 Henry Spencer.

Software originally written by Robert Nordier, Copyright © 1996-7 Robert Nordier.

 

Software written by Douglas W. Sauder.

 

Software developed by the

Apache Software Foundation (

http://www.apache.org/

). A copy of the license agreement for this software can be found at 

www.apache.org/licenses/LICENSE-

2.0.txt

.

 

International Components for Unicode (“ICU”) Copyright © 1995-2002 International Business Machines Corporation and others.

 

Software developed

by CrystalClear Software, Inc., Copyright © 2000 CrystalClear Software, Inc.

 

 FEAD

®

 Optimizer

®

 technology, Copyright Netopsystems AG, Berlin, Germany.

Outside In

®

 Viewer Technology © 1992-2001 Stellent Chicago, Inc. and/or Outside In

®

 HTML Export, © 2001 Stellent Chicago, Inc.

 

Software copyrighted by

Thai Open Source Software Center Ltd. and Clark Cooper, © 1998, 1999, 2000.

 

Software copyrighted by Expat maintainers.

 

Software copyrighted by The

Regents of the University of California, © 1989. 

 

Software copyrighted by Gunnar Ritter.

 

Software copyrighted by Sun Microsystems

®

, Inc.© 2003.

 

Software

copyrighted by Gisle Aas. © 1995-2003.

 

Software copyrighted by Michael A. Chase, © 1999-2000.

 

Software copyrighted by Neil Winton, © 1995-1996.

Software copyrighted by RSA Data Security, Inc., © 1990-1992.

 

Software copyrighted by Sean M. Burke, © 1999, 2000.

 

Software copyrighted by Martijn

Koster, © 1995.

 

Software copyrighted by Brad Appleton, © 1996-1999. 

 

Software copyrighted by Michael G. Schwern, © 2001.

 

Software copyrighted by

Graham Barr, © 1998.

 

Software copyrighted by Larry Wall and Clark Cooper, © 1998-2000.

 

Software copyrighted by Frodo Looijaard, © 1997.

 

Software

copyrighted by the Python Software Foundation, Copyright © 2001, 2002, 2003. A copy of the license agreement for this software can be found at 

www.python.org

.

Software copyrighted by Beman Dawes, © 1994-1999, 2002.

 

Software written by Andrew Lumsdaine, Lie-Quan Lee, Jeremy G. Siek © 1997-2000 University of

Notre Dame.

 

Software copyrighted by Simone Bordet & Marco Cravero, © 2002.

 

Software copyrighted by Stephen Purcell, © 2001.

 

Software developed

by the Indiana University Extreme! Lab (

http://www.extreme.indiana.edu/

).

 

Software copyrighted by International Business Machines Corporation and others,

© 1995-2003.

 

Software developed by the University of California, Berkeley and its contributors.

 

Software developed by Ralf S. Engelschall

<[email protected]> for use in the mod_ssl project (

http://www.modssl.org/

).

 

Software copyrighted by Kevlin Henney, © 2000-2002.

 

Software

copyrighted by Peter Dimov and Multi Media Ltd. © 2001, 2002.

 

Software copyrighted by David Abrahams, © 2001, 2002. See 

http://www.boost.org/libs/bind/

bind.html

 for documentation.

 

Software copyrighted by Steve Cleary, Beman Dawes, Howard Hinnant & John Maddock, © 2000.

 

Software copyrighted by

Boost.org, © 1999-2002.

 

Software copyrighted by Nicolai M. Josuttis, © 1999.

 

Software copyrighted by Jeremy Siek, © 1999-2001.

 

Software copyrighted

by Daryle Walker, © 2001.

 

Software copyrighted by Chuck Allison and Jeremy Siek, © 2001, 2002.

 

Software copyrighted by Samuel Krempp, © 2001. See

http://www.boost.org

 for updates, documentation, and revision history.

 

Software copyrighted by Doug Gregor ([email protected]), © 2001, 2002.

 

Software

copyrighted by Cadenza New Zealand Ltd., © 2000.

 

Software copyrighted by Jens Maurer, © 2000, 2001.

 

Software copyrighted by Jaakko Järvi

([email protected]), © 1999, 2000.

 

Software copyrighted by Ronald Garcia, © 2002.

 

Software copyrighted by David Abrahams, Jeremy Siek, and Daryle

Walker, © 1999-2001.

 

Software copyrighted by Stephen Cleary ([email protected]), © 2000.

 

Software copyrighted by Housemarque Oy <

http://

www.housemarque.com

>, © 2001.

 

Software copyrighted by Paul Moore, © 1999.

 

Software copyrighted by Dr. John Maddock, © 1998-2002.

 

Software

copyrighted by Greg Colvin and Beman Dawes, © 1998, 1999.

 

Software copyrighted by Peter Dimov, © 2001, 2002.

 

Software copyrighted by Jeremy Siek and

John R. Bandela, © 2001.

 

Software copyrighted by Joerg Walter and Mathias Koch, © 2000-2002.

Issued July 2005 / McAfee

®

 VirusScan

®

 software

Содержание VirusScan 2005

Страница 1: ...User Guide...

Страница 2: ...originally written by Robert Nordier Copyright 1996 7 Robert Nordier Software written by Douglas W Sauder Software developed by the Apache Software Foundation http www apache org A copy of the license...

Страница 3: ...Reserved Are you installing your product from a CD Are you installing your product from a Web site Yes Yes No 3 Click OK 2 In the Run dialog box type D SETUP EXE where D is the letter of your CD ROM d...

Страница 4: ...f virus signatures 60 day warranty that guarantees replacement of your software CD if it is defective or damaged SpamKiller filter updates for one year after installation when you purchase SpamKiller...

Страница 5: ...ty alerts 23 Manually scanning your computer 26 Manually scanning for viruses and other threats 26 Automatically scanning for viruses and other threats 29 Understanding threat detections 31 Managing q...

Страница 6: ...Contents vi McAfee VirusScan software...

Страница 7: ...used by worm like activity and suspect scripts New features This version of VirusScan provides the following new features Spyware and adware detection and removal VirusScan identifies and removes spyw...

Страница 8: ...mail System requirements Microsoft Windows 98 Windows Me Windows 2000 or Windows XP Personal computer with Pentium compatible processor Windows 98 2000 133 MHz or higher Windows Me 150 MHz or higher W...

Страница 9: ...er Download you will see four links 4 Click eicar com If ActiveShield is working properly it detects the eicar com file immediately after you click the link You can try to delete or quarantine detecte...

Страница 10: ...o check only that folder You can also put the files in random locations on your hard drive for a more convincing demonstration of Scan s abilities 3 In the Scan Options area of the Scan dialog box ens...

Страница 11: ...nt details at the McAfee web site NOTE For more information about its features click Help in the SecurityCenter dialog box While SecurityCenter is running and all of the McAfee features installed on y...

Страница 12: ...Getting Started 12 McAfee VirusScan software...

Страница 13: ...he red icon in your Windows system tray by default as soon as you restart your computer after the installation process If ActiveShield is stopped not loaded or is disabled denoted by the black icon yo...

Страница 14: ...tart your computer Configuring ActiveShield options You can modify ActiveShield starting and scanning options in the ActiveShield tab of the VirusScan Options dialog box Figure 2 1 which is accessible...

Страница 15: ...not connected to the Internet To stop ActiveShield from starting when Windows starts 1 Right click the McAfee icon point to VirusScan then click Options The VirusScan Options dialog box opens Figure...

Страница 16: ...an the detected e mail Tries to quarantine or delete an uncleanable e mail Includes an alert file in the inbound e mail that contains information about the actions performed to remove the possible thr...

Страница 17: ...chanism detects alerts and blocks suspect activity Suspect activity might include the following actions on your computer An attempt to forward e mail to a large portion of your address book Attempts t...

Страница 18: ...seconds NOTE If you modify the number of recipients or seconds for monitoring sent e mails it might result in invalid detections McAfee recommends that you click No to retain the default setting Othe...

Страница 19: ...rotection you cannot disable auto cleaning of instant message attachments If an inbound instant message attachment is detected VirusScan performs the following steps Tries to clean the detected messag...

Страница 20: ...anced then click the Scanning tab Figure 2 4 3 Click Program files and documents only then click OK Scanning for new unknown viruses If you set ActiveShield to use the default Scan for new unknown vir...

Страница 21: ...vity might include the following action on your computer A script execution that results in the creation copying or deletion of files or the opening of your Windows registry If you set ActiveShield to...

Страница 22: ...ed Programs recommended option in the Advanced Options dialog box Potentially Unwanted Program PUP protection quickly detects blocks and removes spyware adware and other programs that gather and trans...

Страница 23: ...computer immediately Unless you choose to hide the scan prompt it will periodically remind you until you perform the scan Managing detected files 1 If ActiveShield can clean the file you can learn mo...

Страница 24: ...you are sure that you trust the script you can allow the script to run Click Allow this script this time to let all scripts contained within a single file run once Click Continue what I was doing to...

Страница 25: ...ick Continue what I was doing to ignore the alert and block the program this time If you a recognize the PUP or b you might have installed the PUP as part of a bundle or accepted a license agreement i...

Страница 26: ...ne or delete the file Manually scanning for viruses and other threats To scan your computer 1 Right click the McAfee icon point to VirusScan then click Scan The Scan dialog box opens Figure 2 8 2 Clic...

Страница 27: ...ses in a ZIP file then insert that ZIP file into another ZIP file in an effort to bypass anti virus scanners Scan can detect these viruses as long as you leave this option selected Scan for new unknow...

Страница 28: ...the more files you have the longer the scan takes 4 Click Scan to start scanning files When the scan is finished a scan summary shows the number of files scanned the number of files detected the numb...

Страница 29: ...other threats in selected message stores and their subfolders mailbox folders or e mail messages containing attachments from within Microsoft Outlook 97 or later To scan e mail in Microsoft Outlook 1...

Страница 30: ...Edit b Select how often to scan your computer in the Schedule Task list and then select additional options in the dynamic area below it Daily Specify the number of days between scans Weekly the defau...

Страница 31: ...worms Scan automatically tries to clean the file You can then choose how to manage detected files including whether to submit them to the McAfee AVERT labs for research If Scan detects a potentially...

Страница 32: ...all try using a Rescue Disk to start your computer The Rescue Disk in many cases can start a computer if a detected file disables it See Creating a Rescue Disk on page 34 for details For more help co...

Страница 33: ...iginal location 5 If VirusScan cannot clean the virus click Delete to remove the file 6 If VirusScan cannot clean or delete the file and if it is not a Potentially Unwanted Program you can submit the...

Страница 34: ...se Scan to ensure that both the computer and the floppy disk are virus free See Manually scanning for viruses and other threats on page 26 for details 2 Right click the McAfee icon point to VirusScan...

Страница 35: ...drive 3 Turn the computer on A gray window with several options appears 4 Choose the option that best suits your needs by pressing the Function keys for example F2 F3 NOTE Rescue Disk starts automatic...

Страница 36: ...14 3 Accept the default Yes I want to participate to anonymously send your virus information to McAfee for inclusion in its World Virus Map of worldwide detection rates Otherwise select No I don t wa...

Страница 37: ...rus Map web page appears Figure 2 15 By default the World Virus Map shows the number of detected computers worldwide over the past 30 days and also when the reporting data was last updated You can cha...

Страница 38: ...ted to the Internet then notify you with alerts and sounds By default SecurityCenter automatically downloads and installs any available updates NOTE In some cases you will be prompted to restart your...

Страница 39: ...d installs the update automatically 5 Click Finish when the update is finished installing NOTE In some cases you will be prompted to restart your computer to complete the update Be sure to save all of...

Страница 40: ...Using McAfee VirusScan 40 McAfee VirusScan software...

Страница 41: ...s for detected e mail 24 for detected files 23 for potential worms 24 for PUPs 25 for suspect scripts 24 for viruses 23 AVERT submitting suspect files to 33 C configuring VirusScan ActiveShield 13 Sca...

Страница 42: ...lders option 26 Scan within compressed files option 27 testing 9 to 10 Scan all files option Scan 27 Scan for new unknown viruses option Scan 27 Scan for Potentially Unwanted Programs option Scan 28 s...

Страница 43: ...g potential worms 24 stopping suspect scripts 24 VirusScan getting started 7 reporting viruses automatically 35 37 scanning via Microsoft Outlook toolbar 29 scanning via Windows Explorer 29 scheduling...

Отзывы: