background image

Using the SecureCast Service to Get New Data Files

182

McAfee VirusScan Anti-Virus Software

Figure D-15. SecureCast Online Activity Status panel

9. Click 

Finish

 after a check mark appears in all the boxes.

The setup process in complete. At that point, your web browser will 
connect to the Network Associates SecureCast service electronic 
customer care page. If you are a corporate user, the window resembles 
the one shown in 

Figure D-16

:

Figure D-16. SecureCast Electronic Corporate Customer Care

You can use this page to download product updates and upgrades, 
contact technical support, and get other information directly from 
Network Associates. The terms of your grant will determine what 
information you see here and what you can download.

Содержание VIRUSSCAN 4.5 -

Страница 1: ...McAfee VirusScan Administrator s Guide Version 4 5...

Страница 2: ...retty Good Privacy PrimeSupport RecoverKey RecoverKey International ReportMagic RingFence Router PM Safe Sound SalesMagic SecureCast Service Level Manager ServiceMagic Site Meter Sniffer SniffMaster S...

Страница 3: ...tems for anti virus data file updates xvii International contact information xviii Chapter 1 About VirusScan Software 21 Introducing VirusScan anti virus software 21 How does VirusScan software work 2...

Страница 4: ...on t have a virus 75 Understanding false detections 76 Responding to viruses or malicious software 77 Submitting a virus sample 88 Using the SendVirus utility to submit a file sample 88 Capturing boot...

Страница 5: ...panel files 147 ScreenScan 148 VirusScan Emergency Disk files 150 Dependent and related files for the E Mail Scan extension 152 Appendix C Using VirusScan Command line Options 155 Adding advanced Viru...

Страница 6: ...Support options for home users 190 How to reach international home user support 192 Ordering a PrimeSupport plan for home users 192 Network Associates consulting and training 193 Professional Services...

Страница 7: ...authenticity availability and non repudiation of information and information processing systems Virus payloads had always threatened or damaged data integrity but by the time she wrote her survey art...

Страница 8: ...H Spacefiller infection Throughout much of 1999 virus and worm attacks suddenly stepped up in intensity and in the public eye Part of the reason for this of course is that many of the more notorious v...

Страница 9: ...W32 FunLove 4099 which infected ActiveX OCX files among others This meant that it could lurk on web pages with ActiveX content and infect systems with low or nonexistent browser security settings as t...

Страница 10: ...tial customer lists secure credit card data and purchase verification reliable communications and hundreds of other computer aided transactional details The costs from these virus attacks in the digit...

Страница 11: ...s armor Desktop workstations for example can spread viruses by any of a variety of means via floppy disks by downloading them from the Internet by mapping server shares or other workstations hard disk...

Страница 12: ...bsites waiting to deploy sophisticated virus like payloads The Internet Filter module can even block entire websites preventing network users from visiting sites that pose a threat to network integrit...

Страница 13: ...McAfee anti virus research Even the best anti virus software is only as good as its latest update Because as many as 200 to 300 viruses and variants appear each month the DAT files that enable McAfee...

Страница 14: ...curity solutions including the PGP data security and encryption product line the Gauntlet firewall product line the WebShield E ppliance hardware line and the CyberCop Scanner and Monitor product seri...

Страница 15: ...ormation If you do not find what you need or do not have web access try one of our automated services If the automated services do not have the answers you need contact Network Associates at one of th...

Страница 16: ...ad support To get help with navigating or downloading files from the Network Associates or McAfee websites or FTP sites call Network Associates training For information about scheduling on site traini...

Страница 17: ...ions or virus samples to To report items to the McAfee European research office use these e mail addresses To report items to the McAfee Asia Pacific research office or the office in Japan use one of...

Страница 18: ...elgique Phone 0032 2 478 10 29 Fax 0032 2 478 66 21 Network Associates do Brasil Rua Geraldo Flausino Gomez 78 Cj 51 Brooklin Novo S o Paulo SP 04575 060 Brasil Phone 55 11 5505 1009 Fax 55 11 5505 10...

Страница 19: ...Palazzo D 1 Via Brescia 28 20063 Cernusco sul Naviglio MI Italy Phone 39 02 92 65 01 Fax 39 02 92 14 16 44 Network Associates Japan Inc Toranomon 33 Mori Bldg 3 8 21 Toranomon Minato Ku Tokyo 105 0001...

Страница 20: ...65 220 7255 Network Associates Spain Orense 4 4a Planta Edificio Trieste 28020 Madrid Spain Phone 34 9141 88 500 Fax 34 9155 61 404 Network Associates Sweden Datav gen 3A Box 596 S 175 26 J rf lla Swe...

Страница 21: ...e reductions in revenue as more businesses move into e commerce and online sales and as virus attacks proliferate VirusScan software first honed its technological edge as one of a handful of pioneerin...

Страница 22: ...e sun coverage from its Anti Virus Emergency Response Team AVERT Even with the rise of viruses and worms that use e mail to spread that flood e mail servers or that infect groupware products and file...

Страница 23: ...for virus code it can instead sample the file at well defined points to look for virus code signatures that indicate an infection The development environment brings as much speed to DAT file construc...

Страница 24: ...macro virus or a file infecting virus ViruLogic looks for virus like behaviors in program functions such as covert file modifications background calls or invocations of e mail clients and other metho...

Страница 25: ...hly recursive and very large compressed archive files in an attempt to tie up the scanner as it digs through the file looking for infections VirusScan software accurately scans the majority of popular...

Страница 26: ...ce MAPI standard and that block access to dangerous Internet sites Secure password protection for your configuration options prevents others from making unauthorized changes The same convenient dialog...

Страница 27: ...the other scanners SCANPM EXE a scanner for 16 and 32 bit environments This scanner provides you with a full set of scanning options for 16 and 32 bit protected mode DOS environments It also includes...

Страница 28: ...s Guide describes in detail how to use VirusScan and includes other information useful as background or as advanced configuration options Acrobat PDF files are flexible online documents that contain...

Страница 29: ...l advantage of each platform s strengths The next sections discuss other changes that this VirusScan release introduces Installation and distribution features McAfee anti virus products including Viru...

Страница 30: ...sScan control panel to run at startup Other changes include New VShield system tray icon states tell you more about which VShield modules are active These states are All VShield modules are active The...

Страница 31: ...ftware Even with the majority of the virus definitions it requires now incorporated directly into its engine in generic routines VirusScan software still requires regular DAT file updates to keep pace...

Страница 32: ...About VirusScan Software 32 McAfee VirusScan Anti Virus Software...

Страница 33: ...rivileges for the workstation on which you plan to install the program Review the items shown in System requirements to determine whether your target workstations can run VirusScan software System req...

Страница 34: ...VirusScan software came on a CD ROM insert that disc into your computer s CD ROM drive If you inserted a CD ROM you should see a VirusScan welcome image appear automatically To install VirusScan soft...

Страница 35: ...tion Setup first asks you whether it should check to see whether you have previous VirusScan versions installed on your computer Figure 2 2 Figure 2 2 Previous versions dialog box 4 Click Yes to conti...

Страница 36: ...Click Restart System If Setup removed a previous VirusScan version from your system Setup will also ask you to restart your computer For a list of circumstances in which Setup or system upgrades requ...

Страница 37: ...pe panel see Figure 2 6 on page 39 or Figure 2 7 on page 40 Skip to Step 9 on page 39 to continue If your computer runs Windows 95 or Windows 98 Setup also gives you the option to preserve the VShield...

Страница 38: ...low it to remove the software The uninstallation utility might tell you that you need to restart your computer to completely remove the other software You do not need to do so to continue with your Vi...

Страница 39: ...Type panel 9 Select the security mode you prefer Your choices are Use Maximum Security Select this option to require users to have Administrator rights to your computer in order to change any configu...

Страница 40: ...n and application extensions that allow you to right click any object on your hard disk to start a scan operation the VirusScan Console the VShield System Scan module the Alert Manager Client configur...

Страница 41: ...k beside a component name then choose This feature will be installed on local hard drive from the menu that appears To add a component and any related modules within the component choose This feature...

Страница 42: ...nsufficient space 13 When you have chosen the components you want to install click Next to continue Setup will show you a wizard panel that confirms its readiness to begin installing files Figure 2 9...

Страница 43: ...your system Choose configuration options for your installation You can choose to scan your system create an emergency disk or update your virus definition files before you start the VShield scanner an...

Страница 44: ...er in turn will pause if it detects a virus on your system so that you can shut down and use the VirusScan Emergency Disk to restart Create Emergency Disk This option is active by default It tells Set...

Страница 45: ...not choose Scan boot record at startup but you may choose either of the other options Neither Windows NT Workstation nor Windows 2000 permit software to scan or make changes to hard disk boot sectors...

Страница 46: ...te firewall or proxy server settings for example To learn more about how to configure the AutoUpdate utility see Configuring update options on page 113 Wait and Run AutoUpdate Later This option skips...

Страница 47: ...m Using the Emergency Disk Creation utility If you choose to create an Emergency Disk during installation Setup will start the Emergency Disk wizard in the middle of the VirusScan software installatio...

Страница 48: ...MSCAN DAT McAfee periodically updates these DAT files to detect new boot sector viruses You can download new Emergency DAT files from this location http www nai com asp_set anti_virus avert tools asp...

Страница 49: ...files to create your Emergency Disk because Windows NT Workstation v4 0 and Windows 2000 Professional system files do not fit on a floppy disk If your computer runs Windows 95 or Windows 98 the wizar...

Страница 50: ...reated your disk Next remove the disk from your floppy drive lock it label it McAfee Emergency Boot Disk and store it in a safe place If you chose to format your disk with Windows system files the wiz...

Страница 51: ...on your Emergency Disk b Verify that the Don t format checkbox is clear c Click Next The Windows disk format dialog box appears Figure 2 18 Figure 2 18 Windows Format dialog box d Verify that the Ful...

Страница 52: ...a virus on page 63 to learn what to do next 4 When the wizard finishes copying the Emergency Disk files it displays the final wizard panel Figure 2 20 Figure 2 20 Final Emergency Disk panel 5 Click Fi...

Страница 53: ...ith no previous VirusScan version and no incompatible software No restart required unless you have Novell Client32 for NetWare installed then restart required Restart required Installation on computer...

Страница 54: ...aximize your text editor window and delete any carriage returns Also be sure to type the letter O not the number 0 in the X5O that begins the test message If you are reading this manual on your comput...

Страница 55: ...Scan software follow these steps 1 Click Start in the Windows taskbar point to Settings then choose Control Panel 2 Locate and double click the Add Remove Programs control panel 3 In the Add Remove Pr...

Страница 56: ...e 41 Start with Step 12 on page 41 to choose the components you want to add or remove NOTE This panel differs from the one shown on page 41 It will not allow you to change your VirusScan program direc...

Страница 57: ...on options Using Active Directory and Group Policies If you use Active Directory services in Windows 2000 you must distribute the software per machine not per user Set up the installation in the Micro...

Страница 58: ...terminate the line with the i option so that Setup knows to look for a particular MSI file it needs for installation The syntax consists of the name of the executable file setup exe any options you c...

Страница 59: ...finishes the installation By default its value is True USEADMINONLYSECURITY This property tells Setup which security mode you want this VirusScan copy to use when it runs Possible values are 0 which r...

Страница 60: ...e the shown in the command line example with one or more of these parameters to limit the type of data that the log file records qb shows a small progress bar during installation with a cancel button...

Страница 61: ...lls those components according to a preexisting hierarchy This means that if you choose to install only the VirusScan shell extensions for example Setup knows that you must have SCAN32 EXE the VirusSc...

Страница 62: ...nstall all components except for one the SendVirus component in this example type this line at the command prompt setup exe ADDLOCAL ALL REMOVE SendVirus q i You can also choose different components f...

Страница 63: ...indows NT Workstation v4 0 or Windows 2000 Professional systems you can choose to run the software with regular or maximum security To set this value from the command line run Setup with the USEADMINO...

Страница 64: ...without previous settings add the PRESERVESETTINGS property to the command line with the value False setup PRESERVESETTINGS False Running Setup from a login script To install VirusScan software at th...

Страница 65: ...can software from a remote location on the network use McAfee Management Edition or McAfee ePolicy Orchestrator management software NOTE If you plan to install VirusScan software to a Windows NT Works...

Страница 66: ...se WinZip PKZip or a similar utility to extract the files VSC_9X INI and VSC_NT INI from the VirusScan package 2 Locate this line in each file REGSETVAL LOCAL VS_EXEC_KEY ExecCmdLine SZ I_CMD_LINE Cha...

Страница 67: ...t a Software Package dialog box displays your network Locate the VirusScan software package that you want to place in the repository 3 Click VirusScan 4 Click Open VirusScan software is loaded in your...

Страница 68: ...ngs McAfee provides a small utility that you can use to put a VirusScan installation package together with all of the configuration settings you want to use for each target computer McAfee releases th...

Страница 69: ...0x00000001h Export E Mail Scan 0x00000002h Export Internet Scan 0x00000004h Export AvConsol exe settings 0x00000008h Export Scheduled Tasks 0x00000010h Export Default On Demand Scan 0x00000020h Expor...

Страница 70: ...RT option PRESERVE PREVIOUS Preserves the settings from previous VShield scanner settings This option tells MSI_INST EXE to read settings from a previous INI file and set new installation settings app...

Страница 71: ...results you expect but it will help eliminate one potential cause of your computer problems The safest course of action you can take is to install VirusScan software then scan your system immediately...

Страница 72: ...mergency Disk Creation utility on page 47 3 Wait at least 15 seconds then start your computer again NOTE If you have your computer s BIOS configured to look for its boot code first on your C drive you...

Страница 73: ...f that number are clean or uninfected How many files contain potential infections How many files of that number the scanner cleaned How many boot sector and MBR files the scanner examined How many boo...

Страница 74: ...d scanning when you start or shut down your computer each day Use the VShield scanner to examine your computer s memory and maintain a constant level of vigilance between scan operations Under most ci...

Страница 75: ...uch help when your problem really results from an interrupt conflict it does allow you to eliminate one possible cause With that knowledge you can then go on to troubleshoot your system with a full fe...

Страница 76: ...am then shut the computer down and turn off the power Wait a few seconds before you start the computer again so that the system can clear the other program s code signature strings from memory You hav...

Страница 77: ...nts each has a different set of default responses Responding when the System Scan module detects a virus How this module reacts when it finds a virus depends on which operating system your computer ru...

Страница 78: ...3 2 Full screen Warning System Scan response options This alert message brings your system to a complete halt as it awaits your response No other programs or system operations run on your system unti...

Страница 79: ...f which files it flagged as infected You can then restore deleted files from backup copies Move the file to a different location Click Move File to in the dialog box This opens a browse window you can...

Страница 80: ...ause the virus has damaged the file beyond repair it will record the incident in its log file and suggest alternative responses In the example shown in Figure 3 3 the module failed to clean the EICAR...

Страница 81: ...s or through similar channels In its initial configuration the module will prompt you to choose a response from among three options whenever it detects a virus Figure 3 4 A fourth option provides you...

Страница 82: ...s Internet sites In its initial configuration the module will ask you whenever it encounters a potentially harmful object whether you want to Deny the object access to your system or you want to Conti...

Страница 83: ...n in its log file but it will take no other action to respond to the virus Right click each infected file listed in the main window then choose an individual response from the shortcut menu that appea...

Страница 84: ...get with the VShield E Mail Scan module The E Mail Scan module also offers the ability to clean infected file attachments or stop the scan operation a capability that complements the continuous monit...

Страница 85: ...damaged the file beyond repair it will record the incident in its log file and suggest alternative responses In the example shown in Figure 3 8 Clean is not an available response option In most cases...

Страница 86: ...t deploys The site lists the most prevalent or riskiest viruses provides a search engine you can use to search for particular virus descriptions alphabetically or by virus name displays prevalence tab...

Страница 87: ...Emergency DAT files current scan engine versions regular weekly DAT and SuperDAT updates and new incremental virus definition files UPD Beta and first look software Viewing file information If you rig...

Страница 88: ...endVirus utility to submit a file sample Because the majority of later generation viruses tend to infect document and executable files VirusScan software comes with SENDVIR EXE a utility that makes it...

Страница 89: ...act you about your submission enter your name e mail address and any message you would like to send along with your submission in the text boxes provided then click Next to continue NOTE You may submi...

Страница 90: ...you want to submit click Next to continue The Choose Upload Options panel appears Figure 3 15 Figure 3 15 Choose Upload options panel If the file you want to submit is a Microsoft Office document or a...

Страница 91: ...medy or respond in any way to you SENDVIR EXE will use the e mail client you specified to send your sample You must have connected to your network or ISP in order for this process to succeed Capturing...

Страница 92: ...cro virus that has infected any of your Microsoft Word Excel or PowerPoint files send these files to McAfee anti virus researchers either with the SENDVIR EXE utility via e mail as floppy disk images...

Страница 93: ...spect you have a boot virus you must use RWFLOPPY to send your samples electronically otherwise you must send your samples physically on a diskette If you send them electronically without using RWFLOP...

Страница 94: ...age Sending samples via e mail Once you ve made disk images or created a file archive for your samples send them to McAfee researchers at one of these e mail addresses In your message include this inf...

Страница 95: ...ample AVERT cannot return it to you AVERT does not accept or process Iomega Ditto or Jazz cartridges Iomega Zip disks or other types of removable media In the United States Network Associates Inc Viru...

Страница 96: ...Removing Infections From Your System 96 McAfee VirusScan Anti Virus Software...

Страница 97: ...Guide Using the VirusScan application The VirusScan name applies both to the entire set of desktop anti virus program components described in the User s Guide and to a particular component of that se...

Страница 98: ...pter 6 Creating and Configuring Scheduled Tasks in the VirusScan User s Guide Using specialized scanning tools In addition to the continuous background scanning that the VShield scanner provides you w...

Страница 99: ...You also need a method to collect and manage alert messages from all over the network in a central repository so that you can respond whenever any workstation detects an infected file McAfee provides...

Страница 100: ...or software to tie alert messages into the Network Associates Magic HelpDesk application for trouble ticket generation and other features Alert Manager messages also contain much richer data than do t...

Страница 101: ...Alerting Configuration The Alert Manager Client Configuration page appears 2 Figure 5 1 Alert Manager Client Configuration dialog box 2 Verify that the Disable Alerting checkbox is clear This activat...

Страница 102: ...ust the computer name The Alert Manager Client Configuration utility will validate the form of the name you enter here but will not verify that the Alert Manager server exists on the target computer T...

Страница 103: ...a destination click OK to close the dialog box You can designate any directory on your network as a destination for Centralized Alerting messages but the directory must contain a copy of the file CENT...

Страница 104: ...running somewhere on your network VirusScan software comes packaged with a Management Information File AMG MIF that identifies VirusScan alerting attributes to your DMI client application The DMI cli...

Страница 105: ...r viruses in circulation McAfee releases new DAT files weekly to provide protection against the approximately 500 new viruses that appear each month With this VirusScan release McAfee has introduced a...

Страница 106: ...ility on page 108 and Understanding the AutoUpgrade utility on page 118 Incremental DAT file updates The new McAfee iDAT technology works transparently with the included AutoUpdate version The new iDA...

Страница 107: ...of an archived ZIP file named DAT XXXX ZIP The XXXX in the file name is a series number that changes with each DAT file release McAfee does not recommend this method to update your software but you c...

Страница 108: ...sole To use it to update your VirusScan software you must Set a schedule for the AutoUpdate task and enable it to run Set a password to protect your configuration settings if you wish Configure the ta...

Страница 109: ...etwork divisions Keeping update traffic primarily internal can also reduce the potential for network security breaches Reduce the likelihood that you will need to wait to download new DAT files Traffi...

Страница 110: ...utoUpdate tasks on page 203 of the VirusScan User s Guide To learn how to set a schedule for the task see Enabling tasks on page 208 of the User s Guide 2 Click Configure The Automatic Update dialog b...

Страница 111: ...ions on page 113 Figure 6 2 Automatic Update Properties dialog box Update Options page Change definitions for an existing update site Select a site shown in the update site list then click Edit to ope...

Страница 112: ...s not find new DAT files it will connect to each of the other sites listed until it finds the most current DAT files available If you have the Force Update option selected AutoUpdate will download any...

Страница 113: ...ons stop it When the file reaches the maximum size you set the AutoUpdate utility first clears it then starts the log again from where it left off To see the contents of the log file from VirusScan Co...

Страница 114: ...onfiguration to look for new files on your local computer or on a computer elsewhere on your network Your network settings will govern how the utility attempts the connection and how long it waits bef...

Страница 115: ...onnect to a site set for anonymous FTP login or you must designate the user name and password for an account on the site To have the utility use an anonymous login select the Use anonymous FTP login c...

Страница 116: ...AutoUpdate utility rename existing VirusScan DAT files before it installs new files To rename each file the utility appends the extension SAV to the existing file name and extension CLEAN DAT for exa...

Страница 117: ...ING McAfee recommends that you use this option with extreme caution If you have configured your AutoUpdate task to connect to a server that stores older DAT file versions you can reduce the effectiven...

Страница 118: ...path and file name for the program you want to run or click Browse to locate the program on your hard disk 3 To save your changes and return to the Automatic Update dialog box click OK To close the di...

Страница 119: ...convenient update time when you first deploy VirusScan software but set the AutoUpgrade utility to trigger at a random interval within 60 minutes of that time or set a schedule that phases in or rotat...

Страница 120: ...Automatic Upgrade dialog box follow these steps 1 Double click the AutoUpgrade task in the Console task list to open its Task Properties dialog box Figure 6 6 Figure 6 6 AutoUpgrade Task Properties d...

Страница 121: ...ether or not the AutoUpgrade utility can connect with the site You will not see any sites listed initially because the AutoUpgrade utility does not come configured to connect to any upgrade site You m...

Страница 122: ...6 8 Make the changes you want to make then click OK to save them and return to this dialog box To see descriptions and instructions for configuring the available options see Configuring upgrade optio...

Страница 123: ...6 9 Automatic Upgrade dialog box Log Activity page 5 Select the Log activity into the Activity Log File checkbox By default the AutoUpgrade utility records what happens during update attempts and save...

Страница 124: ...Click OK to save your changes and close the Automatic Upgrade dialog box Click Cancel to close the dialog box without saving your changes Configuring upgrade options To create a new update site or ch...

Страница 125: ...stops the connection attempt Next use Universal Naming Convention UNC notation to enter the path to the computer that holds the new files you want to download in the text box labeled Select a Computer...

Страница 126: ...elect the Use anonymous FTP login checkbox To specify an account clear the Use anonymous FTP login checkbox then click FTP login information to enter a user name and password for an account that has a...

Страница 127: ...also selects the Save the Upgrade files for later usage checkbox To tell AutoUpgrade where to save the program file archive enter a path and folder name in the text box below this checkbox or click B...

Страница 128: ...the XXXX refers to the SuperDAT version number included as part of the file name 2 Download the file AUTOUPG ZIP which you will find on the Network Associates FTP site in this location ftp username p...

Страница 129: ...t the target computer if it must do so in order to finish updating or upgrading your anti virus software If you do not want the target computer to restart after it updates your files set the value of...

Страница 130: ...at constitutes a medium on watch or high risk or about McAfee AVERT risk assessment in general visit the AVERT website at http www mcafeeb2b com asp_set anti_virus alerts ara asp A high prevalence vir...

Страница 131: ...131 Updating and Upgrading VirusScan Software For VirusScan v4 5 and later releases copy any EXTRA DAT files you download to this directory C Program Files Common Files Network Associates VirusScan E...

Страница 132: ...Updating and Upgrading VirusScan Software 132 McAfee VirusScan Anti Virus Software...

Страница 133: ...r and VirusScan Console to load as soon as your computer starts set a ceiling for the number of scan targets the VirusScan application can examine or exclude during a scan session limit the number of...

Страница 134: ...ick Stop If all VirusScan components that normally load into memory the Console and the VShield scanner normally are inactive this button will read Start Click it to reload inactive VirusScan componen...

Страница 135: ...ntinue Figure A 2 VirusScan control panel Components page 5 To have the VShield scanner load when you start your computer select the Load VShield on startup checkbox This same setting appears in the S...

Страница 136: ...ea to have the VirusScan Console start as soon as you start your computer The Console must be running in order to execute any tasks you have scheduled including scan tasks AutoUpgrade tasks and AutoUp...

Страница 137: ...umber of support files to function including some that enable its various modules This table lists VShield scanner and related files Program files These files run directly as VShield components or are...

Страница 138: ...ystems C Program Files Common Files Network Associates McShield MCSHIELD DLL Resource file for System Scan module Runs only on Windows NT and Windows 2000 systems C Program Files Common Files Network...

Страница 139: ...ows virtual device driver only on Windows 95 and Windows 98 systems C Windows System VSHINIT VXD VShield support file Initializes services for DOS protected mode interface Runs only on Windows 95 and...

Страница 140: ...Associates VirusScan CCM_SCAN EXE Scans e mail you receive via Lotus cc Mail v7 x and earlier cc Mail systems C Program Files Network Associates VirusScan WEBSCANX EXE Provides functionality for VShie...

Страница 141: ...n utilities for components C Program Files Network Associates VirusScan AVSMCPA CPL VirusScan control panel applet C Windows System or C Winnt System 32 RESDLL DLL Resource file for all components C P...

Страница 142: ...CONS MMF Memory map file for SYNCUTIL DLL C Program Files Network Associates VirusScan DAV_EXCL MMF Memory map file for SYNCUTIL DLL C Program Files Network Associates VirusScan DAV_SCAN MMF Memory ma...

Страница 143: ...irusScan application files or are dedicated VirusScan application library or support files Dependent files The VirusScan application requires these files to run at various points during its operation...

Страница 144: ...en components C Program Files Network Associates VirusScan VSUTIL DLL Provides common utilities for components C Program Files Network Associates VirusScan AVSMCPA CPL VirusScan control panel applet C...

Страница 145: ...application temporary files File Function Location SYNC_MAP MMF Memory map file for AVSYNCH DLL C Program Files Network Associates VirusScan AVCONSOLE MMF Memory map file for SYNCUTIL DLL C Program F...

Страница 146: ...ogram Files Common Files Network Associates McPal AMG MIF Management Information File for use with Desktop Management Interface client application software C Program Files Common Files Network Associa...

Страница 147: ...ile for various VirusScan utilities C Program Files Common Files Network Associates McPal NAUTIL32 DLL Library file for various VirusScan utilities C Program Files Common Files Network Associates McPa...

Страница 148: ...Files Network Associates VirusScan DAV_CONS MMF Memory map file for SYNCUTIL DLL C Program Files Network Associates VirusScan DAV_EXCL MMF Memory map file for SYNCUTIL DLL C Program Files Network Ass...

Страница 149: ...dows Display Properties dialog box C Program Files Network Associates VirusScan Table B 11 ScreenScan dependent files File Function Location RESDLL DLL Resource file for all VirusScan components C Pro...

Страница 150: ...t Table B 12 VirusScan Emergency Disk files File Function Location AUTOEXEC BAT MS DOS batch file This file leads you through an immediate scan operation as soon as the Emergency Disk finishes startin...

Страница 151: ...se during scan operations A NAMES DAT McAfee virus definition file This file is a smaller specialized version of the NAMES DAT file that other VirusScan components use You may not use a NAMES DAT file...

Страница 152: ...cluding some related to the McAfee scan engine This table lists extension and related files Program files Dependent files The E Mail Scan extension requires these files to run at various points but th...

Страница 153: ...m Files Network Associates VirusScan SYNCUTIL DLL Stores data shared between components C Program Files Network Associates VirusScan VSUTIL DLL Provides common utilities for components C Program Files...

Страница 154: ...k Associates VirusScan DAV_SCAN MMF Memory map file for SYNCUTIL DLL C Program Files Network Associates VirusScan DEXCLDEF MFF Memory map file for SYNCUTIL DLL C Program Files Network Associates Virus...

Страница 155: ...ser s Guide Running the VirusScan Command Line program A typical installation of VirusScan software includes the VirusScan Command Line program You can run VirusScan Command Line either from a Windows...

Страница 156: ...the VirusScan program directory The following table lists the options that can be added to the SCAN command Table C 1 VirusScan command line scanner options Command line Option Limitations Descriptio...

Страница 157: ...les APPEND On demand scanning only Used with REPORT to append report message text to the specified report file instead of overwriting it BOOT On demand scanning only Scan boot sector and master boot r...

Страница 158: ...complete path to each file that you want to exclude on its own line You may use wildcards and FILEACCESS On access scanning only Scans executable files when you modify them in any way including execu...

Страница 159: ...ck multiple floppy disks quickly You cannot use the MANY option if you run the scanner from a boot disk and you have only one floppy drive MAXFILESIZE xxx x On demand scanning only Scan only files no...

Страница 160: ...s NODDA On demand scanning only No direct disk access This prevents the scanner from examining the boot record This feature has been added to allow the scanner to run under Windows NT You might need t...

Страница 161: ...l appear when the scanner fills a screen with messages Otherwise by default the scanner fills and scrolls a screen continuously without stopping which allows it to run on PCs with multiple drives or t...

Страница 162: ...delete files on that drive McAfee recommends omitting PAUSE when using any report option RPTALL On demand scanning only Include all scanned files in the REPORT file When used with REPORT this option a...

Страница 163: ...nside compressed files VIRLIST On demand scanning only Displays the name and a brief description of each virus that the scanner detects You may use the PAUSE option on the same command line as VIRLIST...

Страница 164: ...5 for details To run the VirusScan on demand scanner follow these steps 1 Open an MS DOS Prompt window from within Windows or restart your computer in DOS mode 2 Change to the VirusScan program direct...

Страница 165: ...w will open for you to set configuration options If you set the user interface option to UICONFIG the application will default to NOAUTOSCAN If you set the user interface option to UINONE the applicat...

Страница 166: ...oot level of the folder you designate To scan those files run the application with the NOSUB option NOSUB This option tells the VirusScan application not to look for viruses in any subfolders inside t...

Страница 167: ...plication to automatically move any infected files it finds to a predefined quarantine directory BEEP This option tells the VirusScan application to beep when it finds a virus Your computer will play...

Страница 168: ...ng Use this option if your task fails but the VirusScan Scheduler still shows it as running LOG This option tells the VirusScan application to record its actions in a predefined log file By default th...

Страница 169: ...ation to summarize the results of all the events it has recorded for each virus detection and response event NOLOGSUMMARY This option tells the VirusScan application not to summarize the results of al...

Страница 170: ...Using VirusScan Command line Options 170 McAfee VirusScan Anti Virus Software...

Страница 171: ...you are a corporate customer you must first have a grant number or product serial number to subscribe to the Enterprise SecureCast channel If you do not have a grant number please contact your purchas...

Страница 172: ...ion properly with newer scan engines When the older scan engine version becomes obsolete Network Associates will discontinue development of DAT files for it You should upgrade your software before you...

Страница 173: ...95 Windows 98 Windows NT or Windows 2000 At least 10MB free hard disk space plus sufficient space for product and other downloads An active Internet connection direct or dial up for a minimum of one h...

Страница 174: ...ackWeb client welcome panel 3 Read the instructions and warnings on this panel then click Next to continue 4 The BackWeb license agreement appears Figure D 2 Figure D 2 BackWeb Software License Agreem...

Страница 175: ...ocation for Setup to install the client software if you wish or click Browse to locate a suitable folder Click Next to continue Setup will begin to copy BackWeb program files to your computer As it do...

Страница 176: ...el appears Figure D 5 Figure D 5 Communication Method panel 9 Choose a communication method Your choices are HTTP Choose this option if you can connect directly to the Internet without going through a...

Страница 177: ...roxy server in the Proxy text box then enter the port the server uses for communication in the Port text box When you have finished click Next to continue The Proxy Authentication panel appears Figure...

Страница 178: ...n Phase 2 Register with the Enterprise SecureCast service After you install the BackWeb client and start it the SecureCast service immediately opens the client application and sends its first InfoPak...

Страница 179: ...ecureCast service site or your site the window might not list any InfoPaks In that case minimize or close the BackWeb window After some time you will receive a Flash message Click the flashing message...

Страница 180: ...the grant number you received when you purchased your software or that you received from Network Associates Customer Service NOTE If your company is not a subsidiary of another company clear the Subsi...

Страница 181: ...r network requires you to connect to the Internet through a proxy server select the Use HTTP proxy at address checkbox then enter the server name or its Internet Protocol IP address in the text box pr...

Страница 182: ...ill connect to the Network Associates SecureCast service electronic customer care page If you are a corporate user the window resembles the one shown in Figure D 16 Figure D 16 SecureCast Electronic C...

Страница 183: ...bing from the SecureCast service You can stop the SecureCast service from delivering InfoPaks at any time you want to To do so right click the BackWeb icon in your Windows system tray then choose Star...

Страница 184: ...rvice to Get New Data Files 184 McAfee VirusScan Anti Virus Software BackWeb client For a comprehensive guide to BackWeb including additional troubleshooting advice see the online BackWeb User s Manua...

Страница 185: ...support under the Network Associates Corporate PrimeSupport program If you are a home user you can choose a plan geared toward your needs from the Home User PrimeSupport program PrimeSupport options...

Страница 186: ...lan The PrimeSupport Connect plan gives you telephone access to essential product assistance from experienced technical support staff members With this plan you get In North America unlimited toll fre...

Страница 187: ...ca unlimited telephone access to technical support at standard long distance or international rates Monday through Friday from 9 00 a m to 5 00 p m Central time Priority access to technical support st...

Страница 188: ...at intervals you designate Committed response times from your support engineer who will respond to pages within half an hour to voice mail within one hour and to e mail within four hours Assignable c...

Страница 189: ...Europe Middle East Africa 9am 6pm local time Asia Pacific 8 a m 6 p m AEST Latin America 9 a m 5 p m CT Monday Friday after hours emergency access North America 8 a m 8 p m CT Europe Middle East Afri...

Страница 190: ...et download upgrade login asp Free 24 hour per day seven days per week access to online or electronic support through the Network Associates voice and fax system the Network Associates website and thr...

Страница 191: ...business hours Monday through Friday from 7 00 a m to 6 00 p m Pacific time You call a toll free number use a credit card to take care of the transaction and get transferred to the technical support...

Страница 192: ...Plan Pay Per Minute Plan Online Upgrades Plan or Quarterly Disk CD Plan for your Network Associates products In North America call Network Associates Customer Service at 972 855 7044 In international...

Страница 193: ...for network performance Network Associates consultants also develop and deliver custom solutions to help accomplish your project goals from lengthy large scale implementations to brief problem solvin...

Страница 194: ...oduction default asp Total Education Services Network Associates Total Education Services builds and enhances the skills of all network professionals through practical hands on instruction The Total E...

Страница 195: ...uch faster and at a far lower cost in bandwidth than ever before Better still the AutoUpdate utility makes this process completely transparent it will download as many incremental DAT files as it need...

Страница 196: ...ld extract and install all of the virus definition files it needed to bring your existing DAT files up to date The utility finds the information it needs to determine which packages to download in the...

Страница 197: ...e the iDAT files patch the existing DAT files you may not download the iDAT files through the AutoUpdate utility and use the utility to save them for later updates You can download the UPD packages in...

Страница 198: ...s brings your network to a workable baseline state You can then download and install iDAT files to keep current 2 From the baseline state use a web browser or FTP client software each week to download...

Страница 199: ...ers are off or if they do not have the VirusScan Console running the AutoUpdate utility will resume its scheduled task when you next start the computer or the VirusScan Console To learn how to use thi...

Страница 200: ...ut of date After that point it becomes more efficient to download a full DAT file set Network configuration issues Q Do all the machines I want to update need to be able to connect to the Internet A N...

Страница 201: ...ecureCast 108 119 using iDAT files with 195 AutoUpgrade advanced options for configuring 126 to 128 number of connection attempts made for update sites 125 options for configuring 118 to 128 use of wi...

Страница 202: ...ew viruses to McAfee xvii E Mail Scan dependent files 152 program files 152 temporary files 153 E Mail Scan program component default responses when virus found 84 to 85 Emergency DAT files location a...

Страница 203: ...INI file for 196 infected files cleaning yourself when VirusScan cannot 73 removing viruses from 71 to 85 installation aborting if virus detected during 71 logging 60 silent 59 specific features 61 t...

Страница 204: ...130 preserving settings 64 PrimeSupport corporate at a glance 189 KnowledgeCenter 185 ordering 188 PrimeSupport Connect 186 PrimeSupport Connect 24 By 7 187 PrimeSupport Enterprise 187 for home users...

Страница 205: ...Scheduler purpose of 98 ScreenScan dependent files 149 program files 148 SecureCast common data files delivered via 172 Enterprise SecureCast 171 setting up 183 troubleshooting 183 unsubscribing from...

Страница 206: ...for VirusScan 33 SecureCast 173 System Scan module default response options for 77 to 79 T Task menu View Activity Log 113 124 technical support corporate at a glance 189 KnowledgeCenter 185 ordering...

Страница 207: ...g and distributing 108 to 119 updates and upgrades use of anonymous FTP to log into sites for 115 126 use of UNC notation to designate 114 125 updates and upgrades website address for obtaining 190 up...

Страница 208: ...hat it does 97 VirusScan application dependent files 143 program files 143 temporary files 145 VirusScan Command Line use of when booting with Emergency Disk 72 VirusScan control panel 133 files 147 o...

Отзывы: