McAfee VIRUSSCAN ENTERPRISE User's Guide Page 164

  • Download
  • Add to my manuals
  • Print
  • Page
    / 166
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 163
L
log files, VirusScan Enterprise
access violations 25
email scanning and 69
on-demand scanning and 66
See activity logs, VirusScan Enterprise 84
low-risk processes
configuring VirusScan Enterprise 54
settings 54
M
McAfee Agent
icons indicate version 14
VirusScan Enterprise component overview 10
McAfee Headquarters, VirusScan Enterprise component 10
McAfee Labs
submit a sample 74
submitting samples 94
access 13
accessing Threat Library 95
Artemis sends fingerprint to 53
VirusScan Enterprise component overview 10
McAfee ServicePortal, accessing 8
McAfee Validation Trust Protection Service, disabling during
troubleshooting 98
menu bar, VirusScan Console 13
MER tool (See Minimum Escalation Requirements tool) 97
Messages tab, VirusScan Enterprise
on-access scanning 54
mfehidk.sys file, renaming during troubleshooting 98
MFEVTP (See McAfee Validation Trust Protection Service) 98
Minimum Escalation Requirements tool 97
Mirror tab, VirusScan Enterprise 46
mirror task
configuration 46
overview 45
MirrorLog.txt, activity log 84
monitoring, VirusScan Enterprise
overview 84
tools 84
msiexec.exe, command installation command 95
N
network drives
configuring overview 60
configuring using ePolicy Orchestrator 4.0 61
configuring using ePolicy Orchestrator 4.5 and 4.6 61
configuring using the VirusScan Console 62
Notes Scanner Settings tab, VirusScan Enterprise
on-delivery email scanning 69, 71
notifications, VirusScan Enterprise
configuring 78
overview 78
O
On network drives option, VirusScan Enterprise 52
On-Access Scan Messages alert 51
on-access scanning
activity log file 96
configuring with ePolicy Orchestrator 4.0 59
configuring with ePolicy Orchestrator 4.5 and 4.6 58
configuring with the VirusScan Console 59
disabling during troubleshooting 98
deciding how many scanning policies 54
on-access scanning
(continued)
detections and actions 72, 74
general and process settings 54
overview 51
process settings 58
reading from vs. writing to disk 52
scanning policies 54
script scanning 53
unwanted programs, enabling using ePolicy Orchestrator 4.0 41
unwanted programs, enabling using ePolicy Orchestrator 4.5 or
4.6 40
unwanted programs, enabling using the VirusScan Console 42
unwanted programs, overview 40
on-delivery email scanning
alerts and notifications 78
on-demand scanner
unwanted programs, configuring (See Configuring on-demand
scan tasks) 38
on-demand scanning
command line options 91
configuring tasks 66
configuring with ePolicy Orchestrator 4.0 65
configuring with ePolicy Orchestrator 4.5 or 4.6 64
configuring with VirusScan Console 65
detections and actions 75
exclusions 66
incremental, resumable, in-memory 63
methods 63
overview 62
remote storage scans 63
scan deferral 64
system utilization 64
on-network drives
configuring overview 60
configuring using ePolicy Orchestrator 4.0 61
configuring using ePolicy Orchestrator 4.5 and 4.6 61
configuring using the VirusScan Console 62
OnAccessScanLog.txt, activity log 84
OnDemandScanLog.txt, activity log 84
Open Remote Console feature, VirusScan Enterprise
accessing remote systems 94
overview 94
P
passwords
controlling access to VSE interface 21
protecting phone book files 23
User Interface Options policy 21
Performance tab, VirusScan Enterprise
on-demand scanning 66
policies, VirusScan Enterprise
Alert Policies 78
email scanning 69
General Options 21
on-access scanning 54
On-Delivery Email Scan Policies 69
unwanted programs 38
unwanted Programs 73
ports
access protection, options 31
blocking network traffic on 23, 25
potentially unwanted programs (See unwanted programs) 38
process settings
on-access scanning 58
McAfee VirusScan Enterprise 8.8 Product Guide164
Index
Page view 163
1 2 ... 159 160 161 162 163 164 165 166

Comments to this Manuals

No comments