McAfee VIRUSSCAN ENTERPRISE User's Guide Page 72

  • Download
  • Add to my manuals
  • Print
  • Page
    / 166
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 71
Part III - Response: Handling Threats
Responding to threats is the third step in a protection strategy to detect and clean malware
that attempts to gain access to your system.
Contents
Detections and responses
Configuring alerts and notifications
Access queries and dashboards
Configuring emergency DATs
Detections and responses
When a threat occurs and is detected, what happens next is determined by how VirusScan
Enterprise is configured to respond and which feature detects the threat. Understanding these
differences helps you to develop and implement an effective strategy.
Contents
What happens when a detection occurs
System access point violations
Buffer overflow detections
Unwanted program detections
On-access scan detections
On-demand scan detections
Email scan detections
Quarantined items
What happens when a detection occurs
When a detection occurs and is detected, the reaction depends on how VirusScan Enterprise
is configured.
If VirusScan Enterprise is configured to clean automatically (the suggested default setting), the
resulting action depends on the cleaning instruction from the DAT file. For example, if the
scanner cannot clean a file, or if the file has been damaged beyond repair, the scanner might
delete the file or take the secondary action, depending on the definition in the DAT file.
When the scanner denies access to files with potential threats, it adds an .mcm extension to
the file name when the file is saved.
McAfee VirusScan Enterprise 8.8 Product Guide72
Page view 71
1 2 ... 67 68 69 70 71 72 73 74 75 76 77 ... 165 166

Comments to this Manuals

No comments