McAfee SAV85E - Active VirusScan - PC Uživatelská příručka Strana 1

Procházejte online nebo si stáhněte Uživatelská příručka pro Software McAfee SAV85E - Active VirusScan - PC. McAfee SAV85E - Active VirusScan - PC Product guide [en] Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk

Shrnutí obsahu

Strany 1 - Best Practices Guide

McAfee VirusScan Enterprise 8.8Best Practices Guide

Strany 2

4. Confirming VirusScan, DAT file, and engineversionsThe importance of an update strategy cannot be overstated. Without the latest VirusScanEnterprise

Strany 3 - Contents

To schedule automatic DAT and engine updates, refer to 8. Configuring DAT files and Engineupdates.5. Enabling "Artemis"Artemis, the heuristi

Strany 4 - Conventions

6. Configuring daily memory scansOn-demand scanning of processes and memory is the early warning system for your VirusScanEnterprise protected compute

Strany 5 - Finding product documentation

• Memory for rootkits• Running processesThe following ePolicy Orchestrator 4.5 display shows the memory rootkits and running processesscan configured:

Strany 6 - Getting Started

• Cookies• RegistryClick the following Scan Options:• Include subfolders• Scan boot sectorsThe following ePolicy Orchestrator 4.5 display shows these

Strany 7

• Set the specific information depending on how often you configured the on-demand scanto run.The following ePolicy Orchestrator 4.5 display shows the

Strany 8 - Default = Enable

8. Configuring DAT files and Engine updatesAll of the previous sections describing on-demand and on-access scanning require the VirusScanEnterprise DA

Strany 9

You must click Schedule and configure how often and when you want to update these packages.Refer to theMcAfee VirusScan Enterprise 8.8 software Produc

Strany 10

Configuring Performance ImprovementsSome of the default settings for VirusScan Enterprise might not be the best settings for optimalperformance. These

Strany 11

Changing a system registry to improve performanceBy default the McAfee Agent registry setting is configured to run at normal priority. Changingthe McA

Strany 12

COPYRIGHTCopyright © 2010 McAfee, Inc. All Rights Reserved.No part of this publication may be reproduced, transmitted, transcribed, stored in a retrie

Strany 13

8 Restart the McAfee Framework Service using the following steps:• Click Start | Run, type services.msc.• From the General tab, scroll up or down and

Strany 14

Table 1: Low-risk processesEffectProcessApplicationImproves overall performanceFrameworkService.exeMcAfee AgentImproves DAT update performanceMcScanCh

Strany 15

Configuring file exclusions on Windows DomainControllerTo improve VirusScan Enterprise on-access scan performance, configure exclusions for somefiles

Strany 16

Active Directory and Active Directory-Related FilesCreate exclusions for the following files and folders:Main NTDS Database Files• Default path — %win

Strany 17 - Configuring the AutoUpdate

FRS Database Log files• Default path — %windir%\ntfrs\• Path and file name(s):• %FRS Working Dir%\jet\log\*.logNOTE: If registry key is not set.• %DB

Strany 18

• sysvol ExcludeNOTE: If any one of these folders or files have been moved or placed in a different location,scan or exclude the equivalent element.•

Strany 19 - 1, then click OK

Configure an exclusionPerform the following steps to configure an exclusion for your administrator tool:NOTE: The following process uses the open sour

Strany 20 - Low-risk processes

each of these files is opened Windows Explorer decompresses these files looking for icons toadd to the icon cache. As each file is opened the on-acces

Strany 21 - Table 1: Low-risk processes

The following figure shows the corresponding Windows Set Priority setting for the on-demandscan set priority configured as Normal in Task Manager.Conf

Strany 22 - Controller

Setting the system utilization for the scan to low provides improved performance for otherrunning applications. The low setting is useful for systems

Strany 23

ContentsPreface. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Strany 24

Configuring on-demand scan file scan threads forbest performanceIf you are running on-demand scans on a system with dual core processors, or very fast

Strany 25

2 Start the windows Registry Editor and navigate to the following local machine key:HKLM\Software\McAfee\DesktopProtection\Tasks3 Depending on whether

Strany 26 - RemAdm-TightVNC

Additional changeIf you still experience unresponsiveness, McAfee recommends you change the way the DATSare being consumed by the engine. Before you m

Strany 27

Configuring the scan cacheTo configure the scan cache settings using the ePolicy Orchestrator, access the VirusScanEnterprise 8.8.0, General Options P

Strany 28

Other Common Configuration ChangesYou can make changes to the VirusScan Enterprise 8.8 default configuration to add or improveother performance charac

Strany 29

Configuring exclusions on Exchange servers withGroupShieldMicrosoft Exchange Server 2010 system running McAfee GroupShield should have VirusScanEnterp

Strany 30 - Above average

Add all of the exclusions lists in the following tables:• Exchange Application-related extension exclusions• Exchange Database-related extension exclu

Strany 31 - Scan thread setting

Exchange Application-related extension exclusionsApplicable to...ExclusionExchange Server 2010**\Microsoft\Exchange Server\**\*.configExchange Server

Strany 32 - Configuring the scan cache

Applicable to...ExclusionExchange Server 2010**\Microsoft\Exchange Server\**\*.002Exchange Unified Messaging-related extension exclusionsApplicable to

Strany 33

Configuring on-access scanning of trusted installersThe Microsoft Windows Trusted Installer, or TrustedInstaller service, protects certain systemfiles

Strany 34

PrefaceContentsAudienceConventionsHow this guide is organizedFinding product documentationAudienceMcAfee documentation is carefully researched and wri

Strany 35 - GroupShield

These two events are displayed in the VSE: Threats Detected that appear on your ePolicyOrchestrator dashboard.NOTE: By filtering these events there is

Strany 36

Index1051 and 1059 events, filtering 39AActive Directory exclusions 22archive files exclusions 26Artemis, minimum settings 11audience for this guide 4

Strany 37

TTrusted Installerconfigure on-access scanning 39UUnable to scan password protected, 1051 event 39Vvirtual machine protection settings, table 7VirusSc

Strany 38 - Exchange processes

How this guide is organizedThis document is meant as a reference to use along with the VirusScan Console and ePolicyOrchestrator user interfaces.• Get

Strany 39

Getting StartedTo properly use VirusScan Enterprise 8.8 you must understand what it does and what is newin this release.What it is and doesVirusScan E

Strany 40

Configuring Essential SecurityThe VirusScan Enterprise settings described in this chapter have protected hundreds of customersfrom malware attacks. Mc

Strany 41

• Prevent termination of McAfee processesThe following ePolicy Orchestrator 4.5 display shows VirusScan Enterprise self protectionconfigured.2. Config

Strany 42

3. Setting buffer overflow minimum protectionBuffer overflow attacks compose greater than 25% of malware attacks. Without buffer overflowprotection en

Komentáře k této Příručce

Žádné komentáře