McAfee VirusScan Enterprise 8.8 manual

McAfee VirusScan Enterprise 8.8
9.3 · 3
PDF manual
 · 166 pages
English
manualMcAfee VirusScan Enterprise 8.8

System access point violations

When a system access point is violated, the action taken depends on how the rule was
configured.
If the rule was configured to:
Report Information is recorded in the log file.
Block Access is denied.
Review the log file to determine which system access points were violated and which rules
detected the violations, then configure the access protection rules to allow users access to
legitimate items and prevent users from accessing protected items.
Use these scenarios to decide which action to take as a response.
ScenariosDetection type
Unwanted processes If the rule reported the violation in the log file, but did not block the violation, select
the Block option for the rule.
If the rule blocked the violation, but did not report the violation in the log file, select
the Report option for the rule.
If the rule blocked the violation and reported it in the log file, no action is necessary.
If you find an unwanted process that was not detected, edit the rule to include it
as blocked.
Legitimate processes If the rule reported the violation in the log file, but did not block the violation,
deselect the Report option for the rule.
If the rule blocked the violation and reported it in the log file, edit the rule to exclude
the legitimate process from being blocked.

Buffer overflow detections

When a buffer overflow detection occurs, the scanner blocks the detection and a message is
recorded in the On-Access Scan Messages dialog box. You can view the dialog box, then
decide whether to take any additional actions.
The actions you can take include:
Removing the message Select the item in the list, then click Remove.
Creating an exclusion If the detected process is one that you legitimately use, or a
false positive, create an exclusion using the information in the On-Access Scan Messages
dialog box. Review the information in the Name column to determine the name of the
process that owns the writable memory that is making the call. Use the process name to
create an exclusion.
Submitting a sample to McAfee Labs for analysis If the scanner detects something
that you think it should not detect, or does not detect something that you think it should,
you can send a sample to McAfee Labs.

Unwanted program detections

The on-access, on-demand, and email scanners detect unwanted programs based on the
Unwanted Programs Policy you configured. When a detection occurs, the scanner that
detected the potentially unwanted program applies the action that you configured on the Actions
tab for that scanner.
Part III - Response: Handling Threats
Detections and responses
73McAfee VirusScan Enterprise 8.8 Product Guide

Manual

View the manual for the McAfee VirusScan Enterprise 8.8 here, for free. This manual comes under the category photo/video software and has been rated by 3 people with an average of a 9.3. This manual is available in the following languages: English. Do you have a question about the McAfee VirusScan Enterprise 8.8 or do you need help? Ask your question here

Index

Need help?

Do you have a question about the McAfee and is the answer not in the manual?

  • Receive updates on solutions
  • Get answers to your question

Question and answer

Number of questions: 0

McAfee VirusScan Enterprise 8.8 specifications

Below you will find the product specifications and the manual specifications of the McAfee VirusScan Enterprise 8.8.

McAfee VirusScan Enterprise 8.8 is a software program designed for detecting and removing viruses, malware, and other threats from computer systems. It offers real-time protection by scanning files and applications as they are accessed, ensuring a high level of security for users. The software is compatible with various operating systems, making it versatile and widely applicable in different environments. McAfee VirusScan Enterprise 8.8 is known for its proactive defense mechanisms, including behavior-based scanning and advanced heuristics, which help identify and eliminate unknown threats. It also offers flexible deployment options, allowing for centralized management and easy installation across multiple devices. Furthermore, McAfee VirusScan Enterprise 8.8 boasts a user-friendly interface that simplifies the monitoring and management of security settings. It provides regular updates to stay ahead of emerging threats and ensure maximum protection for users' systems. Overall, McAfee VirusScan Enterprise 8.8 is a comprehensive security solution that offers reliable protection against a wide range of cyber threats, making it a valuable tool for businesses and individuals looking to safeguard their digital assets.

General
BrandMcAfee
ModelVirusScan Enterprise 8.8
Productphoto/video software
LanguageEnglish
FiletypeUser manual (PDF)

Frequently Asked Questions

Can't find the answer to your question in the manual? You may find the answer to your question in the FAQs about the McAfee VirusScan Enterprise 8.8 below.

Is the manual of the McAfee VirusScan Enterprise 8.8 available in English?

Yes, the manual of the McAfee VirusScan Enterprise 8.8 is available in English .

Is your question not listed? Ask your question here

No results