McAfee SAV85E - Active VirusScan - PC Guide de l'utilisateur

Naviguer en ligne ou télécharger Guide de l'utilisateur pour Logiciel McAfee SAV85E - Active VirusScan - PC. McAfee SAV85E - Active VirusScan - PC Product guide [en] Manuel d'utilisatio

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer

Résumé du contenu

Page 1 - Best Practices Guide

McAfee VirusScan Enterprise 8.8Best Practices Guide

Page 2

4. Confirming VirusScan, DAT file, and engineversionsThe importance of an update strategy cannot be overstated. Without the latest VirusScanEnterprise

Page 3 - Contents

To schedule automatic DAT and engine updates, refer to 8. Configuring DAT files and Engineupdates.5. Enabling "Artemis"Artemis, the heuristi

Page 4 - Conventions

6. Configuring daily memory scansOn-demand scanning of processes and memory is the early warning system for your VirusScanEnterprise protected compute

Page 5 - Finding product documentation

• Memory for rootkits• Running processesThe following ePolicy Orchestrator 4.5 display shows the memory rootkits and running processesscan configured:

Page 6 - Getting Started

• Cookies• RegistryClick the following Scan Options:• Include subfolders• Scan boot sectorsThe following ePolicy Orchestrator 4.5 display shows these

Page 7

• Set the specific information depending on how often you configured the on-demand scanto run.The following ePolicy Orchestrator 4.5 display shows the

Page 8 - Default = Enable

8. Configuring DAT files and Engine updatesAll of the previous sections describing on-demand and on-access scanning require the VirusScanEnterprise DA

Page 9

You must click Schedule and configure how often and when you want to update these packages.Refer to theMcAfee VirusScan Enterprise 8.8 software Produc

Page 10

Configuring Performance ImprovementsSome of the default settings for VirusScan Enterprise might not be the best settings for optimalperformance. These

Page 11

Changing a system registry to improve performanceBy default the McAfee Agent registry setting is configured to run at normal priority. Changingthe McA

Page 12

COPYRIGHTCopyright © 2010 McAfee, Inc. All Rights Reserved.No part of this publication may be reproduced, transmitted, transcribed, stored in a retrie

Page 13

8 Restart the McAfee Framework Service using the following steps:• Click Start | Run, type services.msc.• From the General tab, scroll up or down and

Page 14

Table 1: Low-risk processesEffectProcessApplicationImproves overall performanceFrameworkService.exeMcAfee AgentImproves DAT update performanceMcScanCh

Page 15

Configuring file exclusions on Windows DomainControllerTo improve VirusScan Enterprise on-access scan performance, configure exclusions for somefiles

Page 16

Active Directory and Active Directory-Related FilesCreate exclusions for the following files and folders:Main NTDS Database Files• Default path — %win

Page 17 - Configuring the AutoUpdate

FRS Database Log files• Default path — %windir%\ntfrs\• Path and file name(s):• %FRS Working Dir%\jet\log\*.logNOTE: If registry key is not set.• %DB

Page 18

• sysvol ExcludeNOTE: If any one of these folders or files have been moved or placed in a different location,scan or exclude the equivalent element.•

Page 19 - 1, then click OK

Configure an exclusionPerform the following steps to configure an exclusion for your administrator tool:NOTE: The following process uses the open sour

Page 20 - Low-risk processes

each of these files is opened Windows Explorer decompresses these files looking for icons toadd to the icon cache. As each file is opened the on-acces

Page 21 - Table 1: Low-risk processes

The following figure shows the corresponding Windows Set Priority setting for the on-demandscan set priority configured as Normal in Task Manager.Conf

Page 22 - Controller

Setting the system utilization for the scan to low provides improved performance for otherrunning applications. The low setting is useful for systems

Page 23

ContentsPreface. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Page 24

Configuring on-demand scan file scan threads forbest performanceIf you are running on-demand scans on a system with dual core processors, or very fast

Page 25

2 Start the windows Registry Editor and navigate to the following local machine key:HKLM\Software\McAfee\DesktopProtection\Tasks3 Depending on whether

Page 26 - RemAdm-TightVNC

Additional changeIf you still experience unresponsiveness, McAfee recommends you change the way the DATSare being consumed by the engine. Before you m

Page 27

Configuring the scan cacheTo configure the scan cache settings using the ePolicy Orchestrator, access the VirusScanEnterprise 8.8.0, General Options P

Page 28

Other Common Configuration ChangesYou can make changes to the VirusScan Enterprise 8.8 default configuration to add or improveother performance charac

Page 29

Configuring exclusions on Exchange servers withGroupShieldMicrosoft Exchange Server 2010 system running McAfee GroupShield should have VirusScanEnterp

Page 30 - Above average

Add all of the exclusions lists in the following tables:• Exchange Application-related extension exclusions• Exchange Database-related extension exclu

Page 31 - Scan thread setting

Exchange Application-related extension exclusionsApplicable to...ExclusionExchange Server 2010**\Microsoft\Exchange Server\**\*.configExchange Server

Page 32 - Configuring the scan cache

Applicable to...ExclusionExchange Server 2010**\Microsoft\Exchange Server\**\*.002Exchange Unified Messaging-related extension exclusionsApplicable to

Page 33

Configuring on-access scanning of trusted installersThe Microsoft Windows Trusted Installer, or TrustedInstaller service, protects certain systemfiles

Page 34

PrefaceContentsAudienceConventionsHow this guide is organizedFinding product documentationAudienceMcAfee documentation is carefully researched and wri

Page 35 - GroupShield

These two events are displayed in the VSE: Threats Detected that appear on your ePolicyOrchestrator dashboard.NOTE: By filtering these events there is

Page 36

Index1051 and 1059 events, filtering 39AActive Directory exclusions 22archive files exclusions 26Artemis, minimum settings 11audience for this guide 4

Page 37

TTrusted Installerconfigure on-access scanning 39UUnable to scan password protected, 1051 event 39Vvirtual machine protection settings, table 7VirusSc

Page 38 - Exchange processes

How this guide is organizedThis document is meant as a reference to use along with the VirusScan Console and ePolicyOrchestrator user interfaces.• Get

Page 39

Getting StartedTo properly use VirusScan Enterprise 8.8 you must understand what it does and what is newin this release.What it is and doesVirusScan E

Page 40

Configuring Essential SecurityThe VirusScan Enterprise settings described in this chapter have protected hundreds of customersfrom malware attacks. Mc

Page 41

• Prevent termination of McAfee processesThe following ePolicy Orchestrator 4.5 display shows VirusScan Enterprise self protectionconfigured.2. Config

Page 42

3. Setting buffer overflow minimum protectionBuffer overflow attacks compose greater than 25% of malware attacks. Without buffer overflowprotection en

Commentaires sur ces manuels

Pas de commentaire