Mcafee Guide
Mcafee Guide
7i Product Guide
COPYRIGHT Copyright 2008 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means without the written permission of McAfee, Inc., or its suppliers or affiliate companies. TRADEMARK ATTRIBUTIONS AVERT, EPO, EPOLICY ORCHESTRATOR, FLASHBOX, FOUNDSTONE, GROUPSHIELD, HERCULES, INTRUSHIELD, INTRUSION INTELLIGENCE, LINUXSHIELD, MANAGED MAIL PROTECTION, MAX (MCAFEE SECURITYALLIANCE EXCHANGE), MCAFEE, MCAFEE.COM, NETSHIELD, PORTALSHIELD, PREVENTSYS, PROTECTION-IN-DEPTH STRATEGY, PROTECTIONPILOT, SECURE MESSAGING SERVICE, SECURITYALLIANCE, SITEADVISOR, THREATSCAN, TOTAL PROTECTION, VIREX, VIRUSSCAN, WEBSHIELD are registered trademarks or trademarks of McAfee, Inc. and/or its affiliates in the US and/or other countries. McAfee Red in connection with security is distinctive of McAfee brand products. All other registered and unregistered trademarks herein are the sole property of their respective owners. LICENSE INFORMATION License Agreement NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, WHICH SETS FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU HAVE ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT ACCOMPANIES YOUR SOFTWARE PACKAGING OR THAT YOU HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET, A FILE ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEB SITE FROM WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO MCAFEE OR THE PLACE OF PURCHASE FOR A FULL REFUND. License Attributions Refer to the product Release Notes.
Contents
Introducing VirusScan Enterprise. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Using VirusScan Enterprise. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Getting started. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 What to do first. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 Where to find product information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Contents
Mirror tasks and how they work. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 Configuring the mirror task. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 How the AutoUpdate repository works. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 Configuring the repository list. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 How rolling back DAT files works. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 Rolling back DAT files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Contents
On-access scan detections. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47 On-demand scan detections. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47 Email scan detections. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48 Quarantined items. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
Supplemental Information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Accessing user interface options. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 VirusScan Console and how it works. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 Using right-click features. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50 System tray icon and how it works. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 Start menu and how it works with VirusScan Enterprise. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 Command line and using it to configure VirusScan Enterprise. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52 Adding and excluding scan items. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52 Specifying scan items. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52 Specifying exclusions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52 Using wildcards to specify scan items. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52 Scheduling tasks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 Configuring the task schedule. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 Configuring command-line options. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 Configuring on-demand scanning command-line options. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 Configuring update task command-line options. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55 Connecting to remote systems. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 Accessing remote systems with VirusScan Enterprise installed. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 Submitting threat samples for analysis. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 Accessing the Avert Labs Threat Library. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 Troubleshooting. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 Repairing the product installation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 Frequently asked questions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
Module, you have additional rules to protect you from potentially unwanted spyware-related threats. Buffer Overflow Protection Prevent exploited buffer overflows from executing arbitrary code on your computer. Unwanted Program Protection Eliminate potentially unwanted programs such as spyware and adware from your computer. Detection Develop an effective strategy to detect intrusions when they occur. Configure these features to detect threats: Update Task Get automatic updates of detection definitions and scanning engine from the McAfee download website. On-Access Scanning Detect potential threats from any possible source as files are read from or written to disk. If you installed the AntiSpyware Enterprise Module, you can also scan for potentially unwanted cookies in the cookies folder. On-Demand Scan Tasks Detect potential threats using immediate and scheduled scan tasks. If you installed the AntiSpyware Enterprise Module, you can also scan for potentially unwanted cookies and spyware-related registry entries that were not previously cleaned. On-Delivery and On-Demand Email Scanning Detect potential threats on Microsoft Outlook email clients using on-delivery scanning of messages, attachments, and public folders. Detect potential threats on Lotus Notes email clients when messages are accessed. Quarantine Manager Policy Specify the quarantine location and the length of time to keep quarantined items. Restore quarantined items as necessary. Notification Alerts and Notifications Configure alerts to notify you when detections occur. Response Use product log files, automatic actions, and other notification features to decide the best way to handle detections. Log files Monitor product log files to view a history of detected items. Queries and Dashboards Use ePolicy Orchestrator queries and dashboards to monitor scanning activity and detections. Actions Configure features to take action on detections. Supplemental Information Refer to these topics for additional information: Accessing user interface options Access the standalone version of the product in a number of ways. Adding and Excluding Scan Items Fine-tune the list of file types scanned for each of the scanners. Scheduling tasks Schedule on-demand scan, update, and mirror tasks to run at specific dates and times, or intervals. Configuring command-line options Configure on-demand scan and update tasks from the command line.
Connecting to remote system Connect to remote systems with VirusScan Enterprise installed to perform actions such as modify and schedule scanning or update tasks or to enable and disable the on-access scanner. Submitting threat samples for analysis Submit samples of undetected potential threats to Avert Labs through WebImmune. Accessing the Avert Labs Threat Library Access the information in the Avert Labs Threat Library. Troubleshooting Get information about how to repair the product installation and frequently asked questions.
Getting started
We assume that you have the necessary privileges to perform the steps described in this guide. 1 Get the VirusScan Enterprise 8.7i product files from the McAfee download site. These files may include the product installation files, the product package file, the report and help extension files, and the ePolicy Orchestrator migration tool. See the VirusScan Enterprise 8.7i Release Notes for installation and known issues. For ePolicy Orchestrator, use the Check-In Wizard to add the product and report extension files and the product package file to the repository. If you are upgrading from a previous version of VirusScan Enterprise and want to preserve settings, run the ePolicy Orchestrator migration tool. See the ePolicy Orchestrator product documentation for details. For VirusScan Enterprise standalone installation, see the Installation Guide for details about installing the product. If you are upgrading from a previous version of VirusScan Enterprise, the Installation Guide describes how to preserve settings.
What to do first
When installed, VirusScan Enterprise is configured to use the detection definitions that were packaged with the product and provide general security for your environment. We recommend that you get the latest detection definitions and customize the configuration to meet your requirements before you deploy the product to client systems. Task Take these actions immediately after installing the product. 1 Set user interface security. Configure the display and password options to prevent users from accessing specific components or the entire VirusScan Enterprise user interface. See Controlling Access to the User Interface for more information. Update detection definitions. Perform an Update Now task to ensure that you have the most recent detection definitions. See Updating Detection Definitions for more information. Prevent intrusions. Configure these features to prevent potential threats from accessing your systems: Access Protection. Configure access protection rules to prevent unwanted changes to your computer and enable the option to prevent McAfee processes from being terminated. See Protecting Your System Access Points for more information.
Buffer Overflow Protection. Enable buffer overflow detection and specify exclusions. See Blocking Buffer Overflow Exploits for more information. Unwanted Programs Policy. Configure the policy that the on-access, on-demand, and email scanners use to detect potentially unwanted programs. Select categories of unwanted program categories to detect from a predefined list, then define additional programs to detect or exclude. See Restricting Potentially Unwanted Programs for more information. 4 Detect intrusions. Configure these features to detect potential threats on your systems, then notify you and take action when detections occur: AutoUpdate. Configure update tasks to get the most current detection definitions, scanning engine, and product upgrades. See Updating Detection Definitions for more information. On-Access Scanner. Configure the scanner to detect and take action on potential threats as they are accessed in your environment. Enable scanning of unwanted programs. If you installed the AntiSpyware Enterprise Module, you can also scan for cookies in the cookies folder. See Scanning Items On-Access for more information. On-Demand Scanner. Configure scan tasks to detect and take action on potential threats in your environment. Enable scanning of unwanted programs. If you installed the AntiSpyware Enterprise Module, you can also scan for cookies in the cookies folder and potentially unwanted spyware-related registry entries that were not previously cleaned. See Scanning Items On-Demand for more information. Email Scanners. Configure the on-delivery and on-demand scanning of Microsoft Outlook and Lotus Notes email clients. Enable scanning of unwanted programs. See Scanning Email On-Delivery and On-Demand for more information. 5 Send alerts and quarantine threats. Configure these features to alert you when detections occur and manage quarantined items: Alerts and Notifications. Configure how and when you receive detection notifications and alerts. See Configuring Alerts and Notifications for more information. Quarantine Manager Policy. Configure the location of the quarantine folder and the number of days to keep quarantined items before automatically deleting them. See Defining the Quarantine Policy for more information.
Release Notes
Known issues in the current release. Issues resolved since the last release.
Online Help
Maintaining the software. Reference information. All information found in the product guide.
Online Help
Installation Phase Last-minute changes to the product or its documentation. Preparing for, installing and deploying software in a production environment.
Maintenance Phase
Knowledgebase (knowledge.mcaf)
Release notes and documentation. Supplemental product information. Workarounds to known issues.
Installation Guide
Finding release notes and documentation for McAfee enterprise products 1 2 Go to knowledge.mcafee.com and select Product Documentation under Useful links. Select <Product Name> | <Product Version> and select the required document from the list of documents.
Accessing help topics from the product To access help topics: From the ePolicy Orchestrator console, click ?, then select VirusScan Enterprise 8.7i. For option definitions, click ? on the policy or task tab. From the VirusScan Console, select Help Topics from the Help menu. NOTE: The first time you access Help after installing the product, you are asked if you want to download the Help file. Click Yes to download the Help file and install it in your installation directory. For option definitions, click Help on the feature properties tab.
10
11
Controlling Access to the User Interface Configuring user interface security settings
Description Specify password security for the entire system or selected items.
12
These protection levels apply to anti-virus rules: Common Standard Protection Maximum Protection Outbreak Control
These preconfigured rules prevent modification of commonly used files and settings. You can enable, disable, and change the configuration, but you cannot delete these rules.
13
Protecting Your System Access Points Access point violations and how VirusScan Enterprise responds
Rule type
Description Three rule examples are: Prevent modification of McAfee files and settings. Protect Mozilla and Firefox files and settings, Internet Explorer settings, and network settings. Prevent installation of Browser Helper Objects and automatically running programs from the Temp folder.
These protection levels apply to common rules. Virtual Machine Protection Standard Protection Maximum Protection
These preconfigured rules prevent termination of VMWare processes and modification of VMWare files. You can enable, disable, and change the configuration, but you cannot delete these rules. Rule examples are: Prevent termination of VMWAre Processes. Prevent modification of VMWare workstation, server, or virtual machine files.
User-defined
These custom rules supplement the protection provided by the Anti-virus and Common rules. If you installed the AntiSpyware Enterprise Module, you have additional rules to protect you from spyware-related threats. Rule examples are: Prevent Internet Explorer favorites and settings. Prevent programs from running and execution of scripts from the Temp folder.
Anti-spyware
Maximum
Outbreak control
14
The event is recorded in the local event log and to SNMP, if you configured Alert Properties to do so. The event is reported to Alert Manager and/or ePolicy Orchestrator, if those products are configured to do so. The Block and/or Report action is taken depending on which actions are configured for the rule that detected the violation. On the client system, a red frame surrounds the system tray icon and remains visible for 30 minutes unless you reset it. NOTE: To reset the icon, open the Access Protection Log File from the system tray icon. Opening the log file by any other method does not reset the icon to its normal state.
15
Tab Reports
Description Enable activity logging. Specify the log file name and location. Specify the log file size limit. Select the log file format.
16
Definition Prevent systems on the network from accessing the specified ports. Prevent local processes from accessing the specified ports on the network.
Navigate to the file. Navigate to the folder. Block read access to the specified files. Block write access to the specified files. Block files from being executed in the specified folder. Block new files from being created in the specified folder. Block files from being deleted from the specified folder.
Type a key or value in the text box. Selecting the root key or value from the drop-down list is optional. Use either of these methods to specify the key or value: Select the root key or value from the drop-down list, then type the remaining path to the key or value in the text box. Type the full path to the key or value in the text box.
17
Definition Select the type of rule: Key This rule protects the specified key. Value This rule protects the specified value.
Block writing to the specified key or value. Block creating the specified key or value. Block deleting the specified key or value.
Processes to exclude
18
19
Tab descriptions
Tab Buffer Overflow Protection Description Reports Enable buffer overflow protection. Configure the detection mode to warn and/or protect you from buffer overflows. Display the On-Access Scan Messages dialog box when a detection occurs. Enable activity logging. Specify the log file name and location. Specify the log file size limit. Select the log file format.
20
To access the Unwanted Programs properties: From the ePolicy Orchestrator console, go to Systems | Policy Catalog and select VirusScan Enterprise 8.7.0 in the Product list and Unwanted Programs Policies in the Category list. From the VirusScan Console, open the Unwanted Programs Policy properties. Configure the options on each tab. For option descriptions, click ? or Help on each tab.
21
Tab descriptions
Tab Scan Items Description User-Defined Items Select the categories of unwanted programs to detect. For example, spyware, adware, etc. These categories are defined by the current DAT file. Specify exclusions.
22
23
whenever new product versions are available. Avoiding the competition for network bandwidth enables you to deploy your new software with minimal interruptions.
Update task activities These activities occur when you run an update task:
24
A connection is made to the first enabled repository (update site) in the repository list. If this repository is not available, the next site is contacted, and so on until a connection is made, or until the end of the list is reached. An encrypted CATALOG.Z file downloads from the repository. The file contains the fundamental data required to update. This data is used to determine which files and/or updates are available. The software versions in the file are checked against the versions on the computer. If new software updates are available, they are downloaded. Once the update is checked in to the repository, the update is verified to confirm that it is applicable to VirusScan Enterprise and that the version is newer than the current version. Once this is verified, VirusScan Enterprise downloads the update when the next update task runs. Update task interruption If the update task is interrupted for any reason during the update: A task updating from an HTTP, UNC, or local site resumes where it left off the next time the update task starts. A task updating from an FTP site does not resume if interrupted during a single file download. However, if the task is downloading several files and is interrupted, the task resumes before the file that was being downloaded at the time of the interruption. Update using EXTRA.DAT An EXTRA.DAT file can be used as a temporary measure in an emergency. The EXTRA.DAT is downloaded from the repository on each update. This ensures that if you modify and re-check in the EXTRA.DAT in as a package, all VirusScan Enterprise clients download and use the same updated EXTRA.DAT package. For example, you may use the EXTRA.DAT as an improved detector for the same potentially unwanted program or additional detection for other new potentially unwanted programs. VirusScan Enterprise supports using only one EXTRA.DAT file. TIP: When you have finished using the EXTRA.DAT file, you should remove it from the master repository and run a replication task to ensure it is removed from all distributed repository sites. This stops VirusScan Enterprise clients from attempting to download the EXTRA.DAT file during an update. By default, detection for the new potentially unwanted program in the EXTRA.DAT is ignored once the new detection definition is added to the daily DAT files.
25
Tab
Description Specify which executable to run after the update task has completed and whether to run it only after a successful update.
26
Encrypted credentials required to access each repository. When an AutoUpdate task is performed, a connection is made to the first enabled repository (update site) in the repository list. If this repository is not available, the next repository is contacted, and so on until a connection is made, or until the end of the list is reached. Proxy servers are used as part of the Internet security to hide Internet users' computers from the Internet and improve access speed by caching commonly accessed sites. If your network uses a proxy server, you can specify which proxy settings to use, the address of the proxy server, and whether to use authentication. Proxy information is stored in the AutoUpdate repository list. The proxy settings you configure apply to all repositories in the repository list. The location of the AutoUpdate repository list depends on your operating system. For example, for Windows XP:
C:\Documents and Settings\All Users\Application Data\McAfee\Common Framework
27
Task 1 2 From the VirusScan Console, select Tools | Rollback DATs. Click Yes to proceed with the DAT roll back. NOTE: This feature is not available from the ePolicy Orchestrator console. Configure the options on the tab. For option descriptions, click Help on the tab.
28
29
Scanning comparison: scanning all files vs. scanning default + additional file types
The on-access scanner treats scans differently depending on whether it is configured to scan all files or to scan default plus additional file types. When scanning All files, the scanner scans every file type for all possible threats. When scanning Default + additional file types, the scanner examines a specific list of files based on the file types you select. Default file types: the scanner examines the specified file type only for threats that attack that file type. For example, when scanning an XLS file, the scanner scans XLS files for threats that attack XLS files, such as macros. The scanner does not scan the XLS files for threats like PE (portable executable) infectors or even the EICAR test file. If the XLS file is renamed to that different file type, the scanner scans the renamed file for the threats that affect the newly named file type. Additional file types: the scanner scans the file type for all possible threats, as it does for All files.
30
31
Scanning Items On-Access How general and process settings are configured
Backup software Compiling processes High-risk Processes with a greater possibility of spreading or introducing a potential threat. For example: Processes that launch other processes, such as Microsoft Windows Explorer or the command prompt. Processes that execute scripts or macros, such as WINWORD or CSCRIPT. Processes used for downloading from the internet, such as browsers, instant messengers, or mail clients. NOTE: Initially, the high-risk scanning policy is set the same as the policy for default processes to ensure that high-risk processes are scanned in depth and give you the maximum protection. We do not recommend reducing the default level of scanning. Default Any process not defined as low-risk or high-risk.
32
Description Enable scanning of scripts and specify exclusions. Send a message when a remote computer writes a threat to this system and specify the message. Block the connection when a remote computer writes a threat to this system. Unblock the connection after the specified time. Block the connection when a file with a potentially unwanted program is detected in a shared folder. Display the messages dialog box to local users when a detection occurs and specify the message. If the AntiSpyware Enterprise Module is installed, send an alert when a cookie is detected. Configure which actions users without administrator rights can take on messages. Enable activity logging. Specify the log file name and location. Specify the log file size limit. Select the log file format. Specify what to log besides scanning activity.
Messages
Reports
33
Tab
Description On-Access Low-Risk Processes Specify the processes that you define as low-risk. On-Access High-Risk Processes Specify the processes that you define as high-risk.
NOTE: The Configure different scanning policies for high-risk, low-risk, and default processes option must be selected on the On-Access Default Processes tab before you can configure individual policies for low-risk and/or high-risk processes. Scan Items Exclusions Actions Configure whether to scan files on read, on write, on network drives and/or opened for backup. Configure which files and file types to scan. Scan for potential threats that resemble unwanted programs, Trojan horses and macro viruses. Scan inside archives and decode MIME encoded files. Enable on-access scanning for unwanted programs.
Configure which disks, files, and folders to exclude from scanning. For threat detections: Primary action to take when a threat is detected. Secondary action to take on a threat detection if the first action fails.
For unwanted program detections: Primary action to take when an unwanted program is detected. Secondary action to take on an unwanted program detection if the first action fails.
34
35
The lower level, remote storage, is located on the robotic tape library or stand-alone tape drive that is connected to the server computer. Remote Storage automatically copies eligible files on your local volumes to a tape library, then monitors space available on the local volumes. File data is cached locally so that it can be accessed quickly as needed. When necessary, Remote Storage moves data from the local storage to remote storage. When you need to access a file on a volume managed by Remote Storage, open the file as usual. If the data for the file is no longer cached on your local volume, Remote Storage recalls the data from a tape library.
36
Exclusions Performance
Configure which disks, files, and folders to exclude from scanning. Configure when to defer scans and for how long. Specify the system utilization percentage. Configure the sensitivity level for heuristic network check for suspicious files.
Actions
For threat detections: Primary action to take when a threat is detected. Secondary action to take on a threat detection if the first action fails.
For unwanted program detections: Primary action to take when an unwanted program is detected. Secondary action to take on an unwanted program detection if the first action fails.
For allowed actions in the prompt dialog box, select the action. Reports Enable activity logging. Specify the log file name and location. Specify the log file size limit. Select the log file format. Specify what to log besides scanning activity. If you installed the AntiSpyware Enterprise Module, alert when cookies are detected.
37
Tab Task
Description Specify where the on-demand scan task runs. NOTE: This tab is only available via ePolicy Orchestrator.
38
39
Tab descriptions
Tab Scan Items Description Specify which messages and attachments to scan. Scan for potential threats that resemble malware. Scan for unknown macro viruses. Find attachments with multiple extensions. Scan inside archives and decode MIME encoded files. Enable the email scanner to scan for unwanted programs. Scan email message bodies. Configure the sensitivity level for heuristic network check for suspicious files. NOTE: This option is available only for On-Delivery Email Scanning. Actions For threat detections: Primary action to take when a threat is detected. Secondary action to take if the first action fails.
For unwanted program detections: Primary action to take when an unwanted program is detected. Secondary action to take if the first action fails.
For allowed actions in the prompt dialog box, select the action. Alerts Reports Notes Scanner Settings Notify another user when a threatened email message is detected. Specify the message that displays to the user when prompting for action. Enable activity logging. Specify the log file name and location. Specify the log file size limit. Select the log file format. Specify what to log besides scanning activity.
NOTE: This tab is available only for On-Delivery Email Scanning. Configure Lotus Notes specific settings. Scan all server databases. Scan server mailboxes in the specified mailbox root folder. Notes applications to ignore.
40
ePolicy Orchestrator Restore from Quarantine Task From the ePolicy Orchestrator console, go to Systems | System Tree | Client Tasks and select New Task, then under Type select Restore from Quarantine (VirusScan Enterprise 8.7.0). Tab descriptions
Tab Restore Description Specify which items to restore. NOTE: The name of the item to restore can be found in the log file as the detection name. Task Specify the user account that can access the quarantine location.
41
Defining the Quarantine Policy Configuring the quarantine policy and restoring items
VirusScan Console Quarantine Manager Policy From the VirusScan Console, open the Quarantine Manager Policy properties. Tab descriptions
Tab Quarantine Description Manager Specify the quarantine location. Configure the length of time to keep the quarantined items. Restore, rescan, delete, and view quarantined items. NOTE: The name of the item to restore can be found in the log file as the detection name. Check quarantined items for false positives.
42
Configuring alerts
To access the Alerts properties: From the ePolicy Orchestrator console, go to Systems | Policy Catalog and select VirusScan Enterprise 8.7.0 in the Product list and Alerts Policies in the Category list. From the VirusScan Console, select Tools | Alerts. Configure the options on each tab. For option descriptions, click ? or Help on each tab. Tab descriptions
Tab Alert Manager Alerts Description Additional Alerting Options Specify which components generate alerts. Configure Alert Manager. Filter alerts by severity. Configure local alerting.
43
44
Responding to Detections
There are different ways to take action on detections depending on which feature detects the threat. Contents How actions are taken on detections System access point violations Buffer overflow detections Unwanted program detections On-access scan detections On-demand scan detections Email scan detections Quarantined items
45
Detection Type
Scenarios If the rule blocked the violation but did not report the violation in the log file, select the Report option for the rule. If the rule blocked the violation and reported it in the log file, no action is necessary. If you find an unwanted process that was not detected, edit the rule to include it. If the rule reported the violation in the log file but did not block the violation, deselect the Report option for the rule. If the rule blocked the violation and reported it in the log file, edit the rule to exclude the legitimate process.
Legitimate processes
46
47
Submit a sample to Avert Labs for analysis If the scanner detects something that you think it should not detect or does not detect something that you think it should, you can send a sample to Avert Labs.
Quarantined items
Review the items in the quarantine directory, then decide whether to take any of these additional actions: Restore. Rescan. Delete. Check for false positive. View detection properties. From the ePolicy Orchestrator console, use the Restore from Quarantine client task to take action on quarantined items. From the VirusScan Enterprise Console, use the Quarantine Manager Policy options on the Manager tab to take actions on quarantined items.
48
Supplemental Information
Refer to these topics for supplemental information about using VirusScan Enterprise. Contents Accessing user interface options Adding and excluding scan items Scheduling tasks Configuring command-line options Connecting to remote systems Submitting threat samples for analysis Accessing the Avert Labs Threat Library Troubleshooting
49
Help Access online Help topics, the Threat Library on the Avert Labs website, the Submit a Sample website, and the Technical Support website. You can also repair the product installation and view the About dialog box for copyright information and which versions of the product, license, definition files, scanning engine, extra driver, and patch are installed. NOTE: Each item on the menu has an associated shortcut key. The shortcut key is underlined for each item. These shortcut keys might not be available on some operating systems unless you use the keyboard (F10 or ALT) to access the menus. Toolbar Use the icons to access these commonly used commands: Display properties of the selected task. Start the selected task. Stop the selected task. Copy the selected task. Paste the selected task. Delete the selected task. Configure alerting properties. Launch the event viewer. Access the Information Library on the Avert Labs website. Connect to a remote computer if you have administrator rights. Create a new on-demand scan. Task list Displays the default tasks and any new tasks that you create as well as the status and last result for each task. Status bar Displays the status of the current activity.
Right-click the VirusScan Console to display right-click features. These features vary depending on whether you selected a task in the task list and which task you select.
Windows Explorer Right-click a selected file or folder to perform an immediate Full Scan of that item. You can select an action for the scan: Clean - Report and clean the detected item. Continue - Report the detection and continue scanning.
Perform an immediate scan on a file or folder that you suspect is threatened. When you start the scan, the on-demand scanner is invoked directly with all scan settings enabled. Select the action option.
50
Location
Description
Open the VirusScan Console. Disable or enable the on-access scanner. Open the on-access scanner properties. View the on-access scan statistics or messages. Create a one-time configurable on-demand scan. Perform an immediate update task. Open the About dialog box.
51
On-Access Scan Opens the on-access scan property pages. On-Demand Scan - Opens the on-demand scan property pages where you configure and perform a one-time unsaved Full Scan.
Specifying exclusions
Specify files, folders, and drives to exclude from scanning operations. You can also remove any exclusions you specified previously. Option definitions
Option What not to scan Definition Select the type of exclusion. Exclude by pattern Specify the pattern(s) and whether to include subfolders. Exclude by file type Specify a file type(s). Exclude by file age Specify the access type and minimum age in days. Protected by Windows File Protection Exclude files that have Windows Protection File status.
52
Valid wildcards are question mark (?) for excluding single characters and asterisk (*) for excluding multiple characters. Wildcards can appear in front of a back slash (\) in a path. For example: C:\ABC\*\XYZ matches C:\ABC\DEF\XYZ. An exclusion containing question mark (?) characters applies if the number of characters matches the length of the file or folder name. For example: The exclusion W?? excludes WWW, but does not exclude WW or WWWW. The syntax is extended to include a double asterisk (**), which means zero or more of any characters including back slash. This allows multiple-depth exclusions. For example: C:\ABC\**\XYZ matches C:\ABC\DEF\XYZ and C:\ABC\DEF\DEF\XYZ, etc.
Scheduling tasks
You have the option to schedule on-demand, AutoUpdate, and mirror tasks to run at specific dates and times, or intervals.
53
For example, SCAN32 PROPERTY=VALUE [,VALUE] [/option]. On-demand scanning option definitions
Command-line Option ALL ALLOLE ALWAYSEXIT APPLYNVP Definition
Scans all files in the target folder. Scans default files plus all Microsoft Office documents. Forces exit from on-demand scan, even if scan completed with error/failure. Scans for the potentially unwanted programs that are defined in the Unwanted Programs Policy. Scans archive files such as .ZIP, .CAP. LZH, and .UUE files. Exits the on-demand scanner upon completion of a non-interactive scan. Cleans the detected target file when a potentially unwanted program is found. Cleans the detected file when an unwanted program is found. Continues scanning after a potentially unwanted program is detected. Continues scanning after a potentially unwanted program is detected and the primary action has failed. Continues scanning after an unwanted program is detected. Continues scanning after an unwanted program is detected and the primary action has failed. Adds file extensions that you specify as parameters to the list of selected file types that are included in scanning. Deletes the detected file when a potentially unwanted program is found. Deletes the detected file when a potentially unwanted program is found and the primary action has failed. Deletes the file when an unwanted program is detected. Deletes the file when a potentially unwanted program is detected and the primary action has failed. Displays the scan properties dialog box. Replaces the extensions on the list of selected file types that are included in scanning with the file extensions that you add, as parameters following this argument. Logs detection reports to a previously specified log file. Uses the specified format for the log file. Valid values are ANSI, UTF8, or UTF16.
CONTINUEA CONTINUEA2
DEFEXT
DELETE DELETE2
DELETEA DELETEA2
EDIT EXT
Logs the configuration settings of a scan. Logs a summary of scan results. Logs identifying information about the user who executes a scan. Enables heuristic detection of macro threats. Detects potentially unwanted programs in mime (Multipurpose Internet Mail Extensions) encoded files. Does not calculate scan size before beginning scanning of files. Progress bar does not display. Enables heuristic detection of non-macro threats.
NOESTIMATE PHEUR
54
Definition Sets the priority of the scan relative to other CPU processes. Requires an additional numerical parameter. A value of 1 assigns priority to all other CPU processes. A value of 5 assigns the highest priority to the scan. Prompts the user for action when a potentially unwanted program is detected. Prompts the user for action when a potentially unwanted program is detected and the primary action has failed. Prompts the user for action when an unwanted program is detected. Prompts the user for action when an unwanted program is detected. Prompts the user for action when an unwanted program is detected. Prompts the user for action when an unwanted program is detected. Prompts the user for action when an unwanted program is detected and the primary action has failed. Sets the size of the alert log, in Megabytes. Runs the scan. Does not display the properties dialog box. Launches the on-demand scanner task specified in the VirusScan Console. Requires additional parameter specifying the specified task ID as recorded in the registry at: hkey_local_machine_\software\McAfee\Desktop\Protection\Tasks. Launches the scanner without making the user interface dialog visible.
PROMPT PROMPT2
UINONE
Rolls the current DAT file back to the last backed up version. Performs an update of the DAT file, scanning engine, product, or extra.dat. Launches the AutoUpdate or rollback DATs task specified in the VirusScan Console. Requires an additional parameter to specify the task ID as recorded in the registry at:
55
Command-line Option
Definition
hkey_local_machine\software\McAfee\DesktopProtection\Tasks
/QUIET Performs the task silently.
56
If the scanner detects something that you think it should not detect, you can also submit a sample of it to Avert Labs through WebImmune. Avert analyzes it and considers excluding it from the DAT file. You can submit a sample to Avert Labs through WebImmune by directly accessing the web site, via email, or via standard mail. WebImmune From the VirusScan Console, select Help | Submit a Sample to access the website. The website is located at: https://www.webimmune.net/default.asp. 1 2 Log on to your free account, or create one. Upload files directly to the Avert Labs automated systems for review. Items are escalated to the Avert Labs analysts if additional research is required.
Email Send emails directly to the Avert Labs automated systems for review. Items are escalated to the Avert Labs analysts if additional research is required. The global email address is [email protected]. NOTE: Get additional regional addresses from the WebImmune website. Standard Mail Get the address from the WebImmune website. NOTE: This is the least preferred method and causes the longest turnaround time for review of your sample.
Troubleshooting
This section contains troubleshooting information for the VirusScan Enterprise product.
57
Option definitions
Option Restore all settings to installation defaults Definition Restores the VirusScan Enterprise default installation settings. CAUTION: Customized settings might be lost. Reinstalls the VirusScan Enterprise program files. CAUTION: Hotfixes, Patches, and/or Service Packs might be overwritten.
Question: Why can some users on my network configure their own settings and others cannot? Answer: The administrator might have configured the user interface so that tasks are password-protected. If so, users cannot change settings. In addition, different Windows operating systems have different user privileges. Refer to your Microsoft Windows documentation for more information about user privileges. Potentially unwanted programs Question: I suspect I have a potentially unwanted program but VirusScan Enterprise is not detecting it. Answer: Download the latest beta DAT file while it is still being tested prior to the official release, from this website: http://vil.nai.com/vil/virus-4d.asp. Blocked programs Question: I installed VirusScan Enterprise and now one of my programs does not work. Answer: The program might be blocked by an access protection rule. 1 2 Review the access protection log file to determine if the program was blocked by a rule. If you find the program listed in the log, you can either enter it as an exclusion to the rule or disable the rule. See Protecting Your System Access Points for more information.
Cookie detections Question: When reviewing the cookie detections in the on-demand scan activity log, I noticed that the file name detection is always 00000000.ie for every detection. Why does
58
VirusScan Enterprise assign the same file name for every on-demand scan cookie detection when other programs assign an individual or incremental file name to each cookie detection? Answer: VirusScan Enterprise assigns the same file name to each cookie detection because of the way the on-demand scanner detects and takes action on cookies. This behavior applies only to cookies detected by on-demand scans. A cookie file might contain many cookies. The scan engine treats a cookie file as an archive and assigns a value as an offset from the beginning of the file (starting with zero). Because the scanner uses the scan engine to detect and take action on each detected cookie before it proceeds with the scan, the value starts at zero for each detection. The result is that every detection is assigned a 00000000.ie file name. Other products detect all cookies, assign each one an individual or incremental file name, then take action on each detection. General Question: The VirusScan Enterprise icon in my system tray appears to be disabled. Answer: If there is a red circle and line covering the VirusScan Enterprise icon, that indicates that the on-access scanner is disabled. Here are the most common causes and solutions. If none of these solves your problem, contact Technical Support. 1 Make sure that the on-access scanner is enabled. Right-click the VirusScan Enterprise icon in the system tray. If the on-access scanner is disabled, click Enable On-Access Scan. Make sure that the McShield service is running. Start the service manually from the Services Control Panel. Select Start | Run, then type Net Start McShield. Set the service to start automatically from the Services Control Panel. Question: I get an error saying that I cannot download CATALOG.Z. Answer: This error can be caused by many things. Here are some suggestions to help determine the source of the problem: If you are using the McAfee default download site for updates, determine if you can download the CATALOG.Z file from a web browser. Try downloading the file from this website: http://update.nai.com/Products/CommonUpdater/catalog.z. If you can't download the file, but you can see it (in other words, your browser does not allow you to download it), you have a proxy issue and need to talk to your network administrator. If you can download the file, VirusScan Enterprise should be able to download it as well. Contact technical support for assistance in troubleshooting your installation of VirusScan Enterprise. Question: What is the location of the HTTP download site? Answer: The McAfee download site location is: http://www.mcafeesecurity.com/us/downloads/updates/default.asp. The CATALOG.Z file, which contains the latest updates, can be downloaded from this website: http://update.nai.com/Products/CommonUpdater/catalog.z. Question: What is the location of the FTP download site? Answer: The FTP download site location is: ftp://ftp.mcafee.com/pub/antivirus/datfiles/4.x.
59
The CATALOG.Z file, which contains the latest updates, can be downloaded from this site: ftp://ftp.mcafee.com/CommonUpdater/catalog.z. Question: If I do detect a potentially unwanted program and I have chosen prompt user for action, what action should I choose (Clean or Delete)? Answer: Our general recommendation is to choose Clean if you are not sure what to do with a detected file. The on-access and on-demand scanners automatically back up items to the quarantine directory before they are cleaned or deleted.
60
Index
A
access protection 6, 13, 14, 15, 16, 17, 18, 45 about 6 access violations 14 anti-virus and common rules 16 common rules 13 detections and actions 45 excluding processes 18 file/folder blocking rules 17 getting started 13 port blocking rules 16 preconfigured rules 13 protocols, restricting 15 registry blocking rules 17 removing unused rules 18 standard and maximum protection 14 types of rules 14 user-defined rules 14, 15, 16 virtual machine protection 14 access protection, configuring 15 actions unwanted programs 46 Actions tab, VirusScan Enterprise 37 actions, VirusScan Enterprise access protection 45 access violations 14 buffer overflow detections 46 email scanning 48 on-access scanning 45, 47 on-demand scanning 37, 47 quarantined items 48 responding to a threat 44 activity logs unwanted programs 46 activity logs, VirusScan Enterprise access violations 14 buffer overflow reports 19 email scanning and 39, 48 on-access scanning 33 on-demand scanning and 37, 47 reviewing 47 adware (See unwanted programs) 21 Alert Manager access violations 14 configuring alerts 43 events 15 alerts, VirusScan Enterprise about 6 configuring 43 email scanning 39 on-demand scanning 37 overview 43 anti-virus rules configuring access protection 16 anti-virus rules (continued) preconfigured access protection 13 AutoUpdate process overview 24 repositories, connecting to 25 strategies for VSE updates 23
B
bandwidth updating strategies and 23 best practices removing EXTRA.DAT files from repositories 25 strategies for VSE updates 23 updating DAT files and engine 8 Blocking tab, VirusScan Enterprise 33 buffer overflow protection about 6 configuring 19 detections and actions 46 exploits, overview 19
C
CATALOG.Z file, encrypted update 24 command line, using it to configure the product 52 common rules access protection, configuring 16 preconfigured access protection 13 standard and maximum protection 14 configuring process settings 33 CPU usage risk assignment and Windows Task Manager 31
D
dashboards monitoring activity 44 predefined, accessing 44 DAT file updating getting started 8 strategies 23 update tasks, about 24 DAT files detection definitions 23 detections and defined actions 45 EXTRA.DAT files, updating 24 scheduling rollouts 23 script scanning and 30 deployment scheduling VSE update tasks 23 detection definitions (See DAT files) 23 detections access protection 45 actions in response to 45 buffer overflow 46 configuring general settings 33
61
Index
detections (continued) email scanning 39, 48 on-access scanning 47 on-demand scanning 37, 47 responding to 44 dialers (See unwanted programs) 21 documentation product 9 release notes 10
M
Messages tab, VirusScan Enterprise 33
N
notifications, VirusScan Enterprise about 6 configuring 43 overview 43
E
email scanning about 6 configuring 39 detections and actions 48 engine updating AutoUpdate, process overview 24 getting started 8 strategies 23 events, VirusScan Enterprise access violations 14 Alert Manager 15 exclusions identifying processes for 46 on-demand scanning 37 using wildcards to specify scan items 52 what not to scan 52 Exclusions tab, VirusScan Enterprise 37 extension files VirusScan Enterprise 8
O
on-access scanning about 6 assigning risk to a process 31 deciding how many scanning policies 31 detections and actions 45, 47 general and process settings 32 overview 29 process settings 33 reading from vs. writing to disk 30 risk assignment 31 scanning policies 31 script scanning 30 on-delivery email scanning (See email scanning) 6 on-demand scanning about 6 configuring tasks 37 detections and actions 47 exclusions 37 incremental, resumable, in-memory 35 methods 35 remote storage scans 35 scan deferral 36 system utilization 36
F
false positives creating exclusions to reduce 46 file type extensions what not to scan 52 what to scan 52 files and folders blocking, configuring access protection 17 restricting access 15
P
passwords controlling access to VSE interface 11 protecting phone book files 13 User Interface Options policy 11 performance Windows Performance Monitor 31 Performance tab, VirusScan Enterprise 37 policies unwanted Programs 46 policies, VirusScan Enterprise Alert Policies 43 email scanning 39 on-access scanning 31 On-Delivery Email Scan Policies 39 Quarantine Manager 41 unwanted programs 21 User Interface Options 11 ports access protection, configuring 16 blocking network traffic on 14, 15 potentially unwanted programs (See unwanted programs) 21 process settings 33 processes settings, on-access scanning 33 processes, VirusScan Enterprise assigning risk to 31
G
General tab, VirusScan Enterprise 32
H
heuristic scanning 33 high-risk processes assigning risk 31 configuring VirusScan Enterprise 32 settings 32
L
log files access protection, configuring 15 log files, VirusScan Enterprise access violations 14 buffer overflow reports 19 email scanning and 39 on-access scanning 33 on-demand scanning and 37 low-risk processes assigning risk 31 configuring VirusScan Enterprise 32
62
Index
processes, VirusScan Enterprise (continued) default, configuring 32 in memory process scanning 35 incremental or resumable scanning 35 low-risk and high-risk 32 script scanning 30
T
task mirror 26 update 24 task, scheduling 53 Tasks tab, VirusScan Enterprise 38 threat detections (See threats) 39 threats access violations 45 buffer overflow 46 email scanning 48 on-access detections and actions 45 on-access scanning 47 on-demand scanning 47 quarantined items 48 responding to 44 unwanted programs 46 tuning, VirusScan Enterprise what to scan, adding and excluding 52
Q
quarantines, VirusScan Enterprise about 6 configuring 41 detections and actions 48 restore tasks, configuring 41 queries, VirusScan Enterprise about 6 accessing from ePO navigation bar, Reporting 44 monitoring activity 44 predefined, list of 44
R
registry keys access protection, configuring 17 restricting access 15 reports accessing queries 44 configuring VSE logging 39 on-access scanning activity 33 on-demand scanning activity 37 Reports tab, VirusScan Enterprise 33, 37 repositories AutoUpdate, connecting to 25 central, using for VSE updates 23 removing EXTRA.DAT files from 25 rules, VirusScan Enterprise anti-virus 16 file/folder blocking 17 port-blocking 16 registry blocking 17 removing unused 18 user-defined, types of 15
U
unwanted programs about VSE protection 6 actions and on-demand scanning 37 configuring policy for 21 detections and actions 46 email scanning, actions 39 on-demand scanning 35 overview 21 updating, VirusScan Enterprise AutoUpdate 24 extension files 8 process overview 24 strategies 23 tasks 23 update sites 25 update task 6, 23 user accounts access to quarantined items, configuring 41 access to VSE interface, controlling 11 user interface security about 6 configuring 11 passwords and 11 User-Defined Items tab, VirusScan Enterprise 22 user-defined rules, access protection 14
S
Scan Items tab, VirusScan Enterprise 22, 37 Scan Locations tab, VirusScan Enterprise 37 scanning activity logs 46 adding and excluding scan items 52 assigning risk to a process 31 email scans (See email scanning) 39 exclusions, specifying 52 file type extensions, specifying 52 heuristic 33 on-access (See on-access scanning) 29 on-demand (See on-demand scanning) 35 using wildcards to specify scan items 52 script scanning (See on-access scanning) 30 ScriptScan tab, VirusScan Enterprise 33 settings, VirusScan Enterprise general and process, defined 32 general, configuring 32 spyware (See unwanted programs) 21 system tray icon access violations and 14 configuring access to VSE interface 11
V
virtual machine protection rules preconfigured access protection 14 VirusScan Enterprise access protection 13, 14 buffer overflow protection 19 email scanning 39 features, described 6 general settings, configuring 32 getting started 8 notifications and alerts 43 on-access scanning 29, 47 on-demand scanning 35 quarantine policy 41 removing unused rules 18 Restore From Quarantine task 41, 48 unwanted programs policy 21 updating 23, 24
63
Index
VirusScan Enterprise (continued) user interface security 11 what to scan, adding and excluding 52
W
wildcards, using in scan items 52 Windows Explorer, risk assignment and 32 File Protection, exclusions 52 Task Manager, assigning risk 31
64