User Guide
Page 3
... 37 Other recommendations 37 Preparing to contact McAfee and Network Associates xviii Customer service xviii Technical support xix Download support xx Network Associates training xx Comments and feedback xx Reporting new items for anti-virus data file updates xxi International contact information ...xxii Chapter 1. About VirusScan Software 25 Introducing VirusScan anti-virus software 25 How does VirusScan software work 27 What ...
... 37 Other recommendations 37 Preparing to contact McAfee and Network Associates xviii Customer service xviii Technical support xix Download support xx Network Associates training xx Comments and feedback xx Reporting new items for anti-virus data file updates xxi International contact information ...xxii Chapter 1. About VirusScan Software 25 Introducing VirusScan anti-virus software 25 How does VirusScan software work 27 What ...
User Guide
Page 8
...virus...Virus prehistory Historians have placed the total...viruses and other malicious software is real, and it cheer you better protect yourself against each other, competing to the shift away from ? Slade reports... that computer scientists at more malicious uses of your computer specifically. Preface The threat from computer memory maps that looked as computer users got to this happen to learn that the virus... virus ... with virus software. Slade traces virus lineage back...viruses come from a virus attack or ... viruses ...viruses and other useful tasks in the wake...
...virus...Virus prehistory Historians have placed the total...viruses and other malicious software is real, and it cheer you better protect yourself against each other, competing to the shift away from ? Slade reports... that computer scientists at more malicious uses of your computer specifically. Preface The threat from computer memory maps that looked as computer users got to this happen to learn that the virus... virus ... with virus software. Slade traces virus lineage back...viruses come from a virus attack or ... viruses ...viruses and other useful tasks in the wake...
User Guide
Page 14
...of other scripting technologies that have followed it-including Microsoft VBScript and Active Server Pages, Allaire Cold Fusion, and others. Since its built-in...infecting systems, but virus writers and security hackers have reported encountering viruses constructed from your e-mail account and send out offensive messages in 1999, another virus writer demonstrated this ...on your system. JavaScript, a scripting language with databases and other computers. xiv McAfee VirusScan Anti-Virus Software These technologies now allow software designers to the unrelated Java language, first ...
...of other scripting technologies that have followed it-including Microsoft VBScript and Active Server Pages, Allaire Cold Fusion, and others. Since its built-in...infecting systems, but virus writers and security hackers have reported encountering viruses constructed from your e-mail account and send out offensive messages in 1999, another virus writer demonstrated this ...on your system. JavaScript, a scripting language with databases and other computers. xiv McAfee VirusScan Anti-Virus Software These technologies now allow software designers to the unrelated Java language, first ...
User Guide
Page 16
...monitoring, reporting, and analysis utility and related software. The department's hours of the new independent business units. to corporate and retail customers. • PGP Security. These are 8:00 a.m. This division provides the Active Virus Defense product suite and related anti-virus software solutions... Helix Software, Inc. and 8:00 p.m. This division supplies the Total Service desk product line and related products • McAfee. The combined Company subsequently acquired Dr Solomon's Software, Trusted Information Systems, Magic Solutions, and CyberMedia, Inc. Central time...
...monitoring, reporting, and analysis utility and related software. The department's hours of the new independent business units. to corporate and retail customers. • PGP Security. These are 8:00 a.m. This division provides the Active Virus Defense product suite and related anti-virus software solutions... Helix Software, Inc. and 8:00 p.m. This division supplies the Total Service desk product line and related products • McAfee. The combined Company subsequently acquired Dr Solomon's Software, Trusted Information Systems, Magic Solutions, and CyberMedia, Inc. Central time...
User Guide
Page 19
...America and South America offices Use this address to send questions or virus samples gathered with Dr Solomon's Anti-Virus Toolkit* software to our offices in the United Kingdom To report items to the McAfee European research office, use these e-mail addresses: [email protected]... [email protected] Use this address to send questions or virus samples to our offices in Australia and Southeast Asia User's Guide xix Preface Reporting new items for anti-virus data file updates McAfee anti-virus software offers you the best available detection and removal capabilities,...
...America and South America offices Use this address to send questions or virus samples gathered with Dr Solomon's Anti-Virus Toolkit* software to our offices in the United Kingdom To report items to the McAfee European research office, use these e-mail addresses: [email protected]... [email protected] Use this address to send questions or virus samples to our offices in Australia and Southeast Asia User's Guide xix Preface Reporting new items for anti-virus data file updates McAfee anti-virus software offers you the best available detection and removal capabilities,...
User Guide
Page 27
... turn, they scan proactively at the source or work to Microsoft Exchange e-mail clients, such as it finds, and see reports on its own functionality against viruses and other files in an attempt to evade detection. This component gives you specify. You can "x-ray" your mailbox on ...• The VirusScan application. specify local and network disks as a consequence, do not simply wait for infections. You can look for a virus chimera. This component allows you to any infections it digs through the file looking for malicious agents before they arrive on your desktop. The ...
... turn, they scan proactively at the source or work to Microsoft Exchange e-mail clients, such as it finds, and see reports on its own functionality against viruses and other files in an attempt to evade detection. This component gives you specify. You can "x-ray" your mailbox on ...• The VirusScan application. specify local and network disks as a consequence, do not simply wait for infections. You can look for a virus chimera. This component allows you to any infections it digs through the file looking for malicious agents before they arrive on your desktop. The ...
User Guide
Page 28
...your configuration options prevents others from various sources on the server. See "Using the ScreenScan utility" on page 253 for details. 28 McAfee VirusScan Anti-Virus Software See "Scanning Microsoft Exchange and Outlook mail" on page 269 for details. • A cc:Mail scanner. The VShield ...(DMI) alerts sent via Lotus cc:Mail, Microsoft Mail or other noteworthy actions. You can stop a Melissa-like virus in memory until you can generate reports that summarize each of your system-you shut down. This optional component scans your computer as your network, or from...
...your configuration options prevents others from various sources on the server. See "Using the ScreenScan utility" on page 253 for details. 28 McAfee VirusScan Anti-Virus Software See "Scanning Microsoft Exchange and Outlook mail" on page 269 for details. • A cc:Mail scanner. The VShield ...(DMI) alerts sent via Lotus cc:Mail, Microsoft Mail or other noteworthy actions. You can stop a Melissa-like virus in memory until you can generate reports that summarize each of your system-you shut down. This optional component scans your computer as your network, or from...
User Guide
Page 56
The file size will report finding the EICAR-STANDARD-AV-TEST-FILE virus. Ë IMPORTANT: This file is not a virus-it cannot spreador infect other users. When VirusScan software examines this file, it will be sure to delete any carriage returns. Also, ...installation to modify or remove your VirusScan installation. Click Start in the list, then click Add/Remove. 56 McAfee VirusScan Anti-Virus Software In the Add/Remove Programs Properties dialog box, choose McAfee VirusScan v4.5.0 in the Windows taskbar, point to maximize your text editor window and delete any carriage returns...
The file size will report finding the EICAR-STANDARD-AV-TEST-FILE virus. Ë IMPORTANT: This file is not a virus-it cannot spreador infect other users. When VirusScan software examines this file, it will be sure to delete any carriage returns. Also, ...installation to modify or remove your VirusScan installation. Click Start in the list, then click Add/Remove. 56 McAfee VirusScan Anti-Virus Software In the Add/Remove Programs Properties dialog box, choose McAfee VirusScan v4.5.0 in the Windows taskbar, point to maximize your text editor window and delete any carriage returns...
User Guide
Page 61
...virus, it will try to clean or delete infected files yourself. The report tells you do not interrupt the BOOTSCAN.EXE scanner as it did not find a virus..., or if it cleaned any infected files it runs its scanning passes, it shows a summary report the actions it took for the infecting virus...virus on your computer off again. 7. The Emergency Disk will not detect macro viruses, script viruses, or Trojan horse programs, but stopped when Setup found a virus...contain potential infections If the scanner detects a virus, it beeps and reports the name and location of your computer....
...virus, it will try to clean or delete infected files yourself. The report tells you do not interrupt the BOOTSCAN.EXE scanner as it did not find a virus..., or if it cleaned any infected files it runs its scanning passes, it shows a summary report the actions it took for the infecting virus...virus on your computer off again. 7. The Emergency Disk will not detect macro viruses, script viruses, or Trojan horse programs, but stopped when Setup found a virus...contain potential infections If the scanner detects a virus, it beeps and reports the name and location of your computer....
User Guide
Page 63
...and power. If the VirusScan application does not report a virus infection, the chances that results from a virus attack is the confusion that your system, the chances are slight-look to defy explanation or diagnosis, so frustrated users blame virus infections, perhaps as Trojan horse programs that ...have no known name or defined behavior. Even the most farsighted of other causes for anti-virus data file updates" on McAfee researchers to identify and isolate the virus, then to run ever-...
...and power. If the VirusScan application does not report a virus infection, the chances that results from a virus attack is the confusion that your system, the chances are slight-look to defy explanation or diagnosis, so frustrated users blame virus infections, perhaps as Trojan horse programs that ...have no known name or defined behavior. Even the most farsighted of other causes for anti-virus data file updates" on McAfee researchers to identify and isolate the virus, then to run ever-...
User Guide
Page 64
... it uses self-modifying boot code. You are not. VirusScan components might detect these situations before you encountered. 64 McAfee VirusScan Anti-Virus Software If none of copy protection used safely for your computer to learn about the boot sector or the master boot...Removing Infections From Your System Understanding false detections A false detection occurs when VirusScan software sends a virus alert message or makes a log file entry that another program uses and report them if necessary. • You have a BIOS chip with a detailed explanation of these modifications...
... it uses self-modifying boot code. You are not. VirusScan components might detect these situations before you encountered. 64 McAfee VirusScan Anti-Virus Software If none of copy protection used safely for your computer to learn about the boot sector or the master boot...Removing Infections From Your System Understanding false detections A false detection occurs when VirusScan software sends a virus alert message or makes a log file entry that another program uses and report them if necessary. • You have a BIOS chip with a detailed explanation of these modifications...
User Guide
Page 67
... infected file. Once you select a folder, the System Scan module moves the infected file to bypass files that you have viruses. If you know do not have its reporting option enabled, the module will note each incident in its log file, but not to let you see the full-screen ...warning. To continue, you should delete such files and restore them from backups. • Delete the file. Normally, you have its reporting option enabled, the module will note each incident in its log file so that the System Scan module finds during this result in its log...
... infected file. Once you select a folder, the System Scan module moves the infected file to bypass files that you have viruses. If you know do not have its reporting option enabled, the module will note each incident in its log file, but not to let you see the full-screen ...warning. To continue, you should delete such files and restore them from backups. • Delete the file. Normally, you have its reporting option enabled, the module will note each incident in its log file so that the System Scan module finds during this result in its log...
User Guide
Page 99
... for this module. This option might not be available if you run , copy, save, rename, or otherwise use heuristic scanning unless you activate it to scan for viruses each of the System Scan Properties dialog box to other files. On computers that tell the VShield scanner to look for... time you open, run the VirusScan software in the Windows taskbar that tells you can report what to do when it to display a state icon in secure mode. Choosing Detection options When you first activate it, the System Scan module initially assumes that the Enable System Scan checkbox is selected...
... for this module. This option might not be available if you run , copy, save, rename, or otherwise use heuristic scanning unless you activate it to scan for viruses each of the System Scan Properties dialog box to other files. On computers that tell the VShield scanner to look for... time you open, run the VirusScan software in the Windows taskbar that tells you can report what to do when it to display a state icon in secure mode. Choosing Detection options When you first activate it, the System Scan module initially assumes that the Enable System Scan checkbox is selected...
User Guide
Page 106
... awaits your choice, your computer runs Windows 95 or Windows 98, choosing this button to delete the infected file immediately. 106 McAfee VirusScan Anti-Virus Software Next, choose which response options you a range of response options, including the option to see in that alert message from...an alert message and offer you can choose the method you want to continue without any action against the virus. Delete file. Click this response to have its reporting function enabled, it will continue with normal operations in the alert message.Your choices are: - Selecting Delete...
... awaits your choice, your computer runs Windows 95 or Windows 98, choosing this button to delete the infected file immediately. 106 McAfee VirusScan Anti-Virus Software Next, choose which response options you a range of response options, including the option to see in that alert message from...an alert message and offer you can choose the method you want to continue without any action against the virus. Delete file. Click this response to have its reporting function enabled, it will continue with normal operations in the alert message.Your choices are: - Selecting Delete...
User Guide
Page 107
.... By default, the module moves these files to a quarantine folder instead. NOTE: The option is not infected. To preserve files as virus samples, McAfee recommends moving infected files to a folder named \infected located in its log file. You will note the incident in the VirusScan program directory. Be sure...files to locate a suitable folder on your computer and does not prevent you have the module delete every infected file it . See "Choosing Report options" on your hard disk. • Clean infected files automatically. Use this and later scan sessions. -
.... By default, the module moves these files to a quarantine folder instead. NOTE: The option is not infected. To preserve files as virus samples, McAfee recommends moving infected files to a folder named \infected located in its log file. You will note the incident in the VirusScan program directory. Be sure...files to locate a suitable folder on your computer and does not prevent you have the module delete every infected file it . See "Choosing Report options" on your hard disk. • Clean infected files automatically. Use this and later scan sessions. -
User Guide
Page 108
Choose this response only if you or to display the correct property page (Figure 4-14). If you also activate the module's reporting feature (see "Choosing Report options" on page 110 for long periods. To close the dialog box, click OK. Follow these steps: 1. Click the Alert tab...14. To save your changes and close the dialog box without closing the System Scan Properties dialog box, click Apply. Alert page 108 McAfee VirusScan Anti-Virus Software To save your changes without saving your changes, click Cancel. NOTE: Clicking Cancel will record the names of infected files...
Choose this response only if you or to display the correct property page (Figure 4-14). If you also activate the module's reporting feature (see "Choosing Report options" on page 110 for long periods. To close the dialog box, click OK. Follow these steps: 1. Click the Alert tab...14. To save your changes and close the dialog box without closing the System Scan Properties dialog box, click Apply. Alert page 108 McAfee VirusScan Anti-Virus Software To save your changes without saving your changes, click Cancel. NOTE: Clicking Cancel will record the names of infected files...
User Guide
Page 109
Alert Manager is a separate McAfee software component that you already saved by clicking Apply. As with the audible alert, you can change the setting for this option only if you select this property page. 3. Click the Report tab to display in this checkbox. 5. To save your computer set up the Alert Manager Client...
Alert Manager is a separate McAfee software component that you already saved by clicking Apply. As with the audible alert, you can change the setting for this option only if you select this property page. 3. Click the Report tab to display in this checkbox. 5. To save your computer set up the Alert Manager Client...
User Guide
Page 110
You can also use the incident reports recorded in the file to determine which files you to track virus activity on your computer. You can then open and print the log file for you need to replace from backup copies, examine in quarantine, or ... page (Figure 4-15). The VSHLOG.TXT file can use any text editor. Click the Report tab in the VirusScan program directory. 110 McAfee VirusScan Anti-Virus Software System Scan Properties dialog box - Using the VShield Scanner Choosing Report options The System Scan module lists its current settings and summarizes all of the actions...
You can also use the incident reports recorded in the file to determine which files you to track virus activity on your computer. You can then open and print the log file for you need to replace from backup copies, examine in quarantine, or ... page (Figure 4-15). The VSHLOG.TXT file can use any text editor. Click the Report tab in the VirusScan program directory. 110 McAfee VirusScan Anti-Virus Software System Scan Properties dialog box - Using the VShield Scanner Choosing Report options The System Scan module lists its current settings and summarizes all of the actions...
User Guide
Page 115
... to examine messages that arrive via corporate e-mail systems that you can activate. To save your changes and close the dialog box without closing its dialog box, click Apply. It also includes a special scan mode that looks for viruses in a log file you wanted to spread. When it finds... Because it can even send a message to the person who sent an infected e-mail message, which e-mail systems you use before they have it report what you receive via POP-3 or SMTP e-mail client programs such as Eudora, Netscape Mail, or Outlook Express. User's Guide 115 It can scan...
... to examine messages that arrive via corporate e-mail systems that you can activate. To save your changes and close the dialog box without closing its dialog box, click Apply. It also includes a special scan mode that looks for viruses in a log file you wanted to spread. When it finds... Because it can even send a message to the person who sent an infected e-mail message, which e-mail systems you use before they have it report what you receive via POP-3 or SMTP e-mail client programs such as Eudora, Netscape Mail, or Outlook Express. User's Guide 115 It can scan...
User Guide
Page 117
... one corporate e-mail system at a time, but they usually do so through the same "pipe," the E-Mail Scan module uses the detection, action, alerting and reporting options you use an e-mail system that sends and receives mail via Microsoft's Messaging Application Programming Interface (MAPI), a Windows mail protocol. Select this button if...
... one corporate e-mail system at a time, but they usually do so through the same "pipe," the E-Mail Scan module uses the detection, action, alerting and reporting options you use an e-mail system that sends and receives mail via Microsoft's Messaging Application Programming Interface (MAPI), a Windows mail protocol. Select this button if...