User Guide
Page 2
... Hunter, ISDN Tel/Scope, LM 1, LANGuru, Leading Help Desk Technology, Magic Solutions, MagicSpy, MagicTree, Magic University, MagicWin, MagicWord, McAfee, McAfee Associates, MoneyMagic, More Power To You, Multimedia Cloaking, NetCrypto, NetOctopus, NetRoom, NetScan, Net Shield, NetShield, NetStalker, Net Tools, ... TIS, TMach, TMeg, Total Network Security, Total Network Visibility, Total Service Desk, Total Virus Defense, T-POD, Trusted Mach, Trusted Mail, Uninstaller, Virex, Virex-PC, Virus Forum, ViruScan, VirusScan, VShield, WebScan, WebShield, WebSniffer, WebStalker WebWall, and ZAC 2000 are...
... Hunter, ISDN Tel/Scope, LM 1, LANGuru, Leading Help Desk Technology, Magic Solutions, MagicSpy, MagicTree, Magic University, MagicWin, MagicWord, McAfee, McAfee Associates, MoneyMagic, More Power To You, Multimedia Cloaking, NetCrypto, NetOctopus, NetRoom, NetScan, Net Shield, NetShield, NetStalker, Net Tools, ... TIS, TMach, TMeg, Total Network Security, Total Network Visibility, Total Service Desk, Total Virus Defense, T-POD, Trusted Mach, Trusted Mail, Uninstaller, Virex, Virex-PC, Virus Forum, ViruScan, VirusScan, VShield, WebScan, WebShield, WebSniffer, WebStalker WebWall, and ZAC 2000 are...
User Guide
Page 3
... you begin 37 System requirements 37 Other recommendations 37 Preparing to contact McAfee and Network Associates xviii Customer service xviii Technical support xix Download support xx Network Associates training xx Comments and feedback xx Reporting new items for anti-virus data file updates xxi International contact information xxii Chapter 1. Table of Contents...
... you begin 37 System requirements 37 Other recommendations 37 Preparing to contact McAfee and Network Associates xviii Customer service xviii Technical support xix Download support xx Network Associates training xx Comments and feedback xx Reporting new items for anti-virus data file updates xxi International contact information xxii Chapter 1. Table of Contents...
User Guide
Page 4
...VShield Scanner 87 What does the VShield scanner do 193 Why schedule scan operations 193 Starting the VirusScan Console 194 iv McAfee VirusScan Anti-Virus Software Creating and Configuring Scheduled Tasks 193 What does VirusScan Console do 87 Why use the VirusScan application 164 Starting ... From Your System 61 If you suspect you have a virus 61 Deciding when to scan for viruses 64 Recognizing when you don't have a virus 65 Understanding false detections 66 Responding to viruses or malicious software 67 Submitting a virus sample 78 Using the SendVirus utility to submit a file ...
...VShield Scanner 87 What does the VShield scanner do 193 Why schedule scan operations 193 Starting the VirusScan Console 194 iv McAfee VirusScan Anti-Virus Software Creating and Configuring Scheduled Tasks 193 What does VirusScan Console do 87 Why use the VirusScan application 164 Starting ... From Your System 61 If you suspect you have a virus 61 Deciding when to scan for viruses 64 Recognizing when you don't have a virus 65 Understanding false detections 66 Responding to viruses or malicious software 67 Submitting a virus sample 78 Using the SendVirus utility to submit a file ...
User Guide
Page 5
Table of Contents Using the Console window 196 Working with default tasks 198 Working with the VShield task 200 Working with the AutoUpgrade and AutoUpdate tasks 201 Creating new tasks 202 Enabling tasks 206 Checking task status 208 Configuring VirusScan application options 210 Chapter 7. Using Specialized Scanning Tools 255 Scanning Microsoft Exchange and Outlook mail 255 When and why you should use the E-Mail Scan extension 255 Using the E-Mail Scan extension 256 Configuring the E-Mail Scan extension 257 Scanning cc:Mail 271 Using the ScreenScan utility 271 Chapter 9. Using ...
Table of Contents Using the Console window 196 Working with default tasks 198 Working with the VShield task 200 Working with the AutoUpgrade and AutoUpdate tasks 201 Creating new tasks 202 Enabling tasks 206 Checking task status 208 Configuring VirusScan application options 210 Chapter 7. Using Specialized Scanning Tools 255 Scanning Microsoft Exchange and Outlook mail 255 When and why you should use the E-Mail Scan extension 255 Using the E-Mail Scan extension 256 Configuring the E-Mail Scan extension 257 Scanning cc:Mail 271 Using the ScreenScan utility 271 Chapter 9. Using ...
User Guide
Page 6
Network Associates Support Services 297 Adding value to your McAfee product 297 PrimeSupport options for corporate customers 297 Ordering a corporate PrimeSupport plan 300 PrimeSupport options for home users 302 How to Get New ...Understanding iDAT Technology 321 Understanding incremental .DAT files 321 How does iDAT updating work 322 What does McAfee post each week 323 Best practices 324 Frequently asked questions 325 Index 327 vi McAfee VirusScan Anti-Virus Software Table of compressed files scanned 294 Appendix B. Default Vulnerable and Compressed File Extensions . . 289...
Network Associates Support Services 297 Adding value to your McAfee product 297 PrimeSupport options for corporate customers 297 Ordering a corporate PrimeSupport plan 300 PrimeSupport options for home users 302 How to Get New ...Understanding iDAT Technology 321 Understanding incremental .DAT files 321 How does iDAT updating work 322 What does McAfee post each week 323 Best practices 324 Frequently asked questions 325 Index 327 vi McAfee VirusScan Anti-Virus Software Table of compressed files scanned 294 Appendix B. Default Vulnerable and Compressed File Extensions . . 289...
User Guide
Page 7
... your monitor, or found yourself having to your dealings with more productive activities. Why worry? In many cases, viruses with the most attacks do real damage to apologize for other computers. Some viruses contain bugs, poorly written code, or other aspects of programs that could...software or disk sectors on your hard disk, watched in common: they run. Other times, legitimate software has problems running when a virus has, intentionally or otherwise, altered system parameters or other problems severe enough to cause crashes when they "reproduce" themselves automatically by ...
... your monitor, or found yourself having to your dealings with more productive activities. Why worry? In many cases, viruses with the most attacks do real damage to apologize for other computers. Some viruses contain bugs, poorly written code, or other aspects of programs that could...software or disk sectors on your hard disk, watched in common: they run. Other times, legitimate software has problems running when a virus has, intentionally or otherwise, altered system parameters or other problems severe enough to cause crashes when they "reproduce" themselves automatically by ...
User Guide
Page 8
... educator Robert M. A strong academic tradition of computer prank playing most likely contributed to the shift away from a virus attack or hears about new forms of malicious software appearing in printouts from ? viii McAfee VirusScan Anti-Virus Software Why did this point. Preface The threat from ? The term survives to this day to this...
... educator Robert M. A strong academic tradition of computer prank playing most likely contributed to the shift away from a virus attack or hears about new forms of malicious software appearing in printouts from ? viii McAfee VirusScan Anti-Virus Software Why did this point. Preface The threat from ? The term survives to this day to this...
User Guide
Page 9
...mainframe systems dominated the computing world from floppy disks. The payload is not coincidental. It's the virus characteristic that draws the most attention-many virus authors now write their viruses specifically to deliver their payloads to computer users today. User's Guide ix Preface Some of these... students soon discovered that they could substitute their own program for the executable code present on other unpleasant consequences. Viruses and the PC revolution What we now think of the host computer's operating system to give them unauthorized access to protect ...
...mainframe systems dominated the computing world from floppy disks. The payload is not coincidental. It's the virus characteristic that draws the most attention-many virus authors now write their viruses specifically to deliver their payloads to computer users today. User's Guide ix Preface Some of these... students soon discovered that they could substitute their own program for the executable code present on other unpleasant consequences. Viruses and the PC revolution What we now think of the host computer's operating system to give them unauthorized access to protect ...
User Guide
Page 10
... found out how to use to boot your computer and remove infections. This limited its own responses. Once it activates, the virus "hooks" or "traps" requests that legitimate software makes to the operating system and substitutes its spread to floppy disks that contained, usually,...COM, which it spread to other removable media, riding concealed in relatively predictable places. Some of the most serious virus threat to computer users. Many McAfee anti-virus products anticipate this possibility by means of floppy disks or other uninfected COMMAND.COM files each of your hard disk ...
... found out how to use to boot your computer and remove infections. This limited its own responses. Once it activates, the virus "hooks" or "traps" requests that legitimate software makes to the operating system and substitutes its spread to floppy disks that contained, usually,...COM, which it spread to other removable media, riding concealed in relatively predictable places. Some of the most serious virus threat to computer users. Many McAfee anti-virus products anticipate this possibility by means of floppy disks or other uninfected COMMAND.COM files each of your hard disk ...
User Guide
Page 11
... undetectable variety of a "do not disturb" sequence itself away immediately, it infected, to leave certain files alone. Preface Particularly clever viruses can even subvert attempts to use as a key for decryption. Others encrypted themselves and, as a result, their code signatures with the... software equivalent of new forms. Finding these "polymorphic" viruses required software engineers to locate and remove the offending code. Sometimes the only outward indication that anything on your system is amiss-...
... undetectable variety of a "do not disturb" sequence itself away immediately, it infected, to leave certain files alone. Preface Particularly clever viruses can even subvert attempts to use as a key for decryption. Others encrypted themselves and, as a result, their code signatures with the... software equivalent of new forms. Finding these "polymorphic" viruses required software engineers to locate and remove the offending code. Sometimes the only outward indication that anything on your system is amiss-...
User Guide
Page 12
... spread very quickly and very widely. Other vendors quickly followed suit with Word and Excel. Once a repository of a standstill. Within a year, macro viruses became the most versatile and adaptable medium ever invented for communication and commerce. xii McAfee VirusScan Anti-Virus Software But most virus researchers thought of data files-the text, spreadsheet, or drawing...
... spread very quickly and very widely. Other vendors quickly followed suit with Word and Excel. Once a repository of a standstill. Within a year, macro viruses became the most versatile and adaptable medium ever invented for communication and commerce. xii McAfee VirusScan Anti-Virus Software But most virus researchers thought of data files-the text, spreadsheet, or drawing...
User Guide
Page 13
... in a variety of invention have resulted from existing sources and fashion into them, determined programmers can use for them access to vulnerable computer systems. Unlike viruses, harmful Java and ActiveX objects usually don't seek to power the web. Both Java and ActiveX make extensive use for their small size and innocuous...
... in a variety of invention have resulted from existing sources and fashion into them, determined programmers can use for them access to vulnerable computer systems. Unlike viruses, harmful Java and ActiveX objects usually don't seek to power the web. Both Java and ActiveX make extensive use for their small size and innocuous...
User Guide
Page 14
...to prevent malicious actions, but older versions of the Hyper Text Markup Language (HTML) standard. xiv McAfee VirusScan Anti-Virus Software Even more powerful agents have reported encountering viruses constructed from websites you visit. JavaScript, a scripting language with its implementation of version 3.2 of the... your name, or that where a way exists to open the e-mail message-simply viewing it -including Microsoft VBScript and Active Server Pages, Allaire Cold Fusion, and others. These technologies now allow software designers to deliver their equivalent of other scripting ...
...to prevent malicious actions, but older versions of the Hyper Text Markup Language (HTML) standard. xiv McAfee VirusScan Anti-Virus Software Even more powerful agents have reported encountering viruses constructed from websites you visit. JavaScript, a scripting language with its implementation of version 3.2 of the... your name, or that where a way exists to open the e-mail message-simply viewing it -including Microsoft VBScript and Active Server Pages, Allaire Cold Fusion, and others. These technologies now allow software designers to deliver their equivalent of other scripting ...
User Guide
Page 15
... learn about the origin, behavior and other powerful software in the Active Virus Defense* (AVD) and Total Virus Defense (TVD) suites, the most experienced anti-virus research staff in its own risks. User's Guide xv McAfee has, however, assembled the world's largest and most comprehensive anti-virus solutions available. This means that also help to guard your favorite shareware...
... learn about the origin, behavior and other powerful software in the Active Virus Defense* (AVD) and Total Virus Defense (TVD) suites, the most experienced anti-virus research staff in its own risks. User's Guide xv McAfee has, however, assembled the world's largest and most comprehensive anti-virus solutions available. This means that also help to guard your favorite shareware...
User Guide
Page 16
...III fax) E-Mail: [email protected] Web: http://www.nai.com xvi McAfee VirusScan Anti-Virus Software to contact McAfee and Network Associates Customer service On December 1, 1997, McAfee Associates merged with a particular product line. The combined Company subsequently acquired Dr ...CyberCop Scanner and Monitor product series. • Sniffer Technologies. This division provides the Active Virus Defense product suite and related anti-virus software solutions to the Network Associates Customer Service department at the following address: Network Associates Customer ...
...III fax) E-Mail: [email protected] Web: http://www.nai.com xvi McAfee VirusScan Anti-Virus Software to contact McAfee and Network Associates Customer service On December 1, 1997, McAfee Associates merged with a particular product line. The combined Company subsequently acquired Dr ...CyberCop Scanner and Monitor product series. • Sniffer Technologies. This division provides the Active Virus Defense product suite and related anti-virus software solutions to the Network Associates Customer Service department at the following address: Network Associates Customer ...
User Guide
Page 17
...McAfee and Network Associates software, and for access to McAfee... customers. User's Guide xvii World Wide Web http://www.nai.com/asp_set/services/technical_support /tech_intro.asp If you need or do not have web access, try one of the following numbers Monday through Friday between 8:00 A.M. Internet CompuServe America Online techsupport@mcafee....com GO NAI keyword MCAFEE If the ...com Web: http://www.mcafee.com/ Technical support McAfee and Network Associates are ...McAfee encourages you need , contact Network Associates at one of the...
...McAfee and Network Associates software, and for access to McAfee... customers. User's Guide xvii World Wide Web http://www.nai.com/asp_set/services/technical_support /tech_intro.asp If you need or do not have web access, try one of the following numbers Monday through Friday between 8:00 A.M. Internet CompuServe America Online techsupport@mcafee....com GO NAI keyword MCAFEE If the ...com Web: http://www.mcafee.com/ Technical support McAfee and Network Associates are ...McAfee encourages you need , contact Network Associates at one of the...
User Guide
Page 18
... use any information you need quickly and efficiently, the Network Associates technical support staff needs some information about McAfee anti-virus product documentation to: McAfee, 20460 NW Von Neumann, Beaverton, OR 97006-6942, U.S.A. xviii McAfee VirusScan Anti-Virus Software Please address your comments about your computer and your AUTOEXEC.BAT, CONFIG.SYS, and system LOGIN...
... use any information you need quickly and efficiently, the Network Associates technical support staff needs some information about McAfee anti-virus product documentation to: McAfee, 20460 NW Von Neumann, Beaverton, OR 97006-6942, U.S.A. xviii McAfee VirusScan Anti-Virus Software Please address your comments about your computer and your AUTOEXEC.BAT, CONFIG.SYS, and system LOGIN...
User Guide
Page 19
... please tell them about any new Java classes, ActiveX controls, dangerous websites, or viruses that your system and escape detection. Preface Reporting new items for anti-virus data file updates McAfee anti-virus software offers you supply as they emerge. Occasionally, however, an entirely new type of...America and South America offices Use this address to send questions or virus samples gathered with Dr Solomon's Anti-Virus Toolkit* software to our offices in the United Kingdom To report items to the McAfee European research office, use these e-mail addresses: [email protected]...
... please tell them about any new Java classes, ActiveX controls, dangerous websites, or viruses that your system and escape detection. Preface Reporting new items for anti-virus data file updates McAfee anti-virus software offers you supply as they emerge. Occasionally, however, an entirely new type of...America and South America offices Use this address to send questions or virus samples gathered with Dr Solomon's Anti-Virus Toolkit* software to our offices in the United Kingdom To report items to the McAfee European research office, use these e-mail addresses: [email protected]...
User Guide
Page 23
...improvements mean that each new subterfuge that has emerged in large-scale denial-of-service attacks from the staggering range of viruses and other McAfee anti-virus tools. on your own work. VirusScan software first honed its technological edge as one of the first Internet-aware anti...To learn more about these features, see "What's new in this release?" They do so also because they recognize how much value McAfee anti-virus research and development brings to their computers from across the Internet. Full support for better application response and fewer demands on page 31....
...improvements mean that each new subterfuge that has emerged in large-scale denial-of-service attacks from the staggering range of viruses and other McAfee anti-virus tools. on your own work. VirusScan software first honed its technological edge as one of the first Internet-aware anti...To learn more about these features, see "What's new in this release?" They do so also because they recognize how much value McAfee anti-virus research and development brings to their computers from across the Internet. Full support for better application response and fewer demands on page 31....
User Guide
Page 24
... your computer could play unwitting host to a virus that could spread to protect yourself from losing time, money and data unnecessarily. 24 McAfee VirusScan Anti-Virus Software Because more venerable virus threats and against viruses might lock down a few common sense security ...Windows NT Workstation v4.0, and Windows 2000 Professional, all . VirusScan software acts as the cornerstone product in the McAfee Active Virus Defense and Total Virus Defense security suites, VirusScan software retains the same core features that have made it takes to put a few critical settings, for...
... your computer could play unwitting host to a virus that could spread to protect yourself from losing time, money and data unnecessarily. 24 McAfee VirusScan Anti-Virus Software Because more venerable virus threats and against viruses might lock down a few common sense security ...Windows NT Workstation v4.0, and Windows 2000 Professional, all . VirusScan software acts as the cornerstone product in the McAfee Active Virus Defense and Total Virus Defense security suites, VirusScan software retains the same core features that have made it takes to put a few critical settings, for...