What it is and does
VirusScan Enterprise offers easily scalable protection, fast performance, and a
mobile design to protect your environment from the following:
- viruses, worms and Trojan
horses
- access point violations
and exploited buffer overflows
- potentially unwanted code
and programs
It detects threats and then takes the actions you configured to
protect your environment.
This guide describes how to configure and use
VirusScan Enterprise.
You can configure
VirusScan Enterprise as a standalone product or you can use
ePolicy Orchestrator versions
4.0,
or later, to centrally manage and enforce
VirusScan Enterprise policies, then use queries and dashboards to track
activity and detections.
Note: This document addresses using
ePolicy Orchestrator 4.5 and
4.6.
For information about using other versions of
ePolicy Orchestrator, see that verson's product documentation.
Major components
As an administrator, and user of
VirusScan Enterprise,
you should be familiar with its components and connections. The following
figure shows these components for a basic environment.
Figure 1. VirusScan Enterprise
components
Note: The dashed lines in the previous figure indicate optional
components and connections.
The major components shown in the previous figure include:
- Client system —
This is where
VirusScan Enterprise
and optional
McAfee Agent
are installed and configured.
- McAfee
Headquarters — Provides the following
VirusScan Enterprise
services:
- DAT updates — Stored
on a
McAfee
central database server, and using AutoUpdate, these DAT update files are
copied to the
VirusScan Enterprise
clients or the optional DAT repositories to provide new lists of known viruses
as they are found in real time.
- Scan engine updates —
Stored on a central database server, scan engine updates are downloaded as
needed to keep the
VirusScan Enterprise
scan engine as up to date as possible.
- McAfee Labs — This threat library has detailed information on
virus, Trojan, hoax, and Potentially Unwanted Program (PUP) threats. it also
includes where they come from, how they infect your system, and how to mitigate
or handle them. The client system Artemis feature sends the fingerprint of the
suspicious file to
McAfee Labs where they analyze the file and determine what action
to take.
- Server (optional) —
Uses the following components to remotely manage and update many
client systems: