McAfee AVDCDE-AA-AA User Guide - Page 288
Current list of vulnerable file name extensions
View all McAfee AVDCDE-AA-AA manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 288 highlights
Default Vulnerable and Compressed File Extensions • Select one of the extensions shown, then click Remove to delete it from the list. • Click Default to restore the original extension entries. This removes any extensions you have added to the list. 4. When you have finished changing the list, click OK to save your changes and close the dialog box. Click Cancel to close the dialog box without saving your changes. Current list of vulnerable file name extensions In this list, ? symbols represent wildcards-VirusScan software substitutes any character for the ? so that it scans more than one file type with similar extensions. For example, the software will use the .XL? wildcard to look for viruses in Microsoft Excel spreadsheet (.XLS) and template (.XLT) files. NOTE: McAfee recommends that you scan your system thoroughly during your first scan operation, or periodically thereafter, without limiting the scope of the scan operation to these file types. This ensures that your system starts in a virus-free condition. You can then use this list of extensions to limit the scope of later scan operations. Table 9-1. Vulnerable file name extensions Extension .??_ .ARC .ARJ .ASP .BAT .CAB .CDR .CLA File Type Any Compressed Macro/script Archive Macro/script Program Compressed Macro Program File Description Files with no extension. Windows compressed files. LH ARC files, older version Robert Jung .ARJ compressed archive files. Microsoft Active Server Pages files. These files contain script commands for use with Microsoft Internet Information Server. DOS batch files. Windows Compressed Application Binary or "cabinet" files. Corel Draw document file. Later versions of Corel Draw include a scripting language that can generate macro viruses. Java class files (truncated from .CLASS) 288 McAfee VirusScan Anti-Virus Software