McAfee AVDCDE-BA-CA User Guide - Page 330

View Activity Log, WEBEMAIL.TXT, as VShield log

Page 330 highlights

Index Eudora and Eudora Pro files as e-mail clients supported in VShield, 88 choosing as scan targets, 170, 176 to 178, 209 to 211, 258 to 260, 270 to 272 Excel files, as agents for virus transmission, xii Exchange as e-mail client supported in VShield, 88 exclusion options, choosing for System Scan module, 112 to 115 for VirusScan Advanced, 186 to 188 for VirusScan in Console, 220 to 223 infected cleaning, 105 to 108, 122 to 123, 134, 136, 172 to 173, 180 to 182, 214 to 215, 260 to 262 cleaning by yourself when VirusScan cannot, 61 deleting, 105 to 108, 122 to 123, 134, 136, 172 to 173, 180 to 182, 214 to 215, 260 to 262 executable programs as agents for virus transmission, x extensions, use of to identify scan targets, 288 EXTRA.DAT files, location, use, and description of, 229 moving, 105 to 108, 122 to 123, 134, 136, 172 to 173, 180 to 182, 214 to 215, 260 to 262 MAILSCAN.TXT, as E-Mail program component log, 266 SCREENSCAN ACTIVITY LOG.TXT, as ScreenScan log, 275 F false detections, understanding, 64 file information, viewing, 74 to 75 File menu View Activity Log, 184, 220 VSCLOG.TXT, as VirusScan log, 173 to 174, 183 to 184, 217 to 267 VSHLOG.TXT, as VShield log, 110 to 111 WEBEMAIL.TXT, as VShield log, 127 WEBFLTR.TXT, as VShield log, 148 to 149 file name extensions WEBINET.TXT, as VirusScan log, 138 use of to identify vulnerable files, 288 floppy disks File Transfer Protocol (FTP) role in spreading viruses, ix to x use of to obtain VirusScan upgrades, 248 folders file-infecting viruses choosing as scan targets, 170, 176 to 178, definition and behavior of, x 209 to 258, 270 to 272 setting heuristic scanning options for, 103 to 104, 119, 132 to 133, 178 to 180, 211, 258, 272 Force Update, use of to replace corrupted .DAT files, 239 FTP (File Transfer Protocol) use of to obtain VirusScan upgrades, 248 330 McAfee VirusScan Anti-Virus Software

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344

Index
330
McAfee VirusScan Anti-Virus Software
Eudora and Eudora Pro
as e-mail clients supported in
VShield
,
88
Excel files, as agents for virus
transmission
,
xii
Exchange
as e-mail client supported in VShield
,
88
exclusion options, choosing
for System Scan module
,
112
to
115
for VirusScan Advanced
,
186
to
188
for VirusScan in Console
,
220
to
223
executable programs
as agents for virus transmission
,
x
extensions, use of to identify scan
targets
,
288
EXTRA.DAT files, location, use, and
description of
,
229
F
false detections, understanding
,
64
file information, viewing
,
74
to
75
File menu
View Activity Log
,
184
,
220
file name extensions
use of to identify vulnerable files
,
288
File Transfer Protocol (FTP)
use of to obtain VirusScan upgrades
,
248
file-infecting viruses
definition and behavior of
,
x
setting heuristic scanning options
for
,
103
to
104
,
119
,
132
to
133
,
178
to
180
,
211
,
258
,
272
files
choosing as scan targets
,
170
,
176
to
178
,
209
to
211
,
258
to
260
,
270
to
272
infected
cleaning
,
105
to
108
,
122
to
123
,
134
,
136
,
172
to
173
,
180
to
182
,
214
to
215
,
260
to
262
cleaning by yourself when VirusScan
cannot
,
61
deleting
,
105
to
108
,
122
to
123
,
134
,
136
,
172
to
173
,
180
to
182
,
214
to
215
,
260
to
262
moving
,
105
to
108
,
122
to
123
,
134
,
136
,
172
to
173
,
180
to
182
,
214
to
215
,
260
to
262
MAILSCAN.TXT, as E-Mail program
component log
,
266
SCREENSCAN ACTIVITY LOG.TXT, as
ScreenScan log
,
275
VSCLOG.TXT, as VirusScan
log
,
173
to
174
,
183
to
184
,
217
to
267
VSHLOG.TXT, as VShield log
,
110
to
111
WEBEMAIL.TXT, as VShield log
,
127
WEBFLTR.TXT, as VShield
log
,
148
to
149
WEBINET.TXT, as VirusScan log
,
138
floppy disks
role in spreading viruses
,
ix
to
x
folders
choosing as scan targets
,
170
,
176
to
178
,
209
to
258
,
270
to
272
Force Update, use of to replace corrupted
.DAT files
,
239
FTP (File Transfer Protocol)
use of to obtain VirusScan upgrades
,
248