McAfee AVM85M User Guide - Page 62
Policies, Properties, Tasks, scan, scanning
UPC - 731944564609
View all McAfee AVM85M manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 62 highlights
VirusScan® 8.6 for Mac User Guide Glossary On-Demand scanner The On-Demand scanner allows you to initiate a scan at any time by dragging and dropping selected files into the console or through a file open dialog box. You can scan multiple files, directories, and volumes. On-access scanning A continuous examination of files in use to determine if a virus or other malware is present. It can take place whenever a file is read from the disk, and/or written to the disk. Multiple directories and volumes can be scanned. On-demand scanning A scheduled examination of selected files to determine if a virus or other potentially unwanted code is present. It can take place immediately, at a future scheduled time, or at regularly scheduled intervals. policy The configuration settings of managed products that are defined and managed from ePolicy Orchestrator. policy enforcement interval properties Repository scan task scan, scanning server events silent installation site task The time period during which the agent enforces the settings it has received from the ePolicy Orchestrator server. Because these settings are enforced locally, this interval does not require any bandwidth. Data exchanged during agent-server communication that includes information about each managed computer (for example, hardware and software) and its managed products (for example, specific policy settings and the product version number). The location that stores policy pages used to manage products. A single scan event. An examination of files to determine if a virus or other potentially unwanted code is present. Activity on the ePolicy Orchestrator server that is recorded by the Windows Event Viewer. This information is not stored in the ePolicy Orchestrator database, so is not available for reporting purposes. An installation method that installs a software package onto a computer silently, without need for user intervention. In the console tree, a logical collection of entities assembled for ease of management. Sites can contain groups of computers, and can be organized by IP address range, IP subnet mask, location, department, and others. An activity (both one-time such as On-Demand scanning, and routine such as updating) that is scheduled to occur at a specific time, or at specified intervals. Compare to policy. Trojan horse upper details pane UTC time A program that either pretends to have, or is described as having, a set of useful or desirable features, but actually contains a damaging payload. Trojan horses are not technically viruses, because they do not replicate. In the console, the upper-right pane, which contains the Policies, Properties, and Tasks tabs. Coordinated Universal Time (UTC). This refers to time on the zero or Greenwich meridian. 62