McAfee AVM85M User Guide - Page 62

Policies, Properties, Tasks, scan, scanning

Page 62 highlights

VirusScan® 8.6 for Mac User Guide Glossary On-Demand scanner The On-Demand scanner allows you to initiate a scan at any time by dragging and dropping selected files into the console or through a file open dialog box. You can scan multiple files, directories, and volumes. On-access scanning A continuous examination of files in use to determine if a virus or other malware is present. It can take place whenever a file is read from the disk, and/or written to the disk. Multiple directories and volumes can be scanned. On-demand scanning A scheduled examination of selected files to determine if a virus or other potentially unwanted code is present. It can take place immediately, at a future scheduled time, or at regularly scheduled intervals. policy The configuration settings of managed products that are defined and managed from ePolicy Orchestrator. policy enforcement interval properties Repository scan task scan, scanning server events silent installation site task The time period during which the agent enforces the settings it has received from the ePolicy Orchestrator server. Because these settings are enforced locally, this interval does not require any bandwidth. Data exchanged during agent-server communication that includes information about each managed computer (for example, hardware and software) and its managed products (for example, specific policy settings and the product version number). The location that stores policy pages used to manage products. A single scan event. An examination of files to determine if a virus or other potentially unwanted code is present. Activity on the ePolicy Orchestrator server that is recorded by the Windows Event Viewer. This information is not stored in the ePolicy Orchestrator database, so is not available for reporting purposes. An installation method that installs a software package onto a computer silently, without need for user intervention. In the console tree, a logical collection of entities assembled for ease of management. Sites can contain groups of computers, and can be organized by IP address range, IP subnet mask, location, department, and others. An activity (both one-time such as On-Demand scanning, and routine such as updating) that is scheduled to occur at a specific time, or at specified intervals. Compare to policy. Trojan horse upper details pane UTC time A program that either pretends to have, or is described as having, a set of useful or desirable features, but actually contains a damaging payload. Trojan horses are not technically viruses, because they do not replicate. In the console, the upper-right pane, which contains the Policies, Properties, and Tasks tabs. Coordinated Universal Time (UTC). This refers to time on the zero or Greenwich meridian. 62

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68

62
VirusScan
®
8.6 for Mac User Guide
Glossary
On-Demand scanner
The On-Demand scanner allows you to initiate a scan at any time by dragging
and dropping selected files into the console or through a file open dialog box.
You can scan multiple files, directories, and volumes.
On-access scanning
A continuous examination of files in use to determine if a virus or other
malware is present. It can take place whenever a file is read from the disk,
and/or written to the disk. Multiple directories and volumes can be scanned.
On-demand scanning
A scheduled examination of selected files to determine if a virus or other
potentially unwanted code is present. It can take place immediately, at a
future scheduled time, or at regularly scheduled intervals.
policy
The configuration settings of managed products that are defined and
managed from ePolicy Orchestrator.
policy enforcement
interval
The time period during which the agent enforces the settings it has received
from the ePolicy Orchestrator server. Because these settings are enforced
locally, this interval does not require any bandwidth.
properties
Data exchanged during agent-server communication that includes
information about each managed computer (for example, hardware and
software) and its managed products (for example, specific policy settings and
the product version number).
Repository
The location that stores policy pages used to manage products.
scan task
A single scan event.
scan, scanning
An examination of files to determine if a virus or other potentially unwanted
code is present.
server events
Activity on the ePolicy Orchestrator server that is recorded by the Windows
Event Viewer. This information is not stored in the ePolicy Orchestrator
database, so is not available for reporting purposes.
silent installation
An installation method that installs a software package onto a computer
silently, without need for user intervention.
site
In the console tree, a logical collection of entities assembled for ease of
management. Sites can contain groups of computers, and can be organized
by IP address range, IP subnet mask, location, department, and others.
task
An activity (both one-time such as
On-Demand scanning
, and routine such as
updating
) that is scheduled to occur at a specific time, or at specified intervals.
Compare to
policy
.
Trojan horse
A program that either pretends to have, or is described as having, a set of
useful or desirable features, but actually contains a damaging payload. Trojan
horses are not technically viruses, because they do not replicate.
upper details pane
In the console, the upper-right pane, which contains the
Policies
,
Properties
, and
Tasks
tabs.
UTC time
Coordinated Universal Time (UTC). This refers to time on the zero or
Greenwich meridian.