McAfee GSSCDE-AA-DA User Guide - Page 9

How does scanning work?, Other areas to protect

Page 9 highlights

McAfee® GroupShield™ 7.0 User Guide 1 Introduction About GroupShield for Exchange „ protect the email server from harmful scripts sent within the email system. „ block messages with specific attachments. „ block messages based on words that appear either within the subject line/body of the message. „ block messages from specific addresses. How does scanning work? Central to your GroupShield software is the McAfee® Security scanning engine and the virus definition (DAT) files. The engine is a complex data analyzer. The DAT files contain a great deal of information including thousands of different drivers, each of which contains detailed instructions on how to identify a virus or a type of virus. The McAfee® Security scanning engine works with the DAT files. It identifies the type of the item being scanned and decodes the contents of that object, so that it understands what the item is. It then uses the information in the DAT files to search and locate known viruses. Many viruses have a distinctive signature. There is a sequence of characters unique to a virus and the engine searches for that signature. The engine uses a technique called heuristic analysis to search for unknown viruses. This involves analysis of the object's program code and searching for distinctive features typically found in viruses. Once the engine has confirmed the identity of a virus, it cleans the object as far as possible. For example, by removing an infected macro from the attachment in which it is found or by deleting the virus code in an executable file. In some instances, if the virus has destroyed data, the file cannot be fixed and the engine must make the file safe so that it cannot be activated and infect other files. Other areas to protect The following key areas of your network can be protected by McAfee® Security products as a part of your integrated virus defense solution: „ Internet gateway protection - Secure Content Management Appliances The major source of threats to your corporate network comes from Internet traffic, either through email or by connecting to websites that might contain potentially harmful code. Secure Content Management Appliances protects the gateway between your internal networks and the Internet. It prevents infected items from entering your network through the Internet by scanning all inbound and outbound traffic between your network and the Internet. 9

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180

9
McAfee
®
GroupShield
7.0 User Guide
Introduction
About GroupShield for Exchange
1
protect the email server from harmful scripts sent within the email system.
block messages with specific attachments.
block messages based on words that appear either within the subject line/body of
the message.
block messages from specific addresses.
How does scanning work?
Central to your GroupShield software is the McAfee
®
Security scanning engine and the
virus definition (DAT) files. The engine is a complex data analyzer. The DAT files contain
a great deal of information including thousands of different drivers, each of which
contains detailed instructions on how to identify a virus or a type of virus.
The McAfee
®
Security scanning engine works with the DAT files. It identifies the type
of the item being scanned and decodes the contents of that object, so that it
understands what the item is. It then uses the information in the DAT files to search
and locate known viruses. Many viruses have a distinctive signature. There is a
sequence of characters unique to a virus and the engine searches for that signature.
The engine uses a technique called heuristic analysis to search for unknown viruses.
This involves analysis of the object’s program code and searching for distinctive
features typically found in viruses.
Once the engine has confirmed the identity of a virus, it cleans the object as far as
possible. For example, by removing an infected macro from the attachment in which it
is found or by deleting the virus code in an executable file. In some instances, if the
virus has destroyed data, the file cannot be fixed and the engine must make the file
safe so that it cannot be activated and infect other files.
Other areas to protect
The following key areas of your network can be protected by McAfee
®
Security
products as a part of your integrated virus defense solution:
Internet gateway protection — Secure Content Management Appliances
The major source of threats to your corporate network comes from Internet traffic,
either through email or by connecting to websites that might contain potentially
harmful code. Secure Content Management Appliances protects the gateway
between your internal networks and the Internet. It prevents infected items from
entering your network through the Internet by scanning all inbound and outbound
traffic between your network and the Internet.