McAfee MTP08EMB3RUA Product Guide - Page 79

Managing detections, Viewing scan results on client computers, Approve, Approve All, Block, Block All

Page 79 highlights

Using Virus and Spyware Protection Managing detections 4 3 Locate the program you want to approve in the listing of all programs detected on client computers, then select an option. Select this... Approve Approve All Block Block All To do this... Approve the selected program. Approve all the programs listed. Block the selected program. Block all the programs listed. 4 Click Save. (For a new policy, click Next, select additional options for the policy, then click Save.) Managing detections Use these tasks to view and manage threats detected during virus and spyware scans. • For an individual client computer, perform tasks at the computer (users and administrators). • For multiple computers, groups, or an entire account, access administrative reports from the SecurityCenter. Viewing scan results on client computers Users and administrators can use this task from a client computer to view the Scan Statistics report on a client computer after completing an on-demand scan. Client computers also send information about threats detected during scans to the SecurityCenter in encrypted XML files. Administrators can access three reports containing information about detected virus and spyware threats and potentially unwanted programs from the Reports page on the SecurityCenter. Task • Select View detailed report in the Scan Completed panel. A browser window opens and displays the Scan Statistics report, which includes this information: • Date and time the scan was started. • Elapsed time for the scan. • Version of the scanning engine software and DAT file. • Date of the last update. • Completion status of the scan. • Location of the scanned items. • Status for scanned files, registry keys, and cookies. Status What it means... Scanned Number of items scanned. Detected The item is still a threat and still resides on the system. For files, they are most likely contained within a compressed archive (for example, a .ZIP archive) or on write-protected media. For registry keys and cookies, the file they are associated with has a status of Detected. McAfee Total Protection Service 5.1.5 Product Guide 79

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175

3
Locate the program you want to approve in the listing of all programs detected on client
computers, then select an option.
Select this...
To do this...
Approve
Approve the selected program.
Approve All
Approve all the programs listed.
Block
Block the selected program.
Block All
Block all the programs listed.
4
Click
Save
.
(For a new policy, click
Next
, select additional options for the policy, then click
Save
.)
Managing detections
Use these tasks to view and manage threats detected during virus and spyware scans.
For an individual client computer, perform tasks at the computer (users and administrators).
For multiple computers, groups, or an entire account, access administrative reports from the
SecurityCenter.
Viewing scan results on client computers
Users and administrators can use this task from a client computer to view the Scan Statistics report on
a client computer after completing an on-demand scan.
Client computers also send information about threats detected during
scans to the SecurityCenter in encrypted XML files. Administrators can
access three reports containing information about detected virus and
spyware threats and potentially unwanted programs from the Reports
page on the SecurityCenter.
Task
Select
View detailed report
in the Scan Completed panel. A browser window opens and displays the
Scan Statistics report, which includes this information:
Date and time the scan was started.
Elapsed time for the scan.
Version of the scanning engine software and DAT file.
Date of the last update.
Completion status of the scan.
Location of the scanned items.
Status for scanned files, registry keys, and cookies.
Status
What it means...
Scanned
Number of items scanned.
Detected
The item is still a threat and still resides on the system. For files, they are most likely
contained within a compressed archive (for example, a .ZIP archive) or on
write-protected media. For registry keys and cookies, the file they are associated with
has a status of Detected.
Using Virus and Spyware Protection
Managing detections
4
McAfee Total Protection Service 5.1.5 Product Guide
79