Symantec 10551441 Administration Guide - Page 104

File cache options, How to trace threats, Heuristic scanning

Page 104 highlights

104 Scanning for viruses and other threats Configuring Auto-Protect scans Note: This option is available for Windows NT/2000/XP/2003 only. File cache options File caching decreases Auto-Protect's memory usage and can help you to track problems. The file cache includes an index of files that were scanned and determined to be clean. Symantec AntiVirus adds a 16-byte ID to the cache index, which remains until Symantec AntiVirus detects a change to the file. How to trace threats You can use Threat Tracer to identify the source of network share-based virus infections on computers that are running Windows NT/2000/XP/2003 operating systems. When Auto-Protect detects an infection, it sends information to RtvScan, the main Symantec AntiVirus service. RtvScan determines if the infection originated locally or remotely. If the infection came from a remote computer, RtvScan can look up and record the computer's NetBIOS computer name and its IP address, and then display this information in the Threat Properties dialog box. RtvScan polls every second by default for network sessions, and then caches this information as a remote computer secondary source list. This information maximizes the frequency with which Threat Tracer can successfully identify the infected remote computer. For example, a threat may close the network share before RtvScan can record the network session. Threat Tracer then uses the secondary source list to try to identify the remote computer. When Threat Tracer cannot identify the remote computer, the source is listed as Unknown in the Threat Properties dialog box. When Threat Tracer determines that the infection came from local host activity, it lists the local host. The source is also listed as Unknown in the Threat Properties dialog box when the authenticated user for a file share refers to multiple computers. This can occur when a user ID is associated with multiple network sessions. Heuristic scanning Bloodhound can detect a high percentage of unknown viruses by isolating and locating the logical regions of a file. Bloodhound then analyzes the program logic for virus-like behavior.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216

104
Scanning for viruses and other threats
Configuring Auto-Protect scans
Note:
This option is available for Windows NT/2000/XP/2003 only.
File cache options
File caching decreases Auto-Protect’s memory usage and can help you to track
problems. The file cache includes an index of files that were scanned and
determined to be clean. Symantec AntiVirus adds a 16-byte ID to the cache
index, which remains until Symantec AntiVirus detects a change to the file.
How to trace threats
You can use Threat Tracer to identify the source of network share-based virus
infections on computers that are running Windows NT/2000/XP/2003 operating
systems.
When Auto-Protect detects an infection, it sends information to RtvScan, the
main Symantec AntiVirus service. RtvScan determines if the infection
originated locally or remotely. If the infection came from a remote computer,
RtvScan can look up and record the computer’s NetBIOS computer name and its
IP address, and then display this information in the Threat Properties dialog
box.
RtvScan polls every second by default for network sessions, and then caches this
information as a remote computer secondary source list. This information
maximizes the frequency with which Threat Tracer can successfully identify the
infected remote computer. For example, a threat may close the network share
before RtvScan can record the network session. Threat Tracer then uses the
secondary source list to try to identify the remote computer.
When Threat Tracer cannot identify the remote computer, the source is listed as
Unknown in the Threat Properties dialog box.
When Threat Tracer determines that the infection came from local host activity,
it lists the local host.
The source is also listed as Unknown in the Threat Properties dialog box when
the authenticated user for a file share refers to multiple computers. This can
occur when a user ID is associated with multiple network sessions.
Heuristic scanning
Bloodhound can detect a high percentage of unknown viruses by isolating and
locating the logical regions of a file. Bloodhound then analyzes the program
logic for virus-like behavior.