McAfee NAPCKE-AB-AA - VirusScan For NetApp Configuration manual

Type
Configuration manual

This manual is also suitable for

VirusScan
®
for NetApp
®
for use with ePolicy Orchestrator
3.0 Service Pack 1
version 7.1.0
Configuration Guide
Revision 1.0
COPYRIGHT
Copyright © 2003 Networks Associates Technology, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a
retrieval system, or translated into any language in any form or by any means without the written permission of Networks Associates Technology, Inc., or its
suppliers or affiliate companies. To obtain this permission, write to the attention of the Network Associates legal department at: 5000 Headquarters Drive, Plano,
Texas 75024, or call +1-972-963-8000.
TRADEMARK ATTRIBUTIONS
Active Firewall, Active Security, Active Security (in Katakana), ActiveHelp, ActiveShield, AntiVirus Anyware and design, Appera, AVERT, Bomb Shelter, Certified Network
Expert, Clean-Up, CleanUp Wizard, ClickNet, CNX, CNX Certification Certified Network Expert and design, Covert, Design (stylized N), Disk Minder, Distributed Sniffer System,
Distributed Sniffer System (in Katakana), Dr Solomon’s, Dr Solomon’s label, E and Design, Entercept, Enterprise SecureCast, Enterprise SecureCast (in Katakana), ePolicy
Orchestrator, Event Orchestrator (in Katakana), EZ SetUp, First Aid, ForceField, GMT, GroupShield, GroupShield (in Katakana), Guard Dog, HelpDesk, HelpDesk IQ,
HomeGuard, Hunter, Impermia, InfiniStream, Intrusion Prevention Through Innovation, IntruShield, IntruVert Networks, LANGuru, LANGuru (in Katakana), M and design,
Magic Solutions, Magic Solutions (in Katakana), Magic University, MagicSpy, MagicTree, McAfee, McAfee (in Katakana), McAfee and design, McAfee.com, MultiMedia Cloaking,
NA Network Associates, Net Tools, Net Tools (in Katakana), NetAsyst, NetCrypto, NetOctopus, NetScan, NetShield, NetStalker, Network Associates, Network Performance
Orchestrator, NetXray, NotesGuard, nPO, Nuts & Bolts, Oil Change, PC Medic, PCNotary, PortalShield, Powered by SpamAssassin, PrimeSupport, Recoverkey, Recoverkey –
International, Registry Wizard, Remote Desktop, ReportMagic, RingFence, Router PM, Safe & Sound, SalesMagic, SecureCast, SecureSelect, SecurityShield, Service Level
Manager, ServiceMagic, SmartDesk, Sniffer, Sniffer (in Hangul), SpamKiller, SpamAssassin, Stalker, SupportMagic, ThreatScan, TIS, TMEG, Total Network Security, Total
Network Visibility, Total Network Visibility (in Katakana), Total Service Desk, Total Virus Defense, Trusted Mail, UnInstaller, VIDS, Virex, Virus Forum, ViruScan, VirusScan,
WebScan, WebShield, WebShield (in Katakana), WebSniffer, WebStalker, WebWall, What's The State Of Your IDS?, Who’s Watching Your Network, WinGauge, Your E-Business
Defender, ZAC 2000, Zip Manager are registered trademarks or trademarks of Network Associates, Inc. and/or its affiliates in the US and/or other countries. Sniffer
®
brand products are made only by Network Associates, Inc. All other registered and unregistered trademarks herein are the sole property of their respective owners.
LICENSE INFORMATION
License Agreement
NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, WHICH SETS FORTH
THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU HAVE ACQUIRED,
PLEASE CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT ACCOMPANIES YOUR SOFTWARE PACKAGING
OR THAT YOU HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET, A FILE ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEB SITE
FROM WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL
THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO NETWORK ASSOCIATES OR THE PLACE OF PURCHASE FOR A FULL REFUND.
Attributions
This product includes or may include:
Software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/).
Cryptographic software written by Eric A. Young and software written by Tim J. Hudson.
Some software programs that are licensed (or sublicensed) to the user under the GNU General Public License (GPL) or other similar Free Software licenses which, among other
rights, permit the user to copy, modify and redistribute certain programs, or portions thereof, and have access to the source code. The GPL requires that for any software covered
under the GPL which is distributed to someone in an executable binary format, that the source code also be made available to those users. For any such software covered under
the GPL, the source code is made available on this CD. If any Free Software licenses require that Network Associates provide rights to use, copy or modify a software program
that are broader than the rights granted in this agreement, then such rights shall take precedence over the rights and restrictions herein.
Software originally written by Henry Spencer, Copyright 1992, 1993, 1994, 1997 Henry Spencer.
Software originally written by Robert Nordier, Copyright © 1996-7 Robert Nordier. All rights reserved.
Software written by Douglas W. Sauder.
Software developed by the Apache Software Foundation (http://www.apache.org/).
International Components for Unicode (“ICU”) Copyright © 1995-2002 International Business Machines Corporation and others. All rights reserved.
Software developed by CrystalClear Software, Inc., Copyright © 2000 CrystalClear Software, Inc.
FEAD
®
Optimizer
®
technology, Copyright Netopsystems AG, Berlin, Germany.
Outside In
®
Viewer Technology © 1992-2001 Stellent Chicago, Inc. and/or Outside In® HTML Export, © 2001 Stellent Chicago, Inc.
Software copyrighted by Thai Open Source Software Center Ltd. and Clark Cooper, © 1998, 1999, 2000.
Software copyrighted by Expat maintainers.
Software copyrighted by The Regents of the University of California, © 1989.
Software copyrighted by Gunnar Ritter.
Software copyrighted by Sun Microsystems
®
, Inc.
Software copyrighted by Gisle Aas. All rights reserved, © 1995-2003.
Software copyrighted by Michael A. Chase, © 1999-2000.
Software copyrighted by Neil Winton, © 1995-1996.
Software copyrighted by RSA Data Security, Inc., © 1990-1992.
Software copyrighted by Sean M. Burke, © 1999, 2000.
Software copyrighted by Martijn Koster, © 1995.
Software copyrighted by Brad Appleton, © 1996-1999.
Software copyrighted by Michael G. Schwern, © 2001.
Software copyrighted by Graham Barr, © 1998.
Software copyrighted by Larry Wall and Clark Cooper, © 1998-2000.
Software copyrighted by Frodo Looijaard, © 1997.
Issued DECEMBER 2003 / VirusScan
®
for NetApp
®
software version 7.1.0
DOCUMENT BUILD 003-EN
Configuration Guide iii
Contents
Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Getting information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Contacting McAfee Security & Network Associates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
1 Configuring VirusScan for NetApp 7.1.0 . . . . . . . . . . . . . . . . . . . . 9
Adding the VirusScan for NetApp .NAP file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Accessing the VirusScan for NetApp policy pages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Setting policies for the product . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Setting general policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
General tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Messages tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Reports tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Setting policies for default processes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Processes tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Detection tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Advanced tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Actions tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Setting policies for low-risk processes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Use different settings for low-risk processes . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Processes tab for low-risk processes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Detection tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Advanced tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Actions tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Setting policies for high-risk processes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Use different settings for high-risk processes . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Processes tab for high-risk processes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Detection tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Advanced tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Actions tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Setting user interface policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Contents
iv VirusScan
®
for NetApp
®
software version 7.1.0
Display Options tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Password Options tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
Setting policies for Alert Manager Alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Alert Manager Alerts tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Setting NetApp policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Enforcing policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
Creating and configuring tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
On-demand scan tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Creating a new on-demand scan task . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Configuring the on-demand scan task settings . . . . . . . . . . . . . . . . . . . . . . . . . 42
Where tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Detection tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Advanced tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
Actions tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
Reports tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Task tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
Update tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Creating a new update task . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Configuring the update task settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Mirror tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Creating a new mirror task . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Configuring the mirror task settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
Scheduling tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
Task tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
Schedule tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
Configuration Guide 5
Preface
This guide provides you with the information that you need to configure McAfee
®
VirusScan
®
for NetApp
®
software version 7.1.0 with ePolicy Orchestrator
version 3.0 Service Pack 1.
VirusScan for NetApp 7.1.0 installs on scanner-servers. We do not support
deploying the product using ePolicy Orchestrator.
The following information is provided in this guide:
Installing the VirusScan for NetApp 7.1.0 Network Associates Package (.NAP)
files.
Configuring VirusScan for NetApp policies.
Creating, configuring, and scheduling tasks from the ePolicy Orchestrator
console.
Audience
This information is intended primarily for network administrators who are
responsible for their company’s anti-virus and security program in an
environment that includes one or more NetApp
®
filers.
Preface
6 VirusScan
®
for NetApp
®
software version 7.1.0
Conventions
This guide uses the following conventions:
Bold
All words from the user interface, including options, menus,
buttons, and dialog box names.
Example
Type the User name and Password of the desired account.
Courier
The path of a folder or program; a web address (URL); text that
represents something the user types exactly (for example, a
command at the system prompt).
Examples
The default location for the program is:
C:\Program Files\Network Associates\VirusScan
Visit the Network Associates web site at:
http://www.networkassociates.com
Run this command on the client computer:
C:\SETUP.EXE
Italic For emphasis or when introducing a new term; for names of
product manuals and topics (headings) within the manuals.
Example
Refer to the VirusScan Enterprise Product Guide for more
information.
<
TERM> Angle brackets enclose a generic term.
Example
In the console tree under ePolicy Orchestrator, right-click
<
SERVER>.
NOTE Supplemental information; for example, an alternate method of
executing the same command.
WARNING
Important advice to protect a user, computer system, enterprise,
software installation, or data.
Configuration Guide 7
Getting information
Getting information
Installation Guide *^
System requirements and instructions for installing and starting the software.
VirusScan for NetApp 7.1.0 Installation Guide
ePolicy Orchestrator 3.0. Installation Guide
Product Guide *
Product introduction and features, detailed instructions for configuring the
software, information on deployment, recurring tasks, and operating procedures.
VirusScan for NetApp 7.1.0 Product Guide
ePolicy Orchestrator 3.0. Product Guide
Alert Manager
Product Guide
Help §
High-level and detailed information on configuring and using the software.
What’s This? field-level help.
Release Guide *
High-level description of new and changed features for this version of the product.
Configuration Guide *
For use with ePolicy Orchestrator
. Procedures for configuring, deploying, and
managing your McAfee Security product through ePolicy Orchestrator
management software.
Implementation Guide *
Supplemental information for product features, tools, and components.
Release Notes ‡
ReadMe. Product information, resolved issues, any known issues, and
last-minute additions or changes to the product or its documentation.
Contacts ‡
Contact information for McAfee Security and Network Associates services and
resources: technical support, customer service, AVERT (Anti-Virus Emergency
Response Team), beta program, and training. This file also includes phone
numbers, street addresses, web addresses, and fax numbers for Network
Associates offices in the United States and around the world.
* An Adobe Acrobat .PDF file on the product CD or the McAfee Security download site.
^ A printed manual that accompanies the product CD. Note: Some language manuals may be available only as a .PDF file.
Text files included with the software application and on the product CD.
§ Help accessed from the software application: Help menu and/or Help button for page-level help; right-click option for What’s
This? help.
Preface
8 VirusScan
®
for NetApp
®
software version 7.1.0
Contacting McAfee Security & Network Associates
Technical Support
Home Page http://www.networkassociates.com/us/support/
KnowledgeBase Search https://knowledgemap.nai.com/phpclient/homepage.aspx
PrimeSupport Service Portal * https://mysupport.nai.com
McAfee Security Beta Program http://www.networkassociates.com/us/downloads/beta/
Security Headquarters — AVERT (Anti-Virus Emergency Response Team)
Home Page http://www.networkassociates.com/us/security/home.asp
Virus Information Library http://vil.nai.com
Submit a Sample —
AVERT WebImmune
AVERT DAT Notification
Service
https://www.webimmune.net/default.asp
http://vil.nai.com/vil/join-DAT-list.asp
Download Site
Home Page http://www.networkassociates.com/us/downloads/
DAT File and Engine Updates http://www.networkassociates.com/us/downloads/updates/
ftp://ftp.nai.com/pub/antivirus/datfiles/4.x
Product Upgrades * https://secure.nai.com/us/forms/downloads/upgrades/login.asp
Training
McAfee Security University http://www.networkassociates.com/us/services/education/mcafee/univer
sity.htm
Network Associates Customer Service
E-mail services_corporate_divis[email protected]
Web http://www.networkassociates.com/us/index.asp
US, Canada, and Latin America toll-free:
Phone +1-888-VIRUS NO or +1-888-847-8766
Monday – Friday, 8 a.m. – 8 p.m., Central Time
For additional information on contacting Network Associates and McAfee Security— including toll-free
numbers for other geographic areas — see the Contact file that accompanies this product release.
*
Logon credentials required.
Configuration Guide 9
1
Configuring VirusScan for
NetApp 7.1.0
You can configure VirusScan for NetApp policies, create tasks, and schedule tasks
from the ePolicy Orchestrator console.
These topics are included in this section:
Adding the VirusScan for NetApp .NAP file on page 10.
Accessing the VirusScan for NetApp policy pages on page 12.
Setting policies for the product on page 13.
Enforcing policies on page 40.
Creating and configuring tasks on page 40.
Scheduling tasks on page 52.
Configuring VirusScan for NetApp 7.1.0
10 VirusScan
®
for NetApp
®
software version 7.1.0
Adding the VirusScan for NetApp .NAP file
Before configuring VirusScan for NetApp, you must add the VirusScan for
NetApp .
NAP file to the Repository.
1 Log on to the ePolicy Orchestrator server with administrator rights.
2 Open the Configuration Wizard using one of these methods:
In the console tree under ePolicy Orchestrator, right-click Repository, then
select
Configure Repository.
In the right pane under AutoUpdate Tasks, select Check in NAP.
Figure 1-1. Configure Repository
Configuration Guide 11
Adding the VirusScan for NetApp .NAP file
The Software Repository Configuration Wizard dialog box appears.
3 Select Add new software to be managed, then click Next to open the Select a
Software Package
dialog box.
4 Locate and select the VNA710.NAP file.
5 Click Open to add the file to the Repository.
6 Click OK when complete.
Figure 1-2. Configure Software Repository
Configuring VirusScan for NetApp 7.1.0
12 VirusScan
®
for NetApp
®
software version 7.1.0
Accessing the VirusScan for NetApp policy pages
To locate policies for VirusScan for NetApp:
1 Log on to the ePolicy Orchestrator server with administrator rights.
2 In the console tree under ePolicy Orchestrator | Directory, select the site, group,
single computer, or the entire
Directory.
The
Policies, Properties, and Tasks tabs appear in the upper details pane.
3 Select the Policies tab in the upper details pane, then expand VirusScan for
NetApp 7.1
.
4 Select an item under VirusScan for NetApp 7.1 to display its policy pages.
Figure 1-3. VirusScan for NetApp — Policies tab
Configuration Guide 13
Setting policies for the product
Setting policies for the product
Configuring VirusScan for NetApp policies from the ePolicy Orchestrator console
allows you to enforce, across groups of computers, the options that define how all
tasks and permissions are configured.
For information regarding policies and how they are enforced, see the ePolicy
Orchestrator 3.0 product documentation.
Before configuring any policies, select the group of computers in the console tree
for which you want to set policies.
The VirusScan for NetApp 7.1.0 policy tabs, on which you can set VirusScan for
NetApp policies, are nearly identical to the dialog boxes and their tabs in the
VirusScan Console. For complete information about the options that you can set for
VirusScan for NetApp, refer to the VirusScan for NetApp 7.1.0 Product Guide.
Once you have configured and saved the desired policy options, you must enforce
the policies to make them available to the ePolicy Orchestrator agent. For more
information, see Enforcing policies on page 40.
These topics are included in this section:
Setting general policies on page 14.
Setting policies for default processes on page 18.
Setting policies for low-risk processes on page 23.
Setting policies for high-risk processes on page 28.
Setting user interface policies on page 33.
Setting policies for Alert Manager Alerts on page 37.
Setting NetApp policies on page 38.
Configuring VirusScan for NetApp 7.1.0
14 VirusScan
®
for NetApp
®
software version 7.1.0
Setting general policies
The options on the General Policies tabs apply to default, low-risk, and high-risk
processes for on-access scanning. See the VirusScan for NetApp 7.1.0 Product Guide
for more information about low-risk and high-risk processes.
Policies can be configured on these tabs:
General tab on page 15.
Messages tab on page 16.
Reports tab on page 17.
Configuration Guide 15
Setting policies for the product
General tab
Specify the general policies.
1 Select General Policies under VirusScan for NetApp 7.1 in the upper details
pane.
2 In the lower details pane, select the General tab.
3 Deselect Inherit.
4 Configure these policy options:
a Under Scan, choose whether to scan boot sectors and/or floppy disks
during shutdown.
b Under General, choose whether to enable or disable on-access scanning at
startup.
c Under Scan time, type the maximum scan time in seconds for archives and
the maximum scan time for all files. You can also enforce the scan time
limit for all files.
5 Click Apply to save these settings.
Figure 1-4. General Policies — General tab
Configuring VirusScan for NetApp 7.1.0
16 VirusScan
®
for NetApp
®
software version 7.1.0
Messages tab
Specify the user message policies.
1 In the lower details pane, select the Messages tab.
2 Deselect Inherit.
3 Configure which messages are sent to local and network users:
a Under Messages for local users, choose whether to display the On-Access
Scan Messages
dialog box for local users, and which actions local users
without administrator rights can take on infected files.
b Under Response to network users, choose whether to send network users
a message in the event of an outbreak, and whether to disconnect remote
users and deny access to the network share in the event of an outbreak.
4 Click Apply to save these settings.
Figure 1-5. General Policies — Messages tab
Configuration Guide 17
Setting policies for the product
Reports tab
Configure logging activity and specify what information to log.
1 In the lower details pane, select the Reports tab.
2 Deselect Inherit.
3 Configure the logging policies:
a Under Log file, choose whether to log virus activity data to a log file,
whether to limit the size of the log file, and specify the location of the log
file.
b Under What to log in addition to virus activity, choose what types of
information you want logged.
4 Click Apply to save these settings.
Figure 1-6. General Policies — Reports tab
Configuring VirusScan for NetApp 7.1.0
18 VirusScan
®
for NetApp
®
software version 7.1.0
Setting policies for default processes
These are the default processes for on-access scanning which are defined as any
processes that are not specified as low-risk or high-risk. See the VirusScan for
NetApp 7.1.0 Product Guide for information about assigning risk to a process.
Policies can be configured on these tabs:
Processes tab on page 19.
Detection tab on page 20.
Advanced tab on page 21.
Actions tab on page 22.
Configuration Guide 19
Setting policies for the product
Processes tab
Specify whether to configure the same policies for all processes or to configure
different policies for default, low-risk, and high-risk processes.
1 In the upper details pane under VirusScan for NetApp 7.1, select Default
Processes Policies
.
2 In the lower details pane, select the Processes tab.
3 Deselect Inherit.
4 Choose from these options:
Use the settings on these tabs for all processes.
Use different settings for high-risk and low-risk processes.
5 Click Apply to save these settings.
Figure 1-7. Default Processes Policies — Processes tab
Configuring VirusScan for NetApp 7.1.0
20 VirusScan
®
for NetApp
®
software version 7.1.0
Detection tab
Specify what is scanned and not scanned during an on-access scan.
1 In the lower details pane, select the Detection tab.
2 Deselect Inherit.
3 Configure the following options:
a Under Scan files, choose when to scan files and whether files on network
drives are scanned.
b Under What to scan, choose which file types to scan. Use the Additions
button to add file types to the list of default file types, or the
Specified
button to define a custom list of file types to scan.
c Under What not to scan, use the Exclusions button to define a custom list
of specific files, folders, and drives to exclude from scanning.
d Select Overwrite client exclusions to use only the exclusions that have been
added in the policy. If
Overwrite client exclusions is not selected, the client
computer uses the exclusions that were set locally and the exclusions set
here.
4 Click Apply to save these settings.
Figure 1-8. Default Processes Policies — Detection tab
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23
  • Page 24 24
  • Page 25 25
  • Page 26 26
  • Page 27 27
  • Page 28 28
  • Page 29 29
  • Page 30 30
  • Page 31 31
  • Page 32 32
  • Page 33 33
  • Page 34 34
  • Page 35 35
  • Page 36 36
  • Page 37 37
  • Page 38 38
  • Page 39 39
  • Page 40 40
  • Page 41 41
  • Page 42 42
  • Page 43 43
  • Page 44 44
  • Page 45 45
  • Page 46 46
  • Page 47 47
  • Page 48 48
  • Page 49 49
  • Page 50 50
  • Page 51 51
  • Page 52 52
  • Page 53 53
  • Page 54 54

McAfee NAPCKE-AB-AA - VirusScan For NetApp Configuration manual

Type
Configuration manual
This manual is also suitable for

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI