Active Firewall, Active Security, Active Security (in Katakana), ActiveHelp, ActiveShield, AntiVirus Anyware and design, Appera, AVERT, Bomb Shelter, Certified Network
Expert, Clean-Up, CleanUp Wizard, ClickNet, CNX, CNX Certification Certified Network Expert and design, Covert, Design (stylized N), Disk Minder, Distributed Sniffer System,
Distributed Sniffer System (in Katakana), Dr Solomon’s, Dr Solomon’s label, E and Design, Entercept, Enterprise SecureCast, Enterprise SecureCast (in Katakana), ePolicy
Orchestrator, Event Orchestrator (in Katakana), EZ SetUp, First Aid, ForceField, GMT, GroupShield, GroupShield (in Katakana), Guard Dog, HelpDesk, HelpDesk IQ,
HomeGuard, Hunter, Impermia, InfiniStream, Intrusion Prevention Through Innovation, IntruShield, IntruVert Networks, LANGuru, LANGuru (in Katakana), M and design,
Magic Solutions, Magic Solutions (in Katakana), Magic University, MagicSpy, MagicTree, McAfee, McAfee (in Katakana), McAfee and design, McAfee.com, MultiMedia Cloaking,
NA Network Associates, Net Tools, Net Tools (in Katakana), NetAsyst, NetCrypto, NetOctopus, NetScan, NetShield, NetStalker, Network Associates, Network Performance
Orchestrator, NetXray, NotesGuard, nPO, Nuts & Bolts, Oil Change, PC Medic, PCNotary, PortalShield, Powered by SpamAssassin, PrimeSupport, Recoverkey, Recoverkey –
International, Registry Wizard, Remote Desktop, ReportMagic, RingFence, Router PM, Safe & Sound, SalesMagic, SecureCast, SecureSelect, SecurityShield, Service Level
Manager, ServiceMagic, SmartDesk, Sniffer, Sniffer (in Hangul), SpamKiller, SpamAssassin, Stalker, SupportMagic, ThreatScan, TIS, TMEG, Total Network Security, Total
Network Visibility, Total Network Visibility (in Katakan a), Total Service Desk, Total Virus D efense, Trusted Mail , UnInstal ler, VIDS, Virex, Virus Forum, ViruScan, VirusScan,
WebScan, WebShield, WebShield (in Katakana), WebSniffer, WebStalker, WebWall, What's The State Of Your IDS?, Who’s Watching Your Network, WinGauge, Your E-Business
Defender, ZAC 2000, Zip Manager are registered trademarks or trademarks of Network Associates, Inc. and/or its affiliates in the US and/or other countries. Sniffer®
brand products are made only by Network Associates, Inc. All other registered and unregistered trademarks herein are the sole property of their re spectiv e o wne rs.
LICENSE INFORMATION
License Agreement
NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, WHICH SETS FORTH
THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU HAVE ACQUIRED,
PLEASE CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT ACCOMPANIES YOUR SOFTWARE PACKAGING
OR THAT YOU HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET, A FILE ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEB SITE
FROM WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL
THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO NETWORK ASSOCIATES OR THE PLACE OF PURCHASE FOR A FULL REFUND.
Attributions
This product includes or may include:
Software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/).
Cryptographic software written by Eric A. Young and software written by Tim J. Hudson.
Some software programs that are licensed (or sublicensed) to the user under the GNU General Public License (GPL) or other similar Free Software licenses which, among other
rights, permit the user to copy, modify and redistribute certain programs, or portions thereof, and have access t o the source code. The GPL requires that f or any software covered
under the GPL which is distributed to someone in an executable binary format, that the source code also be made available to those users. For any such software covered under
the GPL, the source code is made available on this CD. If any Free Software licenses require that Network Associates provide rights to use, copy or modify a software program
that are broader than the rights granted in this agreement, then such rights shall take precedence over the rights and restrictions herein.
Software originally written by Henry Spencer, Copyright 1992, 1993, 1994, 1997 Henry Spencer.
This guide provides you with the information that you need to configure McAfee®
VirusScan
version 3.0 Service Pack 1.
VirusScan for NetApp 7.1.0 installs on scanner-servers. We do not support
deploying the product using ePolicy Orchestrator.
The following information is provided in this guide:
Installing the VirusScan for NetApp 7.1.0 Network Associates Package (.NAP)
files.
Configuring VirusScan for NetApp policies.
Creating, configuring, and scheduling tasks from the ePolicy Orchestrator
console.
This information is intended primarily for network administrators who are
responsible for their company’s anti-virus and security program in an
environment that includes one or more NetApp
®
for NetApp® software version 7.1.0 with ePolicy Orchestrator™
®
filers.
Configuration Guide5
Preface
Conventions
This guide uses the following conventions:
Bold
All words from the user interface, including options, menus,
buttons, and dialog box names.
Example
Type the User name and Password of the desired account.
Courier
The path of a folder or program; a web address (URL); text that
represents something the user types exactly (for example, a
command at the system prompt).
Examples
The default location for the program is:
C:\Program Files\Network Associates\VirusScan
Visit the Network Associates web site at:
http://www.networkassociates.com
Run this command on the client computer:
C:\SETUP.EXE
ItalicFor emphasis or when introducing a new term; for names of
product manuals and topics (headings) within the manuals.
Example
Refer to the VirusScan Enterprise Product Guide for more
information.
<
TERM>Angle brackets enclose a generic term.
Example
In the console tree under ePolicy Orchestrator, right-click
SERVER>.
<
NOTE Supplemental information; for example, an alternate method of
executing the same command.
WARNING
Important advice to protect a user, computer system, enterprise,
software installation, or data.
6VirusScan® for NetApp® software version 7.1.0
Getting information
Getting information
Installation Guide *^
Product Guide *
Help §
Release Guide *
Configuration Guide *
Implementation Guide *
Release Notes ‡
System requirements and instructions for installing and starting the software.
Product introduction and features, detailed instructions for configuring the
software, information on deployment, recurring tasks, and operating procedures.
High-level and detailed information on configuring and using the software.
What’s This? field-level help.
High-level description of new a nd changed features f or this versio n of th e product.
For use with ePolicy Orchestrator™. Procedures for configuring, deploying, and
managing your McAfee Security product through ePolicy Orchestrator
management software.
Supplemental information for product features, tools, and components.
ReadMe. Product information, resolved issues, any known issues, and
last-minute additions or changes to the product or its documentation.
Contacts ‡
Contact information for McAfee Security and Network Associates services and
resources: technical support, customer service, AVERT (Anti-Virus Emergency
Response Team), beta program, and training. This file also includes phone
numbers, street addresses, web addresses, and fax numbers for Network
Associates offices in the United States and around the world.
* An Adobe Acrobat .PDF file on the product CD or the McAfee Security download site.
^ A printed manual that accompanies the product CD. Note: Some language manuals may be available only as a .PDF file.
‡ Text files included with the software application and on the product CD.
§ Help accessed from the software application: Help menu and/or Help button for page-level help; right-click option for What’s
This? help.
Configuration Guide7
Preface
Contacting McAfee Security & Network Associates
Technical Support
Home Pagehttp://www.networkassociates.com/us/support/
KnowledgeBase Searchhttps://knowledgemap.nai.com/phpclient/homepage.aspx
PrimeSupport Service Portal * https://mysupport.nai.com
E-mail services_corporate_division@nai.com
Web http://www.networkassociates.com/us/index.asp
US, Canada, and Latin America toll-free:
https://www.webimmune.net/default.asp
http://vil.nai.com/vil/join-DAT-list.asp
ftp://ftp.nai.com/pub/antivirus/datfiles/4.x
sity.htm
Phone +1-888-VIRUS NOor+1-888-847-8766
For additional information on contacting Network Associates and McAfee Security— including toll-free
numbers for other geographic areas — see the Contact file that accompanies this product release.
*
Logon credentials required.
8VirusScan® for NetApp® software version 7.1.0
Monday – Friday, 8 a.m. – 8 p.m., Central Time
Configuring VirusScan for
NetApp 7.1.0
You can configure VirusScan for NetApp policies, create tasks, and schedule tasks
from the ePolicy Orchestrator console.
These topics are included in this section:
Adding the VirusScan for NetApp .NAP fileon page 10.
Accessing the VirusScan for NetApp policy pageson page 12.
Setting policies for the producton page 13.
Enforcing policieson page 40.
Creating and configuring taskson page 40.
Scheduling taskson page 52.
1
Configuration Guide9
Configuring VirusScan for NetApp 7.1.0
Adding the VirusScan for NetApp .NAP file
Before configuring VirusScan for NetApp, you must add the VirusScan for
NetApp .
1Log on to the ePolicy Orchestrator server with administrator rights.
2Open the Configuration Wizard using one of these methods:
NAP file to the Repository.
In the console tree under ePolicy Orchestrator, right-click Repository, then
select
Configure Repository.
In the right pane under AutoUpdate Tasks, select Check in NAP.
Figure 1-1. Configure Repository
10VirusScan® for NetApp® software version 7.1.0
Adding the VirusScan for NetApp .NAP file
The Software Repository Configura tio n W izar d dialog box appears.
Figure 1-2. Configure Software Repository
3Select Add new software to be managed, then click Next to open the Select a
Software Package
4Locate and select the VNA710.NAP file.
5Click Open to add the file to the Repository.
6Click OK when complete.
dialog box.
Configuration Guide11
Configuring VirusScan for NetApp 7.1.0
Accessing the VirusScan for NetApp policy pages
To locate policies for VirusScan for NetApp:
1Log on to the ePolicy Orchestrator server with administrator rights.
2In the console tree under ePolicy Orchestrator | Directory, select the site, group,
single computer, or the entire
Directory.
Figure 1-3. VirusScan for NetApp — Policies tab
Policies, Properties, and Tasks tabs appear in the upper details pane.
The
3Select the Policies tab in the upper details pane, then expand VirusScan for
NetApp 7.1
4Select an item under VirusScan for NetApp 7.1 to display its policy pages.
.
12VirusScan® for NetApp® software version 7.1.0
Setting policies for the product
Configuring VirusScan for NetApp policies from the ePolicy Orchestrator console
allows you to enforce, across groups of computers, the options that define how all
tasks and permissions are configured.
For information regarding policies and how they are enforced, see the ePolicy
Orchestrator 3.0 product documentation.
Before configuring any policies, select the group of computers in the console tree
for which you want to set policies.
The VirusScan for NetApp 7.1.0 policy tabs, on which you can set VirusScan for
NetApp policies, are nearly identical to the dialog boxes and their tabs in the
VirusScan Console. For complete information about the options that you can set for
VirusScan for NetApp, refer to the VirusScan for NetApp 7.1.0 Product Guide.
Once you have configured and saved the desired policy options, you must enforce
the policies to make them available to the ePolicy Orchestrator agent. For more
information, see Enforcing policieson page 40.
Setting policies for the product
These topics are included in this section:
Setting general policieson page 14.
Setting policies for default processeson page 18.
Setting policies for low-risk processeson page 23.
Setting policies for high-risk processeson page 28.
Setting user interface policieson page 33.
Setting policies for Alert Manager Alerts on page 37.
Setting NetApp policieson page 38.
Configuration Guide13
Configuring VirusScan for NetApp 7.1.0
Setting general policies
The options on the General Policies tabs apply to default, low-risk, and high-risk
processes for on-access scanning. See the VirusScan for NetApp 7.1.0 Product Guide
for more information about low-risk and high-risk processes.
bUnder General, choose whether to enable or disable on-access scanning at
startup.
cUnder Scan time, type the maximum scan time in seconds for archives and
the maximum scan time for all files. You can also enforce the scan time
limit for all files.
5Click Apply to save these settings.
Configuration Guide15
Configuring VirusScan for NetApp 7.1.0
Messages tab
Specify the user message policies.
1In the lower details pane, select the Messages tab.
Figure 1-5. General Policies — Messages tab
2Deselect Inherit.
3Configure which messages are sent to local and network users:
aUnder Messages for local users, choose whether to display the On-Access
Scan Messages
dialog box for local users, and which actions local users
without administrator rights can take on infected files.
bUnder Response to network users, choose whether to send network users
a message in the event of an outbreak, and whether to disconnect remote
users and deny access to the network share in the event of an outbreak.
4Click Apply to save these se tt ings.
16VirusScan® for NetApp® software version 7.1.0
Setting policies for the product
Reports tab
Configure logging activity and specify what information to log.
1In the lower details pane, select the Reports tab.
Figure 1-6. General Policies — Reports tab
2Deselect Inherit.
3Configure the logging policies:
aUnder Log file, choose whether to log virus activity data to a log file,
whether to limit the size of the log file, and specify the location of the log
file.
bUnder What to log in addition to virus activity, choose what types of
information you want logged.
4Click Apply to save these settings.
Configuration Guide17
Configuring VirusScan for NetApp 7.1.0
Setting policies for default processes
These are the default processes for on-access scanning which are defined as any
processes that are not specified as low-risk or high-risk. See the VirusScan for NetApp 7.1.0 Product Guide for information about assigning risk to a process.
2Deselect Inherit.
3Use the drop-down lists to select the primary action for When a virus is found
and the secondary action If the above Action fails.
4Click Apply to save these se tt ings.
22VirusScan® for NetApp® software version 7.1.0
Setting policies for low-risk processes
These policies apply to processes specified as having a lower risk of infection, and
are used during an on-access scan. For information about assigning risk to a
process, see the VirusScan for NetApp 7.1.0 Product Guide.
Setting policies for the product
The options on these tabs affect processes specified as low-risk on the
tab. The
names under
Detection, Advanced, and Actions tabs are identical to the tabs of the same
Default Processes Policies.
Processes
For more information about configuring these options, see the VirusScan for
NetApp 7.1.0 Product Guide.
Policies can be configured on these tabs:
Use different settings for low-risk processeson page 24.
Processes tab for low-risk processes on page 25.
Detection tabon page 26.
Advanced tabon page 27.
Actions tabon page 27.
Configuration Guide23
Configuring VirusScan for NetApp 7.1.0
Use different settings for low-risk processes
Before you can define low-risk processes, you must specify that you want to use
different settings for low-risk and high-risk processes:
1In the upper details pane under VirusScan for NetApp 7.1, select Default
Processes Policies
1In the lower details pane, select the Processes tab.
3Deselect Inherit.
4Use the Add and Remove buttons to define the list of low-risk processes.
5Click Apply to save these settings.
Configuration Guide25
Configuring VirusScan for NetApp 7.1.0
Detection tab
Specify what is scanned and not scanned during an on-access scan.
1In the lower details pane, select the Detection tab.
2Deselect Inherit.
3Configure these policy options:
aUnder Scan files, choose when to scan files and whether files on network
drives are scanned.
bUnder What to scan, choose which file types to scan. Use the Additions
button to add file types to the list of default file types, or the
button to define a custom list of file types to scan.
cUnder What not t o sc a n , use the Exclusions button to define a custom list
of specific files, folders, and drives to exclude from scanning.
dSelect Overwrite client exclusio ns to use only the exclusions that have been
added in the policy. If
computer uses the exclusions that were set locally and the exclusions set
here.
Specified
Overwrite client exclusions is not selected, the client
4Click Apply to save these se tt ings.
26VirusScan® for NetApp® software version 7.1.0
Setting policies for the product
Advanced tab
Specify advanced scan options to be used during an on-access scan.
1In the lower details pane, select the Advanced tab.
2Deselect Inherit.
3Configure these policy options:
aUnder Heuristics, choose whether to scan for unknown program viruses
and/or unknown macro viruses.
bUnder Non-viruses, choose whether to scan for potentially unwanted
programs and joke programs.
cUnder Compressed files, choose whether to scan packed executables,
inside multiple-file archives, and MIME-encoded files.
4Click Apply to save these settings.
Actions tab
Define the primary and secondary actions to perform on infected files during an
on-access scan.
1In the lower details pane, select the Actions tab.
2Deselect Inherit.
3Use the drop-down lists to select the primary action for When a virus is found
and the secondary action If the above Action fails.
4Click Apply to save these settings.
Configuration Guide27
Configuring VirusScan for NetApp 7.1.0
Setting policies for high-risk processes
Specify processes that you consider to have a higher risk of infection. For
information about assigning risk to a process, see the VirusScan for NetApp 7.1.0 Product Guide.
The options on these tabs affect processes specified as high-risk on the
tab. The
names under
Detection, Advanced, and Actions tabs are identical to the tabs of the same
Default Processes Policies.
Processes
For more information about configuring these options, see the VirusScan for
NetApp 7.1.0 Product Guide.
Policies can be configured on these tabs:
Use different settings for high-risk processeson page 29.
Processes tab for high-risk processeson page 30.
Detection tabon page 31.
Advanced tabon page 32.
Actions tabon page 32.
28VirusScan® for NetApp® software version 7.1.0
Setting policies for the product
Use different settings for high-risk processes
Before you can define high-risk processes, you must specify that you want to use
different settings for low-risk and high-risk processes:
1In the upper details pane under VirusScan for NetApp 7.1, select Default
Processes Policies
1In the lower details pane, select the Processes tab.
For complete information about these options, see the VirusScan for NetApp 7.1.0
Product Guide.
Setting policies for the product
Configuration Guide33
Configuring VirusScan for NetApp 7.1.0
Display Options tab
Configure security-related display settings.
1In the upper details pane under VirusScan for NetApp 7.1, select User Interface
Policies
2Select the Display Options tab in the lower details pane.
.
Figure 1-15. User Interface Policies — Display Options
3Deselect Inherit.
34VirusScan® for NetApp® software version 7.1.0
Setting policies for the product
Configure these policy options:
4
aUnder System tray icon, choose which, if any, menu options are available
to users from the system tray icon. You can choose all menu options,
minimal menu options, or no options.
bUnder VirusScan console options choose from these console options:
Refresh the VirusScan console screen every __ seconds . Select the
frequency in seconds, for which you want to refresh the console.
Display ePO’s tasks in the VirusScan console. This option requires
ePolicy Orchestrator 3.0 or later and allows you to display ePolicy
Orchestrator update, mirror , and on-demand scan tasks in the
VirusScan Console.
Disable default AutoUpdate task schedule. Select this option to
disable the schedule for the default AutoUpdate task in VirusScan
for NetApp. The schedule is disabled when the policy is enforced.
This policy depends on the Task Manager service, which must be
running in order for the task’s schedule to be disabled.
When this option is not selected, the task schedule does not
change. For example, if the task is not scheduled, it remains
unscheduled. If the task is scheduled, it remains scheduled.
Enable VirusScan splash screen (Default). The VirusScan splash
screen appears when the
launched.
Deselect this option if you do not want the VirusScan splash
screen to appear when the
launched.
5Click Apply to save these settings.
VirusScan Console or SHSTAT.EXE is
VirusScan Console or SHSTAT.EXE is
Configuration Guide35
Configuring VirusScan for NetApp 7.1.0
Password Options tab
Define a password, and the policy pages and tabs that the password protects.
1Select the Password Options tab in the lower details pane.
Figure 1-16. User Interface Policies — Password Options
2Deselect Inherit.
3Under User interface password, select the desired level of password protection :
No password
Password protection for all items listed below
Password protection for the selected items below
4If you selected password protection in Step 3, type and confirm the password
in the boxes provided.
5If you selected the Password protection for the selected items below in Step 3,
select the items for which you want protection.
6Click Apply to save t h ese settings.
36VirusScan® for NetApp® software version 7.1.0
Setting policies for Alert Manager Alerts
These policies apply to the VirusScan for NetApp features that generate alerts and
the destination for alerts.
NOTE
For complete information about configuring these options, see
the Alert Manager Product Guide.
Alert Manager Alerts tab
Configure alert policies.
1In the upper details pane under VirusScan for NetApp 7.1, select Alert Manager
Alerts Policies
.
Setting policies for the product
2On the Alert Manager Alerts tab in the lower details pane, deselect Inherit.
Figure 1-17. Alert Manager Alerts
Configuration Guide37
Configuring VirusScan for NetApp 7.1.0
Configure these policy options:
3
aUnder Which components will generate alerts, select the VirusScan for
NetApp components for which you want to generate alerts when
infections are detected.
bUnder Alert Manager destination selection, choose to enable or disable
alerting. If you enable alerting, you must select whether to enable
centralized alerting or Alert Manager alerting, and the location of the
folder or server to receive the alerts.
4Click Apply to save these se tt ings.
Setting NetApp policies
Configure these policies to add filers, ensure communications between the
scanner-server and the filer, and clear the clean file cache.
1In the upper details pane under VirusScan for NetApp 7.1, select NetApp
Policies
.
2On the General tab in the lower details pane, deselect Inherit.
38VirusScan® for NetApp® software version 7.1.0
Figure 1-18. NetApp Policies
Add or remove NetApp filers from the list.
3
Setting policies for the product
Under
Filers, choose whether to use the locally-configured filer list or
overwrite it by adding filers here.
aClick Add to create a new list of filers which will be enforced on the
scanner-servers.
WARNING
The list you create here overwrites the locally-configured filer
list.
bAfter you have added filers here, click Remove to delete any filers for
which you do not want to process scans.
4Enable “keep-alive” probes — Select this option to ensure that the filer and
scanner are in communication.
5Reset filer clean file cache after each DAT or Engine update — Select this option
to clear the cache of files already scanned, after the scanner-server sends the
filer a
6Click Apply to save these settings.
DAT or engine an update notification.
Configuration Guide39
Configuring VirusScan for NetApp 7.1.0
Enforcing policies
To enforce the policies that you have configured:
1In the console tree under Directory, select the desired site, group, single
computer, or the entire
2In the upper details pane on the Policies tab, select VirusScan for NetApp 7.1.
The VirusScan for NetApp 7.1 page appears in the lower details pane.
Directory for which you want to enforce polices.
Figure 1-19. Enforce Policies
3Deselect Inherit.
4Select Enforce policies for VirusScan for NetApp 7.1 when you want this
installation policy to be available to the ePolicy Orchestrator agent.
5Click Apply to save t h ese settings.
Creating and configuring tasks
You can create VirusScan for NetApp tasks and configure them to meet your
needs.
For complete information about these options, see the VirusScan for NetApp 7.1.0
Product Guide.
42VirusScan® for NetApp® software version 7.1.0
Where tab
Specify where scanning takes place.
1Select the Where tab.
Creating and configuring tasks
2Deselect Inherit.
3Use the Add, Remove, and Edit buttons to define the locations to scan.
4Under Scan Options, choose whether to include subfolders, and whether to
scan boot sectors.
Figure 1-22. On-Demand Scan Task — Where tab
Configuration Guide43
Configuring VirusScan for NetApp 7.1.0
Detection tab
Specify the file types to scan.
1Select the Detection tab.
2Deselect Inherit.
3Configure these policy options:
aUnder What to scan, select All files, Default + additional types, or Specified
file types
button to add file types to the list of default file types, or the
button to define a custom list of file types to scan.
44VirusScan® for NetApp® software version 7.1.0
Figure 1-23. On-Demand Scan Task — Detection tab
(you can select only one of these options). Use the Additions
Specified
Creating and configuring tasks
Under What not to scan, use the Exclusions button to define a list of specific
b
file types, folders, and drives to exclude from scanning.
cSelect Overwrite client exclusions to use only the exclusions that have been
added to this policy. If
Overwrite client exclusions is not selected, the
exclusions that are set for the client’s default on-demand scanning are
appended to the exclusions that were set for the task on the ePolicy
Orchestrator server.
dUnder Compressed files, choose whether to scan inside packed
executables, whether to scan inside multiple-file archives, and whether to
scan MIME-encoded files.
Advanced tab
Define additional settings.
1Select the Advanced tab.
2Deselect Inherit.
Figure 1-24. On-Demand Scan Task — Advanced tab
Configuration Guide45
Configuring VirusScan for NetApp 7.1.0
Configure these policy options:
3
aUnder Heuristics, choose whether to scan for unknown program viruses
and/or unknown macro viruses.
bUnder Non-viruses, choose whether to scan for potentially unwanted
programs, and whether to scan for joke programs.
cUnder CPU utilization, choose the maximum percentage of CPU usage for
the scan task.
dUnder Miscellaneous, choose whether to scan files that have been migrated
to storage, and whether to rescan all files when
Actions tab
Specify the actions to take on infected files.
1Select the Actions tab.
DAT files are updated.
46VirusScan® for NetApp® software version 7.1.0
Figure 1-25. On-Demand Scan Task — Actions tab
Creating and configuring tasks
Deselect Inherit.
2
3Use the drop-down lists to select the primary action for When a virus is found
and the secondary action If the above Action fails.
4If you select Move infected files to a folder, choose a destination folder.
Reports tab
Configure logging activity and specify what information to log.
1Select the Reports tab.
2Deselect Inherit.
3Configure these policy options:
aUnder Log file, choose whether to log virus activity, whether to limit the
size of the log file, and the location of the log file.
bUnder What to log in addition to virus activity, choose what types of
information to log.
Figure 1-26. On-Demand Scan Task — Reports tab
Configuration Guide47
Configuring VirusScan for NetApp 7.1.0
Task tab
Specify user account settings.
1Select the Task tab.
2Deselect Inherit.
3Under User account settings, type the user name, password, and domain name
in the appropriate fields if you want the task to run under a specific account. If
no account is entered, the task runs under the system account.
4When finished editing all the desired options on all tabs, click OK to return to
the
ePolicy Orchestrator Scheduler dialog box.
48VirusScan® for NetApp® software version 7.1.0
Figure 1-27. On-Demand Scan Task — Task tab
Update tasks
Update tasks can be used to perform immediate or scheduled upd ates of the virus
definition (
These topics are included in this section:
Creating a new update taskon page 49.
Configuring the update task settingson page 50.
Creating a new update task
1In the console tree under ePolicy Orchestrator, right-click Directory or the
DAT) files, the scanning engine, or the EXTRA.DAT file.
NOTE
For information about scheduling a task, see Scheduling tasks
on page 52.
desired site, group, or computer, then select
The
Schedule Task dialog box appears.
Creating and configuring tasks
Schedule Task.
2Type a New Task Name.
3Select ePolicy Orchestrator Agent — Update from the Software/Task Type list.
4Click OK to create the task.
Figure 1-28. New Update Task
Configuration Guide49
Configuring VirusScan for NetApp 7.1.0
Configuring the update task settings
1On the Tasks tab in the details pane, right-click the VirusScan for NetApp