Mcafee VIRUSSCAN TC 6 ADMINISTRATOR GUIDE

McAfee VirusScan TC
Administrator’s Guide
Version 6.0
COPYRIGHT
Copyright © 2000 Networks Associates Technology, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means without the written permission of Networks Associates Technology, Inc., or its suppliers or affiliate companies. To obtain this permission, write to the attention of the Network Associates legal department at: 3965 Freedom Circle, Santa Clara, California 95054, or call (972) 308-9960.
LICENSE AGREEMENT
NOTICETOALLUSERS:FORTHESPECIFICTERMSOFYOURLICENSETOUSETHESOFTWARE THAT THIS DOCUMENTATION DESCRIBES, CONSULT THE README.1ST, LICENSE.TXT, OR OTHER LICENSE DOCUMENT THAT ACCOMPANIES YOUR SOFTWARE, EITHER AS A TEXT FILE ORASPART OF THESOFTWAREPACKAGING. IFYOU DO NOTAGREETO ALL OFTHE TERMS SET FORTH THEREIN, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO THE PLACE OF PURCHASE FOR A FULL REFUND.
NETWORK ASSOCIATES TRADEMARK ATTRIBUTIONS
* ActiveHelp, Bomb Shelter, Building a World of Trust, CipherLink, Clean-Up, Cloaking, CNX, Compass 7, CyberCop, CyberMedia, Data Security Letter, Discover, Distributed Sniffer System, Dr Solomon’s, Enterprise Secure Cast, First Aid, ForceField, Gauntlet, GMT, GroupShield, HelpDesk, Hunter, ISDN Tel/Scope, LM 1, LANGuru, Leading Help Desk Technology, Magic Solutions, MagicSpy, MagicTree, Magic University, MagicWin, MagicWord, McAfee, McAfee Associates, MoneyMagic, More Power To You, Multimedia Cloaking, NetCrypto, NetOctopus, NetRoom, NetScan, Net Shield, NetShield, NetStalker, Net Tools, Network Associates, Network General, Network Uptime!, NetXRay, Nuts & Bolts, PC Medic, PCNotary, PGP, PGP (Pretty Good Privacy), PocketScope, Pop-Up, PowerTelnet, Pretty Good Privacy, PrimeSupport, RecoverKey, RecoverKey-International, ReportMagic, RingFence, Router PM, Safe & Sound, SalesMagic, SecureCast, Service Level Manager, ServiceMagic, Site Meter, Sniffer, SniffMaster, SniffNet, Stalker, Statistical Information Retrieval (SIR), SupportMagic,Switch PM,TeleSniffer,TIS, TMach,TMeg,TotalNetworkSecurity,TotalNetworkVisibility,Total Service Desk, Total Virus Defense, T-POD, Trusted Mach, Trusted Mail, Uninstaller, Virex, Virex-PC, Virus Forum, ViruScan, VirusScan, VShield, WebScan, WebShield, WebSniffer, WebStalker WebWall, andZAC 2000 are
registered trademarks of Network Associates and/or its affiliates in the US and/or other countries. All other registered and unregistered trademarks in this document are the sole property of their r espective owners.
Issued September, 2000/McAfee VirusScan TC v6.0.0
Contents
Chapter1. Introduction ........................................5
Features .........................................................5
The deployment and installa tion scenarios . . .........................6
CompleteInstallation—Overview ...............................7
OptimizedInstallation—Overview ..............................8
ConfiguringelementsofVirusScanTCsoftware ......................10
Chapter 2. Deploying and Installing VirusScan TC . . ..............11
Overview .......................................................11
CompleteInstallation .............................................11
OptimizedInstallation.............................................14
Overview...............................................14
InstallePolicyOrchestratorsoftware .......................15
InstalltheePolicyOrchestratoragent .......................15
Copyprogramconfigurationfilestothesoftwarerepository....15
CopyInstallerandprogramfilestothenetwork ..............17
ConfiguretheVirusScanTCInstaller .......................18
Selectrebootoptions ....................................25
Set policy for the on-access scanner .......................25
Deployingtheinstallationpolicy ...........................25
UninstallingtheVirusScanTCprogram ..............................27
Chapter3. SettingPolicyforOn-AccessScanning ................29
Overview .......................................................29
Configuring on-access scan ning options ............................30
DetectionOptions ...........................................32
Actionoptions ..............................................36
Status of infected files after scanning .......................38
Reportoptions ..............................................39
Exclusionoptions ...........................................43
Deploying scanning policy to the ag ents .............................46
Administrator’s Guide iii
Contents
Chapter4. UpdatingandMirroringTasks .......................49
Whyupdate? ....................................................49
Overviewoftheupdatingandmirroringtasks ........................49
Configuring the AutoUpdate and Mirroring tasks ..................51
Setting schedule for tasks .....................................60
Settingbasicschedule ...................................60
Settingadvancedscheduleoptions ........................63
SelectingScheduleSettings...............................64
Editinganddeletingatask ....................................65
Dealingwithvirusoutbreaks.......................................65
Deployingroutine.DATfileupdates ............................66
DeployinganEXTRA.DATfile..................................66
Independentlyoftheweekly.DATupdate....................66
Withtheweekly.DATupdate ..............................67
AppendixA. Terminology .....................................71
Appendix B. Contact and
supportinformation ...................................73
Customerservice ................................................73
Technicalsupport................................................73
Internationalcontactinformation ...................................77
PrimeSupportoptions ............................................80
NetworkAssociatesconsultingandtraining..........................85
iv McAfee VirusScan TC

1Introduction

Features

McAfee VirusScan TC (Thin Client) is an anti-virus software application that includes:
On-Access Scanner Checks fo r viruses each time you open or copy a
Scanning engine The tool that recognizes viruses and malicious
Virus definition files *.DAT files include information that the scanning
AutoUpdate Keeps the virus definition files and the scann ing
1
file from, save a file to, or otherwise use any file stored on your server or client disk or hard drive.
code.
engine uses to recognize and act upon viruses.
engine up-to-date.
Site replication (mirroring) fe ature
Installer Installs the VirusScan TC program and the
Automatic uninstaller Removes previously installed anti-virus software,
This chapter provides an overview of the configuration, deployment and installation of the elements that are required to place the VirusScan TC softwareon your n etwork’s servers and workstations. These elements are separate, but intimately interconnected. See Appendix A for a discussion of the way the following terms are used in this Administrator’s Guide: configuration , deployment, installation, task, and policy.
Used in conjunction with AutoUpdate, creates a copy of the updating folder on the Network Associates FTP site for distribution of virus definition files on the network.
AutoUpdatefunction on the target computers.
including McAfee VirusScan v4.5, and other anti-virus software products produced by McAfee and most other major manufacturers.
Administrator’s Guide 5
Introduction

The deployment and installation scenarios

You can deploy the VirusScan TC software to the computers on your network using one of two installation scenarios—Complete Installation or Optimize d Installation. The major characteristics of the two approaches are described below:
Complete Installation Optimized Installation
Deployment
VirusScan TC is deployed by SMS, Windows NT login scripts.
The installation files that are deployed to target systems include all of the program files, including one versionof theMicrosoft Installer (MSI) foruse with Windows 95 and Windows 98, and another version for u se with Windows NT. This assures the availability of all files required for installation without regard to whether they are already present on the system.
VirusScanTC is deployed using the ePolicy Orches­trator Console.
Installation
Only one small installation file is deployed to the system, which, in turn, pulls only those program files that are required, but not already present, for installation and operation of VirusScan TC o n the target computers.
*
The compressed siz e of the installation files is approximately 6
The installation includes an executable file for eachof twoversionsof theMicrosoftInstaller v1.1 (MSI).
The space used on the client system af ter installa­tion is about10
VirusScan TC c a n only be configured using the ePolicy Orchestrator Console.
• You must be running ePolicy Orchestrator v1.1 on your network.
• The target computers must be running the ePolicy Orchestrator agent v1.1.
MB.
MB.
Configuration
The compressed size of the installation files ranges between approximately:
MB on a Windows 2000 system
•3.1 to
MB on a Windows 95 system without MSI
•4.6
previously installed.
The installation includes no more than one exe­cutable file for the single version of the Microsoft Installerv1.1thatyoursystemrequires.IfMSIis already present on the client, the installation rou­tine does not include either MSI file.
The space used on the client system after installation is about 10MB.
Same as C omplete Installation.
6 McAfee VirusScan TC
Introduction
Complete Installation Optimized Installation
Limitations
If you are not running ePolicy Orchestrator, or if the target computers are not running the ePolicy
Cannot be deployed by SMS o r Windows NT login scripts.
Orchestrator agent:
• You cannotchange the default configurationof the VirusScan TC software.
• You cannot update the virus definition files.
* In an Optimized Installation, ePolicy Orchestrator “pushes” a single small file, the Installer, to the target computers.
In turn,the Installer“pulls”all the other files requiredfrom locationsthat you designate on theInstallerconfiguration pages. SeeFigure 2-4 on page 19.

Complete Installation — Overview

The Complete Installation consists of all the program files included in the VSCAN_TCfolder that is located ontheCD-ROM. The following table lists the names of the program files with a description of their function and size:
Filename Function Approximate
INSTMSIW.EXE Installs MSI Service in Windows NT
environments.
INSTMSI.EXE Installs MSI Service in Windows 95 and
Windows 98 environments.
SETUP.EXE • Executes either INSTMSIW.EXE or
INSTMSI.EXE, as appropriate.
• Executes LWISETUP.EXE, (see below),
• Executes UNINST.EXE (which removes most previously installed anti-virus software.)
• Executes VSCANTC.MCS (see below).
LWISETUP.EXE • Installs AutoUpdate component.
• Installs UNINST.EXE Uninstaller.
VSCANTC.MCS • Installs the scanning engine.
• Installs the virus definition (.DAT) files.
• Installsand starts the on-access scanner.
Size
(compressed)
1.45
MB
1.45MB
KB
16
364KB
MB
2.74
When your SM S program or login script invokes SETUP.EXE, the Complete Installation procedure selects o nly those program files that it r equires to perform a successful installation.
Administrator’s Guide 7
Introduction
Keep in mind:
You can set and enforce policy for VirusScan TC centrally from the ePolicy Orchestrator Console as soon as you install the ePolicy Orchestrator agent on the target computers.
You cannot configure the program before deploying it across your network. The program is sent to the workstations with default settings.
If you are not running the ePolicy Orchestrator progra m, or if an ePolicy Orchestrator agentisnot present on the workstation,thereisno interface through which you can change the program’s default settings. Nor is there any functionality that allows you to update the program’s virus definitionfiles.
The C omplete Installation approach is useful where:
TheIT organization has rulesforbiddingsoftwaredeploymentbymeans other than approved deployment software, such as SMS or NT login scripts.
The administrator prefers using existing SMS or Windows NT login scripts.
The administrator does not intend to configure the VirusScan TC program w hen it is d eployed and installed, but rather intends to configure the anti-virus program at a later time.

Optimized Installation — Overview

The Optimized Instal lation consists of files that you sele ct from the VSCAN_TC folder that is located on the CD-ROM. (See the list of files on page
7.) Your selectionsare based on your network’s needs.
æ
IMPORTANT:The Optimized Installation is only possible if you are running McAfee ePolicy Orchestrator v1.1 on your network,an d if the ePolicy Orchestrator agent is present on the computers where the VirusScan TC software will be installed. For information on installing ePolicy Orchestrator v1.1; on upgrading your ePolicy Orchestrator software from v1.0; and on installing the ePolicy Orchestrator agent, see the Administrator’s Guide for the ePolicy Orchestrator software.
If you intend to use ePolicy Orchestrator to deploy and manage the VirusScan TC software,there are some advantagestousingthe Optimized Installation to do so, including:
8 McAfee VirusScan TC
Introduction
Econom y of bandwidth usage because the total size of the installat ion files is, in most ca ses, substantially less than the total size of the file s that make up a Complete installation.
Opportunity to configure the ePolicy Orchestrator agent to reboot the computeras required by the installationprocess withoutprompting you for a response.
Keep in mind:
You can set policy (configure) the VirusScan TC program’s scanning options before deploying it. After deployment, the policies are ready to be enforced when the agent receives them from the ePolicy Orchestrator server. That will happen at the time of the next communication between the server and the agent.
You can set a schedule for the AutoUpdate feature before deploying it.
When the Optim ized Installer program (LWISETUP.EXE) is deployed to the targetcomputers, it will calltheuninstaller program,which removes most previous installation of a virus-protection program that is resident on the target computer. The un installer will remove previous versions of McAfee or Dr Solomon’s anti-virus software, or the anti-virus software of other major manufacturers. Then, LWISETUP.EXE pulls the VirusScan TC program, and the MSI v1.1 installation files to the target computers, and pr o vides the functionality necessary for the AutoUpdate function that keeps the program’s v irus definition files up-to-date.
You must copy three files from the CD-ROM to a location on your network. The ePolicy Orchestrator agent uses these files to install the VirusScan TC program. The files are:
–VSCANTC.MCS –INSTMSI.EXE – INSTMSIW.EXE
Administrator’s Guide 9
Introduction

Confi guring element s of VirusS ca n TC softwa re

There are three aspects of VirusScan TC software that can be configured:
Installation process This proc ess must be c onfigured if you are
using the ePolicy Orchestrator software to deploy and install the VirusScan TC software. You cannot configure it using the ePolicy Orchestrator Consoleif you are using SMS or login scripts to de ploy the software. For additional information, see
Chapter 2, “Deploying and Installing VirusScan TC.” starting on page 11.
Anti-virus s oftw are This includes the on-access scanner, which
looks for viruses every time a file is written to disk or read from disk. For additional information, see Chapter 3 , “Setting Policy
for On-Access Scanning.” starting on page
29.
AutoUpdate function This allows you to schedule regular u pdates
of the virus definition f iles that the scanner requires to recognize and act o n viruses. This featurecanalso upgradethescanningengine when a new version is released. For additional information, see Chapter 4,
“Updating and Mirroring Tasks.” starting on page 49.
10 McAfee VirusScan TC
2Deploying and Installing
VirusScan TC

Overview

This section describes the procedures for deploying and installing the VirusScan TC program. You can do this in one of two ways, depending on your environment and the rules by which your enterprise operates. The two methods are:
Using SMS or Windows NT login scripts
Using ePolicy Orchestrator software v1.1
Chapter 1 of this manual describes the two installation scenarios available to you: the Complete Installation and the Optimized Installation. For a detailed description of each installation, see th e table on page 6.
2
If your enterprise requires this method for software deployment.See “Complete
Installation” on page 11.
If you use the McAfee management tool to deploy, install, and manage your anti-virus software. See “Optimized Installation” on
page14.

Complete Installation

This section describes the procedure for de ploying and installing the VirusScan TC program using SMS or Windows NT login scripts.
If you are running McAfee ePolicy Orchestrator v1.1 on your network, and if theePolicyOrchestratoragent is present on the computersthataretargeted for installation of the anti-virus program, you can use the ePolicy Orchestrator software to configure the on-access scanner and auto-update functions after the program has been installed. See Chapter 3, “Setting Policy for
On-Access Scanning,” starting on page 29,andChapter 4, “U pdating an d Mirroring Tasks,” starting on page 49 for information on configuring those
program components. If you are not ye t running McAfee ePolicy Orchestrator v1.1 on you r network,
or if th e ePolic y Orchestrator agent is not present on the computers that are targeted for installation of the anti-virus program, you cannot configurethe on-access scanner or autoupdate functions.The VirusScan TC program will run using its unalterable default settings, and you will not be able to update the v irus definition files that the scanner depends on for identification of viruses. For a description of the default settings, see page 29 .
Administrator’s Guide 11
Deploying and Installing VirusScan TC
To deploy and install the VirusScan TC program on your computer, follow these steps:
1. Place the CD-ROM in your server’s drive.
2. On your network, create a shared folder where you will copy the program files for the target computers to share. The shared folder must provide “read” access to every computer on which VirusScan TC will be installed .
æ
IMPORTANT:On Windows 9 5 and Windows 98 systems, the share mustbeinthesamedomainasthecurrentlylogged-inuser.
3. Copy the following files from the VSCAN_TC folder on the CD-ROM to the shared folder:
INSTMSIW.EXE LWISETUP.EXE VSCANTC.MCS INSTMSI.EXE SETUP.EXE
4. Creat e an SMS or Windows NT login script to perform the following actions:
Copy the five VirusScan T C filesfrom the shared network folder to a temporary location on the target computer.
•InvokeSETUP.EXE.
Reboot the target computer if SETUP.EXE returns 3010. Rebooting is required if:
– T he Microsoft Installer(MSI) demands it. – Previously installed anti-virus software was removed during
the installation.
– The product was installed ina Windows NT environment, thus
introducing McAfee file system drivers to the operating system.
+
WARNING:If a reboot is necessary, the system will not be protected against virus infection until rebooted.
12 McAfee VirusScan TC
Deploying and Installing VirusScan TC

What next?

If you have installed the ePolicy Orchestrator v1.1 program, you can now configurethe VirusScan TC software before deploying it to the target computers. The features t hat you can c ustomize are:
The On-Access Scanner. See Chapter 3, “Setting Policy for
On-Access Scanning,” starting on page 29.
AutoUpdate.SeeChapter 4, “Updating and Mirroring Tasks,” starting
on page 49.
After configuring these fea tures, you can run the SMS or Windows NT login scripts to complete the deployment and installation on the target computers.
æ
IMPORTANT:If you are not yet running McAfee ePolicy Orchestrator v1.1 on your network, or if the ePolicy Orchestratoragent is not present on the targeted computers,you cannot conf igure the on-access scanner or updating functions. The VirusScan TC program will run using its unalterable default settings, and you will not be able to update its virus definitionfiles. For a description of the default settings, see page 29.
Administrator’s Guide 13
Deploying and Installing VirusScan TC

Optimi zed Install a tion

This section describes the procedures for placing the program files onto the server, then deploying and installing the Installer and V irusScan TC programs via the ePolicy Orchestrator software.

Overview

Optimized installation and deployment consists of these seven basic tasks, which are described in detail later in this chapter:
1. Install the ePolicy Orchestrator v1.1 server software o n your s erver.
2. Install the ePolicy Orchestrator agent on the target computers.
æ
IMPORTANT:You must install the ePolicy Orchestrator v1.1 server software and the agent before attempting to deploy or install the VirusScan TC program files. The software and its documenta tion are include d on the CD-ROM. See the ePolicy Orchestrator v1.1 Administrator’s Guide for instructions on installing or upgrading to version 1.1 of the program.
3. Copy the required program configuration files for the VirusScan TC Installer and the on-access scanner from the CD-ROM to the ePolicy Orchestrator software repository.
4. Copy the required Microsoft Installer filesand the VirusScan TC program installation file from the CD-ROM to one or several commonly accessiblelocations on the network. These locations might be shared folders or FTP sites.
5. Configur e the VirusScan TC Installer:
Designate the locat ions where the Ins taller finds the VirusScan TC program installation file.
Designate the locations where the Installer finds the files that insta ll MSI on the target computers.
Define the way you want the Installer to record its activity in a log file, and the characteristics of the log file (name, size, and content).
6. Select reboot options for the ePolicy Orchestrator agent to enforce when rebooting is required during installation.
14 McAfee VirusScan TC
¥
NOTE: You can designate up to eight sites for the VirusScan TC program installation file, and for the files that install MSI. This helps assure that the installation procedure will be able to locate the required files, even if one or more of the locations is temporarily off-line. Listing the sites in order of proximity helps assure that the installation procedu re will contact the most preferred location first.
7. Set policy for (configure) the on-access scanner.
8. Deplo y the installation po licy and install the VirusScan TC program.
For tasks 1, 2, and 6, see the ePolicy Orchestratorv1.1 Administrator’sGuide.For tasks 3–7, see the following sections in this chapter.

1. Install ePolicy Orchestra torsoftware

Before you can perform the Optimized Installation, you must first install and configure the ePolicy O rchestrator v1.1 software on your server. For complete instructions, see the ePolicy Orchestrator v1.1 Administrator’s Guide,whichyou can find on the CD-ROM.
•Toinstall the program for the first time, follow the instructions for “First-time Installation.”
Deploying and Installing VirusScan TC
•Toupgrade the program from the previous version, follow the instructions for “Upgrading Version 1.0 to Version 1.1.”

2. Install the ePolicy Orchestrator agent

You must install the ePo licy Orc he strator agent on all the target computers before you can pe rform the Optimized Installation. For complete instructions, see the ePolicy Orchestrat or v1.1 Administrator’s Guide, which you can find on the CD-ROM.

3. Copy program configuration files to the software repository

In order to configure and deploy the VirusScan TC software, you must place the.NAP files (Network Associates Package) on the server where you installed and configured the ePolicy Orchestr ator sof tware. These files are identifiable by their extension, .NAP.
LWI100EN.NAP Installer
VTC600EN.NAP VirusScan TC
æ
IMPORTANT:In order to install LWI100EN.NAP in the software repository, it must be installed from a location that also includes LWISETUP.EXE. No user interaction with LWISETUP.EXE is required.
Administrator’s Guide 15
Deploying and Installing VirusScan TC
To place a .NAP file in the software repository, follow these steps:
1. In the ePolicy Orchestrator console tree, right-click on Software,and select Install (Figure 2-1).
Figure 2-1. Console Tree—Install software in repository
The Select a Software Package dialog box appears (Figure 2-2).
2. Click at the top of the dialog box to select the CD-ROM. Locate each of th e following .NAP files on the CD-ROM and click Open to place it in the software repository.
After you have placed the Installer and the VirusScan TC prog ram file s in the repository, they appear in two places on the ePolicy Orchestrator console (see
Figure 2-3 on p age 17):
In the upper portion of the details pane.
In the console tree under Software.
16 McAfee VirusScan TC
Figure 2-2. Select a Software Package dialog box
LWI100.NAP Installer
VTC600.NAP VirusScan TC
Deploying and Installing VirusScan TC
Figure 2-3. ePolicy Orchestrator Console
displaying the contents of the Software Repository

4. Copy Installer and program files to the network

In order for the I nstaller to f ind th e files needed for downloading, you must firstcopy those filesfrom the CD-ROMtoa place on the networkthat alltarget computers can access. This can be either an FTP site or a shared folder on the network.
The files include two MSI (Microsoft Installer) files: on e for Windows NT environments and one for Windows 95 and Windows 98 environments; and an MCS file, the VirusScan TC program file.
Follow these steps to copy the installation files from the CD-ROM:
1. On the CD-ROM, locate these files:
INSTMSIW.EXE for Windows NT
INSTMSI.EXE for Windows 95 an d Windows 98
VSCANTC.MCS VirusScan program file
Administrator’s Guide 17
Deploying and Installing VirusScan TC
2. Copy the appropriateMSI file or files for your Windows environmentto either an FTP site or to a shared folder on the network.
Ifyournetworkincludes bothtypes ofWindowsenvironment,copy both MSI files.
If you are operating in an exclusively Windows 2000 environment, you do not need to copy either of the MSI files.
If you are copying to a shared folder, you must use Universal Naming Convention (UNC) to target it.
æ
3. Copy the file named VSCANTC.MCS to either an FTP site or shared folderon the network.Youcanuse the same folderwhereyou copiedthe MSI installation files, or you can use a different folder.
If you are copying to a shared folder, you must use Universal Naming Convention (UNC) to target it.
IMPORTANT:OnWindows95and Windows98systems, the sharemustbeinthesamedomainasthecurrentlylogged-in user.
¥
NOTE:Although the *.MSIfilesandthe VSCANTC.MCS file canbe placed in the same location, some administrators may prefer to place them in different locations to control network traffic.
4. You can create up to eight FTP sites or shared network folders to hold these files. This enables large networks to provide fail-over pro tection and control network traffic.

5. Conf igure the VirusScan TC Install er

For installation to take place, the VirusScan TC Installer must be able to find the executable files that places the Microsoft Installer into the target computers, and t he install package that contains the VirusScan TC software. The files that install the Microsoft Installer are named INS TMSI.EXE and INSTMSIW.EXE. These have been described und er “4. Copy Installer and
program files to the network”. The package that contains the VirusScan TC
softwareis namedVSCANTC.MCS. You must place these files in one or more locations on your network, and then configure the VirusScan TC installer to look for them in the locations y ou have selected.
18 McAfee VirusScan TC
Deploying and Installing VirusScan TC
Setting policy for the installation files
Follow these steps to set policy for the installation files:
1. Verify that the Policies tab is s elected in the upper portion o f the details pane,on the rightside of the ePolicy Orchestrator console.
2. If you have not already done so, c lick the next to Installer for VirusScan TC in t he upper portion o f the details pane.
3. Select Configurations to display the Configurations property pages. By default, the Install Sites property page appears (see Figure 2-4 .) This is the property page on which you can designate up to eight locations where you placed VSCANTC.MCS. When you select the MSI tab, you can designate up to eight locations where you placed INSTMSI.EXE and INSTMSIW.EXE. The pro cedures for adding sites is identical for both Install Sites and MSI Sites property pages.
Figure 2-4. Installer Config urations pages—Install Sites and
MSI property pages
4. Deselect Inherit. The buttons on the right are activated.
Administrator’s Guide 19
Deploying and Installing VirusScan TC
¥
NOTE:Disabling the Inheritance feature lets you set new policy for the installation of the Installer program for the target (group or computer) that you have selected in the console tree. During future installation s to computers in other branches of your network , you might want to leave t his checkbox selected if you w ant the Site policies you set now to affect computers that are in subordinate positions in the console tree. See the ePolicy O rchestrator documentation for a completediscussion of Inheritance.
5. Click Add to designate a new site for the file. The Site Opt ions property page opens. By default, FTP Site is sele cted, and the dialog assumes that login credentials are required (see Figure 2-5.)
¥
NOTE: You can designate a maximum of eight sites, each with a unique name. The order in which the sites are listed on the Install Sites and MSI Sites pr operty pages is the order in wh ich the VirusScan TC installer softw are will look for the file.
20 McAfee VirusScan TC
Figure 2-5. Site Options property page
Deploying and Installing VirusScan TC
6. Enter a name for the site that you are defining. This is the name that will appearin themain Install Sites,o r M SI Sites page, shown in Figure 2-4 on
page 19, and in the installation log. See “Setting po licy for the installation files” on page 19 for information about the installation log.
7. Verify that Enable Site is selected.
8. Provide the ne cessary infor mation appropriate to the site where the files are located:
For an FTP site
a. Enter the name of the FTP server and the directory containing
the file or files. For example, ftp.myserver/install.
b. If, in Step 2 on page 18 you placed one or both MSI file s on a
File Transfer (FTP) site:
– that requires login credentials, enter the User Name and
Passwordinformation required for access to the server. Regardless of the number of characters in the password, eight asterisks appear in the password field.
– that accepts anonymous logins, select Use Anonymous
FTP Login. The boxes for login credentials are disabled.
¥
NOTE: You must also perform this step for VSCANTC.MCS if, in Step 3 on page 18 you placed that file on an FTP site.
c. Enter the path of the file or files. d. If your network requires use of a proxy server, selectUse
Proxy Server. Two previously disabled text boxes are now enabled. Enter the name of the proxy server, and the port it uses.
æ
IMPORTANT:If you are using proxy software, be certainthat you have the most current version, includinganyservicepacks that hav e been released for use w ith the proxy software.
For a UNC shared folder
a. Select the UNC path option. b. Using UNC notation,(\\servername\path), enter the path
of the location where youplaced the MSIfiles in Step 2 on page
18. On Windows 95 and W indows 98 systems, the currently
logged-in user must have “read” rights to the shared folder.
Administrator’s Guide 21
Deploying and Installing VirusScan TC
¥
c. Fill in the Use r Name and Password boxes. Regardless of the
• Forapathonthelocalcomputer
a. Select the UNC path option. b. Enter the path of the local folder in the field labeled En ter a
9. When you have finished setting options, click OK. Your changes are saved for deployment, and you are returned to Install Sites or MSI Sites property page.
+
WARNING:If you do not click OK, the options that you selected will be ignored.
NOTE:You must also perform this step for VSCANTC.MCS if, in Step 3 on page 18, you placed that file on a UNC shared folder.
number of charactersin the password, eight asterisks appear in the password field.
local path.
10. Use the buttons on the right side of the interface to modify previously configuredsites.
Click Edit to modify the configuration of a site already listed on the
Install Sites page.
Click Delete to remove a s elected site.
Click MoveUporMove Downto change the order in which the sites
are listed. In general, the first site on the list should be the nearest site. The last site on the list should be the most remote site.
11. When you have finished setting Site Options, click OK to save your site options selections and close the dialog box. You return to the Configurations property pages.
12. Click Apply to save your selections for Install Sites or MSI Sites.
+
WARNING: If you do not click OK and Apply, the options thatyou selected are ignored.
22 McAfee VirusScan TC
Deploying and Installing VirusScan TC
Setting policy for the Installer’s loggingfeature
This feature of the Installer allows you to configure the way in which the installer logs activity during installation. You can set the name and location of the log file, its size, and the level of detail that is reported.
æ
IMPORTANT:When deploying and installing the VirusScan TC program, the only report that an installation has failed is found in the local log file on the target machines. Such events are not reported by the Anti-Virus Informant module.
A failed installation is also reflected by the absence of information on the Properties tab about the o n-access scanner.
To configure the logging activity feature, follow these steps:
1. Select the Log Activity tab (Figure 2-6.)
Figure 2-6. Installer Configurations pages—Log Activity property
page
2. Deselect Inherit. The logging options are activated. See the NOTE on
page 20 for information about Inheritance.
Administrator’s Guide 23
Deploying and Installing VirusScan TC
3. Make sure that Logtofileis selected.
4. Bydefault,thenameofthelogfileisInstall.log.Thedefaultpathof the log file is:
<drive>:\Program Files\McAfee\VirusScan TC\Install.log
Here,<drive>refersto the clientdiskwhere the VirusScanTC software is installed .
If you prefer,you can enter a different file name or path.
5. By default, the maximum size for the log file is set to 1,024 can en ter any value between 10
ë
TIP: If the data in the log exceeds the file size you set, the oldest 20
KB and 32,767KB.
KB (1MB).You
percent of the log text is deleted to m a ke room for new information that is added to the end of the file. If you place no size restriction on the log file, you run the risk of it consuming all available space on the drive where it is located.
6. By default, Enable Verboseis selected. If you want the log to report every step in a procedure, leave it unc hanged. Otherwise, deselect it.
Figure 2-7and Figure 2-8 show samplesof an event recorded in verbose
and non-verbose mode, respectively.
Figure 2-7. Verbose Log
7. When you have finished setting Log Activity options , click Applyto save your selections for deployment. You ret urn to the Installer Configurations property pages.
24 McAfee VirusScan TC
Figure 2-8. Non-verbose Log
+
WARNING: Ifyoudo not click Apply, the optionsthat you selected are ign ored.

6. Sele ct reboot options

Using the ePolicy Orchestrator Agent Options page, you can specify the wa y you want the installer to respond to r ebooting requirement. The options are:
Prompt user when software installation requires reboot. and/or
Automatic reboot with timeout.
See Chapter 5 (The Agent) in the ePolicy Orchestrator Administrator’ s Guide
for information about selecting these options.

7. Set policy for the on-access scanner

You can set policy for the on-accessscannerat any time. Administrator’s may find it convenient to configure the scanner as part o f the initia l deployment and installation activity. However, it ca n be done at any time.
Deploying and Installing VirusScan TC
For a complete discussion of configuring the on-access scanner, see “Setting
Policy for On-Access Scanning” starting on page 29.

8. Dep loying the inst allat ion policy

After you have finished making configuration choices for the Install Sites, MSI Sites, and Log Activity property pages, youare ready to distribute the policies and install VirusScanTC on the target computers.
¥
NOTE: In most situations, you will want to configure the on-access
scanner before deploying and installingthe VirusScan TC program. For detailed information about configuring this component, see Chapter 3,
“Setting Policy for On-Access Scanning,” starting on page 29.
You can configure AutoUpdate before you deploy the VirusScan TC program. However, AutoUpdate cannot run until you have deployed the VirusScan TC program and it has been installed on the client machines. For information about configuring this component, see Chapter 4,
“Updating and Mirroring Tasks,” starting on page 49.
Administrator’s Guide 25
Deploying and Installing VirusScan TC
To deploy the policy and install VirusScan TC, follow these steps:
1. Select a target in the ePolicyO rchestrator consoletree where you will be installing the Installer and VirusScan TC program s. The target can be a group or a single computer (See Figure 2-9 on page 26).
2. Deselect Inherit on the Installation Options page, located in the lower portion of the details pane. See the NOTE on page 20 for information about Inheritance.
3. Make sure that E nforce Policies fo r Installer for VirusScan TC v6.0.0 for Windows is selected.
4. Select Force Install Installer for VirusScan TC v6.0.0 for Windows.
5. Verify that the Install Package box displays the path of the Installer, or click Select to locate the package.
26 McAfee VirusScan TC
Figure 2-9. ePolicy Orchestrator—Installation Options property
page
¥
NOTE: By default, when you placed the Installer program in the ePolicy Orchestrator software r epo sitory, its executable file was automatically placed on the ePolicy Orchestrator server at the following locati on:
<drive>:\Program Files\McAfee\EPO\Db\Software
\LWI___1000\1.0.0\English\InstallFiles
Deploying and Installing VirusScan TC
6. Click Apply. The policy is r eady for deployment to the computers that you selected in the console tree in Step 1 on page 26.TheVirusScanTC program will be transmitted when the ePolicy Orchestrator agent requests new policies from the server.
+
WARNING: Ifyoudo not click Apply, the optionsthat you selected are ign ored.

Uninstalling the VirusScan TC program

This chapter does not include instructions for the use of the Force Uninstall Installer for VirusScan TC v6.0.0 for Windows option. Thisfeature is useful
onlyaftertheprogramhasalreadybeen installed. Briefly,the Force Uninstall checkbox allowsyou to remove any previously installed versionorcopy of the Installer software, including VirusScan TC.
An alternative approach to uninstalling the prog ra m involves issuing the following command at the command line prompt on each client machine:
LWI /script uninstall.LWS
Administrator’s Guide 27
Deploying and Installing VirusScan TC
28 McAfee VirusScan TC
Loading...
+ 63 hidden pages