NOTICETOALLUSERS:FORTHESPECIFICTERMSOFYOURLICENSETOUSETHESOFTWARE
THAT THIS DOCUMENTATION DESCRIBES, CONSULT THE README.1ST, LICENSE.TXT, OR
OTHER LICENSE DOCUMENT THAT ACCOMPANIES YOUR SOFTWARE, EITHER AS A TEXT FILE
ORASPART OF THESOFTWAREPACKAGING. IFYOU DO NOTAGREETO ALL OFTHE TERMS SET
FORTH THEREIN, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE
PRODUCT TO THE PLACE OF PURCHASE FOR A FULL REFUND.
NETWORK ASSOCIATES TRADEMARK ATTRIBUTIONS
* ActiveHelp, Bomb Shelter, Building a World of Trust, CipherLink, Clean-Up, Cloaking, CNX, Compass 7,
CyberCop, CyberMedia, Data Security Letter, Discover, Distributed Sniffer System, Dr Solomon’s, Enterprise
Secure Cast, First Aid, ForceField, Gauntlet, GMT, GroupShield, HelpDesk, Hunter, ISDN Tel/Scope, LM 1,
LANGuru, Leading Help Desk Technology, Magic Solutions, MagicSpy, MagicTree, Magic University, MagicWin,
MagicWord, McAfee, McAfee Associates, MoneyMagic, More Power To You, Multimedia Cloaking, NetCrypto,
NetOctopus, NetRoom, NetScan, Net Shield, NetShield, NetStalker, Net Tools, Network Associates, Network
General, Network Uptime!, NetXRay, Nuts & Bolts, PC Medic, PCNotary, PGP, PGP (Pretty Good Privacy),
PocketScope, Pop-Up, PowerTelnet, Pretty Good Privacy, PrimeSupport, RecoverKey, RecoverKey-International,
ReportMagic, RingFence, Router PM, Safe & Sound, SalesMagic, SecureCast, Service Level Manager,
ServiceMagic, Site Meter, Sniffer, SniffMaster, SniffNet, Stalker, Statistical Information Retrieval (SIR),
SupportMagic,Switch PM,TeleSniffer,TIS, TMach,TMeg,TotalNetworkSecurity,TotalNetworkVisibility,Total
Service Desk, Total Virus Defense, T-POD, Trusted Mach, Trusted Mail, Uninstaller, Virex, Virex-PC, Virus
Forum, ViruScan, VirusScan, VShield, WebScan, WebShield, WebSniffer, WebStalker WebWall, andZAC 2000 are
registered trademarks of Network Associates and/or its affiliates in the US and/or other countries. All
other registered and unregistered trademarks in this document are the sole property of their r espective
owners.
This chapter provides an overview of the configuration, deployment and
installation of the elements that are required to place the VirusScan TC
softwareon your n etwork’s servers and workstations. These elements are
separate, but intimately interconnected. See Appendix A for a discussion of
the way the following terms are used in this Administrator’s Guide:
configuration , deployment, installation, task, and policy.
Used in conjunction with AutoUpdate, creates a
copy of the updating folder on the Network
Associates FTP site for distribution of virus
definition files on the network.
AutoUpdatefunction on the target computers.
including McAfee VirusScan v4.5, and other
anti-virus software products produced by McAfee
and most other major manufacturers.
Administrator’s Guide5
Introduction
The deployment and installation scenarios
You can deploy the VirusScan TC software to the computers on your network
using one of two installation scenarios—Complete Installation or Optimize d
Installation. The major characteristics of the two approaches are described
below:
Complete InstallationOptimized Installation
Deployment
VirusScan TC is deployed by SMS, Windows NT
login scripts.
The installation files that are deployed to target
systems include all of the program files, including
one versionof theMicrosoft Installer (MSI) foruse
with Windows 95 and Windows 98, and another
version for u se with Windows NT. This assures
the availability of all files required for installation
without regard to whether they are already
present on the system.
VirusScanTC is deployed using the ePolicy Orchestrator Console.
Installation
Only one small installation file is deployed to the
system, which, in turn, pulls only those program
files that are required, but not already present, for
installation and operation of VirusScan TC o n the
target computers.
*
The compressed siz e of the installation files is
approximately 6
The installation includes an executable file for
eachof twoversionsof theMicrosoftInstaller v1.1
(MSI).
The space used on the client system af ter installation is about10
VirusScan TC c a n only be configured using the
ePolicy Orchestrator Console.
• You must be running ePolicy Orchestrator v1.1
on your network.
• The target computers must be running the
ePolicy Orchestrator agent v1.1.
MB.
MB.
Configuration
The compressed size of the installation files
ranges between approximately:
MB on a Windows 2000 system
•3.1
to
MB on a Windows 95 system without MSI
•4.6
previously installed.
The installation includes no more than one executable file for the single version of the Microsoft
Installerv1.1thatyoursystemrequires.IfMSIis
already present on the client, the installation routine does not include either MSI file.
The space used on the client system after
installation is about 10MB.
Same as C omplete Installation.
6McAfee VirusScan TC
Introduction
Complete InstallationOptimized Installation
Limitations
If you are not running ePolicy Orchestrator, or if
the target computers are not running the ePolicy
Cannot be deployed by SMS o r Windows NT
login scripts.
Orchestrator agent:
• You cannotchange the default configurationof
the VirusScan TC software.
• You cannot update the virus definition files.
* In an Optimized Installation, ePolicy Orchestrator “pushes” a single small file, the Installer, to the target computers.
In turn,the Installer“pulls”all the other files requiredfrom locationsthat you designate on theInstallerconfiguration
pages. SeeFigure 2-4 on page 19.
Complete Installation — Overview
The Complete Installation consists of all the program files included in the
VSCAN_TCfolder that is located ontheCD-ROM. The following table lists the
names of the program files with a description of their function and size:
FilenameFunctionApproximate
INSTMSIW.EXEInstalls MSI Service in Windows NT
environments.
INSTMSI.EXEInstalls MSI Service in Windows 95 and
Windows 98 environments.
SETUP.EXE• Executes either INSTMSIW.EXE or
INSTMSI.EXE, as appropriate.
• Executes LWISETUP.EXE, (see below),
• Executes UNINST.EXE (which removes
most previously installed anti-virus software.)
• Executes VSCANTC.MCS (see below).
LWISETUP.EXE• Installs AutoUpdate component.
• Installs UNINST.EXE Uninstaller.
VSCANTC.MCS• Installs the scanning engine.
• Installs the virus definition (.DAT) files.
• Installsand starts the on-access scanner.
Size
(compressed)
1.45
MB
1.45MB
KB
16
364KB
MB
2.74
When your SM S program or login script invokes SETUP.EXE, the Complete
Installation procedure selects o nly those program files that it r equires to
perform a successful installation.
Administrator’s Guide7
Introduction
Keep in mind:
•You can set and enforce policy for VirusScan TC centrally from the
ePolicy Orchestrator Console as soon as you install the ePolicy
Orchestrator agent on the target computers.
•You cannot configure the program before deploying it across your
network. The program is sent to the workstations with default settings.
•If you are not running the ePolicy Orchestrator progra m, or if an ePolicy
Orchestrator agentisnot present on the workstation,thereisno interface
through which you can change the program’s default settings. Nor is
there any functionality that allows you to update the program’s virus
definitionfiles.
The C omplete Installation approach is useful where:
•TheIT organization has rulesforbiddingsoftwaredeploymentbymeans
other than approved deployment software, such as SMS or NT login
scripts.
•The administrator prefers using existing SMS or Windows NT login
scripts.
•The administrator does not intend to configure the VirusScan TC
program w hen it is d eployed and installed, but rather intends to
configure the anti-virus program at a later time.
Optimized Installation — Overview
The Optimized Instal lation consists of files that you sele ct from the
VSCAN_TC folder that is located on the CD-ROM. (See the list of files on page
7.) Your selectionsare based on your network’s needs.
æ
IMPORTANT:The Optimized Installation is only possible if you are
running McAfee ePolicy Orchestrator v1.1 on your network,an d if the
ePolicy Orchestrator agent is present on the computers where the
VirusScan TC software will be installed. For information on installing
ePolicy Orchestrator v1.1; on upgrading your ePolicy Orchestrator
software from v1.0; and on installing the ePolicy Orchestrator agent, see
the Administrator’s Guide for the ePolicy Orchestrator software.
If you intend to use ePolicy Orchestrator to deploy and manage the VirusScan
TC software,there are some advantagestousingthe Optimized Installation to
do so, including:
8McAfee VirusScan TC
Introduction
•Econom y of bandwidth usage because the total size of the installat ion
files is, in most ca ses, substantially less than the total size of the file s that
make up a Complete installation.
•Opportunity to configure the ePolicy Orchestrator agent to reboot the
computeras required by the installationprocess withoutprompting you
for a response.
Keep in mind:
•You can set policy (configure) the VirusScan TC program’s scanning
options before deploying it. After deployment, the policies are ready to
be enforced when the agent receives them from the ePolicy Orchestrator
server. That will happen at the time of the next communication between
the server and the agent.
•You can set a schedule for the AutoUpdate feature before deploying it.
•When the Optim ized Installer program (LWISETUP.EXE) is deployed to
the targetcomputers, it will calltheuninstaller program,which removes
most previous installation of a virus-protection program that is resident
on the target computer. The un installer will remove previous versions of
McAfee or Dr Solomon’s anti-virus software, or the anti-virus software
of other major manufacturers. Then, LWISETUP.EXE pulls the VirusScan
TC program, and the MSI v1.1 installation files to the target computers,
and pr o vides the functionality necessary for the AutoUpdate function
that keeps the program’s v irus definition files up-to-date.
•You must copy three files from the CD-ROM to a location on your
network. The ePolicy Orchestrator agent uses these files to install the
VirusScan TC program. The files are:
–VSCANTC.MCS
–INSTMSI.EXE
–INSTMSIW.EXE
Administrator’s Guide9
Introduction
Confi guring element s of VirusS ca n TC softwa re
There are three aspects of VirusScan TC software that can be configured:
Installation processThis proc ess must be c onfigured if you are
using the ePolicy Orchestrator software to
deploy and install the VirusScan TC
software. You cannot configure it using the
ePolicy Orchestrator Consoleif you are
using SMS or login scripts to de ploy the
software. For additional information, see
Chapter 2, “Deploying and Installing
VirusScan TC.” starting on page 11.
Anti-virus s oftw areThis includes the on-access scanner, which
looks for viruses every time a file is written
to disk or read from disk. For additional
information, see Chapter 3 , “Setting Policy
for On-Access Scanning.” starting on page
29.
AutoUpdate functionThis allows you to schedule regular u pdates
of the virus definition f iles that the scanner
requires to recognize and act o n viruses. This
featurecanalso upgradethescanningengine
when a new version is released. For
additional information, see Chapter 4,
“Updating and Mirroring Tasks.” starting on
page 49.
10McAfee VirusScan TC
2Deploying and Installing
VirusScan TC
Overview
This section describes the procedures for deploying and installing the
VirusScan TC program. You can do this in one of two ways, depending on
your environment and the rules by which your enterprise operates. The two
methods are:
Using SMS or
Windows NT login scripts
Using ePolicy Orchestrator
software v1.1
Chapter 1 of this manual describes the two installation scenarios available to
you: the Complete Installation and the Optimized Installation. For a detailed
description of each installation, see th e table on page 6.
2
If your enterprise requires this method for
software deployment.See “Complete
Installation” on page 11.
If you use the McAfee management tool to
deploy, install, and manage your anti-virus
software. See “Optimized Installation” on
page14.
Complete Installation
This section describes the procedure for de ploying and installing the
VirusScan TC program using SMS or Windows NT login scripts.
If you are running McAfee ePolicy Orchestrator v1.1 on your network, and if
theePolicyOrchestratoragent is present on the computersthataretargeted for
installation of the anti-virus program, you can use the ePolicy Orchestrator
software to configure the on-access scanner and auto-update functions after
the program has been installed. See Chapter 3, “Setting Policy for
On-Access Scanning,” starting on page 29,andChapter 4, “U pdating an d
Mirroring Tasks,” starting on page 49 for information on configuring those
program components.
If you are not ye t running McAfee ePolicy Orchestrator v1.1 on you r network,
or if th e ePolic y Orchestrator agent is not present on the computers that are
targeted for installation of the anti-virus program, you cannot configurethe
on-access scanner or autoupdate functions.The VirusScan TC program will
run using its unalterable default settings, and you will not be able to update
the v irus definition files that the scanner depends on for identification of
viruses. For a description of the default settings, see page 29 .
Administrator’s Guide11
Deploying and Installing VirusScan TC
To deploy and install the VirusScan TC program on your computer, follow
these steps:
1. Place the CD-ROM in your server’s drive.
2. On your network, create a shared folder where you will copy the
program files for the target computers to share. The shared folder must
provide “read” access to every computer on which VirusScan TC will be
installed .
æ
IMPORTANT:On Windows 9 5 and Windows 98 systems, the share
mustbeinthesamedomainasthecurrentlylogged-inuser.
3. Copy the following files from the VSCAN_TC folder on the CD-ROM to
the shared folder:
4. Creat e an SMS or Windows NT login script to perform the following
actions:
•Copy the five VirusScan T C filesfrom the shared network folder to
a temporary location on the target computer.
•InvokeSETUP.EXE.
•Reboot the target computer if SETUP.EXE returns 3010.
Rebooting is required if:
– T he Microsoft Installer(MSI) demands it.
– Previously installed anti-virus software was removed during
the installation.
– The product was installed ina Windows NT environment, thus
introducing McAfee file system drivers to the operating
system.
+
WARNING:If a reboot is necessary, the system will not be
protected against virus infection until rebooted.
12McAfee VirusScan TC
Deploying and Installing VirusScan TC
What next?
If you have installed the ePolicy Orchestrator v1.1 program, you can now
configurethe VirusScan TC software before deploying it to the target
computers. The features t hat you can c ustomize are:
•The On-Access Scanner. See Chapter 3, “Setting Policy for
On-Access Scanning,” starting on page 29.
•AutoUpdate.SeeChapter 4, “Updating and Mirroring Tasks,” starting
on page 49.
After configuring these fea tures, you can run the SMS or Windows NT login
scripts to complete the deployment and installation on the target computers.
æ
IMPORTANT:If you are not yet running McAfee ePolicy Orchestrator
v1.1 on your network, or if the ePolicy Orchestratoragent is not present
on the targeted computers,you cannot conf igure the on-access scanner orupdating functions. The VirusScan TC program will run using its
unalterable default settings, and you will not be able to update its virus
definitionfiles. For a description of the default settings, see page 29.
Administrator’s Guide13
Deploying and Installing VirusScan TC
Optimi zed Install a tion
This section describes the procedures for placing the program files onto the
server, then deploying and installing the Installer and V irusScan TC programs
via the ePolicy Orchestrator software.
Overview
Optimized installation and deployment consists of these seven basic tasks,
which are described in detail later in this chapter:
1. Install the ePolicy Orchestrator v1.1 server software o n your s erver.
2. Install the ePolicy Orchestrator agent on the target computers.
æ
IMPORTANT:You must install the ePolicy Orchestrator v1.1
server software and the agent before attempting to deploy or install
the VirusScan TC program files. The software and its
documenta tion are include d on the CD-ROM. See the ePolicyOrchestrator v1.1 Administrator’s Guide for instructions on installing
or upgrading to version 1.1 of the program.
3. Copy the required program configuration files for the VirusScan TC
Installer and the on-access scanner from the CD-ROM to the ePolicy
Orchestrator software repository.
4. Copy the required Microsoft Installer filesand the VirusScan TC
program installation file from the CD-ROM to one or several commonly
accessiblelocations on the network. These locations might be shared
folders or FTP sites.
5. Configur e the VirusScan TC Installer:
•Designate the locat ions where the Ins taller finds the VirusScan TC
program installation file.
•Designate the locations where the Installer finds the files that insta ll
MSI on the target computers.
•Define the way you want the Installer to record its activity in a log
file, and the characteristics of the log file (name, size, and content).
6. Select reboot options for the ePolicy Orchestrator agent to enforce when
rebooting is required during installation.
14McAfee VirusScan TC
¥
NOTE: You can designate up to eight sites for the VirusScan
TC program installation file, and for the files that install MSI.
This helps assure that the installation procedure will be able to
locate the required files, even if one or more of the locations is
temporarily off-line. Listing the sites in order of proximity
helps assure that the installation procedu re will contact the
most preferred location first.
7. Set policy for (configure) the on-access scanner.
8. Deplo y the installation po licy and install the VirusScan TC program.
For tasks 1, 2, and 6, see the ePolicy Orchestratorv1.1 Administrator’sGuide.For
tasks 3–7, see the following sections in this chapter.
1. Install ePolicy Orchestra torsoftware
Before you can perform the Optimized Installation, you must first install and
configure the ePolicy O rchestrator v1.1 software on your server. For complete
instructions, see the ePolicy Orchestrator v1.1 Administrator’s Guide,whichyou
can find on the CD-ROM.
•Toinstall the program for the first time, follow the instructions for
“First-time Installation.”
Deploying and Installing VirusScan TC
•Toupgrade the program from the previous version, follow the
instructions for “Upgrading Version 1.0 to Version 1.1.”
2. Install the ePolicy Orchestrator agent
You must install the ePo licy Orc he strator agent on all the target computers
before you can pe rform the Optimized Installation. For complete instructions,
see the ePolicy Orchestrat or v1.1 Administrator’s Guide, which you can find on
the CD-ROM.
3. Copy program configuration files to the software repository
In order to configure and deploy the VirusScan TC software, you must place
the.NAP files (Network Associates Package) on the server where you installed
and configured the ePolicy Orchestr ator sof tware. These files are identifiable
by their extension, .NAP.
•LWI100EN.NAPInstaller
•VTC600EN.NAPVirusScan TC
æ
IMPORTANT:In order to install LWI100EN.NAP in the software
repository, it must be installed from a location that also includes
LWISETUP.EXE. No user interaction with LWISETUP.EXE is required.
Administrator’s Guide15
Deploying and Installing VirusScan TC
To place a .NAP file in the software repository, follow these steps:
1. In the ePolicy Orchestrator console tree, right-click on Software,and
select Install (Figure 2-1).
Figure 2-1. Console Tree—Install software in repository
The Select a Software Package dialog box appears (Figure 2-2).
2. Clickat the top of the dialog box to select the CD-ROM. Locate each
of th e following .NAP files on the CD-ROM and click Open to place it in
the software repository.
After you have placed the Installer and the VirusScan TC prog ram file s in the
repository, they appear in two places on the ePolicy Orchestrator console (see
Figure 2-3 on p age 17):
•In the upper portion of the details pane.
•In the console tree under Software.
16McAfee VirusScan TC
Figure 2-2. Select a Software Package dialog box
•LWI100.NAPInstaller
•VTC600.NAPVirusScan TC
Deploying and Installing VirusScan TC
Figure 2-3. ePolicy Orchestrator Console
displaying the contents of the Software Repository
4. Copy Installer and program files to the network
In order for the I nstaller to f ind th e files needed for downloading, you must
firstcopy those filesfrom the CD-ROMtoa place on the networkthat alltarget
computers can access. This can be either an FTP site or a shared folder on the
network.
The files include two MSI (Microsoft Installer) files: on e for Windows NT
environments and one for Windows 95 and Windows 98 environments; and
an MCS file, the VirusScan TC program file.
Follow these steps to copy the installation files from the CD-ROM:
1. On the CD-ROM, locate these files:
•INSTMSIW.EXEfor Windows NT
•INSTMSI.EXEfor Windows 95 an d Windows 98
•VSCANTC.MCSVirusScan program file
Administrator’s Guide17
Deploying and Installing VirusScan TC
2. Copy the appropriateMSI file or files for your Windows environmentto
either an FTP site or to a shared folder on the network.
•Ifyournetworkincludes bothtypes ofWindowsenvironment,copy
both MSI files.
•If you are operating in an exclusively Windows 2000 environment,
you do not need to copy either of the MSI files.
•If you are copying to a shared folder, you must use Universal
Naming Convention (UNC) to target it.
æ
3. Copy the file named VSCANTC.MCS to either an FTP site or shared
folderon the network.Youcanuse the same folderwhereyou copiedthe
MSI installation files, or you can use a different folder.
If you are copying to a shared folder, you must use Universal Naming
Convention (UNC) to target it.
IMPORTANT:OnWindows95and Windows98systems, the
sharemustbeinthesamedomainasthecurrentlylogged-in
user.
¥
NOTE:Although the *.MSIfilesandthe VSCANTC.MCS file canbe
placed in the same location, some administrators may prefer to
place them in different locations to control network traffic.
4. You can create up to eight FTP sites or shared network folders to hold
these files. This enables large networks to provide fail-over pro tection
and control network traffic.
5. Conf igure the VirusScan TC Install er
For installation to take place, the VirusScan TC Installer must be able to find
the executable files that places the Microsoft Installer into the target
computers, and t he install package that contains the VirusScan TC software.
The files that install the Microsoft Installer are named INS TMSI.EXE and
INSTMSIW.EXE. These have been described und er “4. Copy Installer and
program files to the network”. The package that contains the VirusScan TC
softwareis namedVSCANTC.MCS. You must place these files in one or more
locations on your network, and then configure the VirusScan TC installer to
look for them in the locations y ou have selected.
18McAfee VirusScan TC
Deploying and Installing VirusScan TC
Setting policy for the installation files
Follow these steps to set policy for the installation files:
1. Verify that the Policies tab is s elected in the upper portion o f the details
pane,on the rightside of the ePolicy Orchestrator console.
2. If you have not already done so, c lick thenext to Installer forVirusScan TC in t he upper portion o f the details pane.
3. Select Configurations to display the Configurations property pages. By
default, the Install Sites property page appears (see Figure 2-4 .) This is
the property page on which you can designate up to eight locations
where you placed VSCANTC.MCS. When you select the MSI tab, you
can designate up to eight locations where you placed INSTMSI.EXE and
INSTMSIW.EXE. The pro cedures for adding sites is identical for both
Install Sites and MSI Sites property pages.
Figure 2-4. Installer Config urations pages—Install Sites and
MSI property pages
4. Deselect Inherit. The buttons on the right are activated.
Administrator’s Guide19
Deploying and Installing VirusScan TC
¥
NOTE:Disabling the Inheritance feature lets you set new policy for
the installation of the Installer program for the target (group orcomputer) that you have selected in the console tree. During future
installation s to computers in other branches of your network , you
might want to leave t his checkbox selected if you w ant the Site
policies you set now to affect computers that are in subordinate
positions in the console tree. See the ePolicy O rchestrator
documentation for a completediscussion of Inheritance.
5. Click Add to designate a new site for the file. The Site Opt ions property
page opens. By default, FTP Site is sele cted, and the dialog assumes that
login credentials are required (see Figure 2-5.)
¥
NOTE: You can designate a maximum of eight sites, each with a
unique name. The order in which the sites are listed on the Install
Sites and MSI Sites pr operty pages is the order in wh ich the
VirusScan TC installer softw are will look for the file.
20McAfee VirusScan TC
Figure 2-5. Site Options property page
Deploying and Installing VirusScan TC
6. Enter a name for the site that you are defining. This is the name that will
appearin themain Install Sites,o r M SI Sites page, shown in Figure 2-4 on
page 19, and in the installation log. See “Setting po licy for the installation
files” on page 19 for information about the installation log.
7. Verify that Enable Site is selected.
8. Provide the ne cessary infor mation appropriate to the site where the files
are located:
•For an FTP site
a. Enter the name of the FTP server and the directory containing
the file or files. For example, ftp.myserver/install.
b. If, in Step 2 on page 18 you placed one or both MSI file s on a
File Transfer (FTP) site:
– that requires login credentials, enter the User Name and
Passwordinformation required for access to the server.
Regardless of the number of characters in the password,
eight asterisks appear in the password field.
– that accepts anonymous logins, select Use Anonymous
FTP Login. The boxes for login credentials are disabled.
¥
NOTE: You must also perform this step for
VSCANTC.MCS if, in Step 3 on page 18 you placed
that file on an FTP site.
c. Enter the path of the file or files.
d. If your network requires use of a proxy server, selectUse
Proxy Server. Two previously disabled text boxes are now
enabled. Enter the name of the proxy server, and the port it
uses.
æ
IMPORTANT:If you are using proxy software, be certainthat
you have the most current version, includinganyservicepacks
that hav e been released for use w ith the proxy software.
•For a UNC shared folder
a. Select the UNC path option.
b. Using UNC notation,(\\servername\path), enter the path
of the location where youplaced the MSIfiles in Step 2 on page
18. On Windows 95 and W indows 98 systems, the currently
logged-in user must have “read” rights to the shared folder.
Administrator’s Guide21
Deploying and Installing VirusScan TC
¥
c. Fill in the Use r Name and Password boxes. Regardless of the
• Forapathonthelocalcomputer
a. Select the UNC path option.
b. Enter the path of the local folder in the field labeled En ter a
9. When you have finished setting options, click OK. Your changes are
saved for deployment, and you are returned to Install Sites or MSI Sites
property page.
+
WARNING:If you do not click OK, the options that you selected
will be ignored.
NOTE:You must also perform this step for VSCANTC.MCS if,
in Step 3 on page 18, you placed that file on a UNC shared
folder.
number of charactersin the password, eight asterisks appear in
the password field.
local path.
10. Use the buttons on the right side of the interface to modify previously
configuredsites.
•Click Edit to modify the configuration of a site already listed on the
Install Sites page.
•Click Delete to remove a s elected site.
•Click MoveUporMove Downto change the order in which the sites
are listed. In general, the first site on the list should be the nearest
site. The last site on the list should be the most remote site.
11. When you have finished setting Site Options, click OK to save your site
options selections and close the dialog box. You return to the
Configurations property pages.
12. Click Apply to save your selections for Install Sites or MSI Sites.
+
WARNING: If you do not click OK and Apply, the options thatyou
selected are ignored.
22McAfee VirusScan TC
Deploying and Installing VirusScan TC
Setting policy for the Installer’s loggingfeature
This feature of the Installer allows you to configure the way in which the
installer logs activity during installation. You can set the name and location of
the log file, its size, and the level of detail that is reported.
æ
IMPORTANT:When deploying and installing the VirusScan TC
program, the only report that an installation has failed is found in the
local log file on the target machines. Such events are not reported by the
Anti-Virus Informant module.
A failed installation is also reflected by the absence of information on the
Properties tab about the o n-access scanner.
To configure the logging activity feature, follow these steps:
Here,<drive>refersto the clientdiskwhere the VirusScanTC software is
installed .
If you prefer,you can enter a different file name or path.
5. By default, the maximum size for the log file is set to 1,024
can en ter any value between 10
ë
TIP: If the data in the log exceeds the file size you set, the oldest 20
KB and 32,767KB.
KB (1MB).You
percent of the log text is deleted to m a ke room for new information
that is added to the end of the file. If you place no size restriction on
the log file, you run the risk of it consuming all available space on
the drive where it is located.
6. By default, Enable Verboseis selected. If you want the log to report
every step in a procedure, leave it unc hanged. Otherwise, deselect it.
Figure 2-7and Figure 2-8 show samplesof an event recorded in verbose
and non-verbose mode, respectively.
Figure 2-7. Verbose Log
7. When you have finished setting Log Activity options , click Applyto save
your selections for deployment. You ret urn to the Installer
Configurations property pages.
24McAfee VirusScan TC
Figure 2-8. Non-verbose Log
+
WARNING: Ifyoudo not click Apply, the optionsthat you selected
are ign ored.
6. Sele ct reboot options
Using the ePolicy Orchestrator Agent Options page, you can specify the wa y
you want the installer to respond to r ebooting requirement. The options are:
•Prompt user when software installation requires reboot.
and/or
•Automatic reboot with timeout.
See Chapter 5 (The Agent) in the ePolicy Orchestrator Administrator’ s Guide
for information about selecting these options.
7. Set policy for the on-access scanner
You can set policy for the on-accessscannerat any time. Administrator’s may
find it convenient to configure the scanner as part o f the initia l deployment
and installation activity. However, it ca n be done at any time.
Deploying and Installing VirusScan TC
For a complete discussion of configuring the on-access scanner, see “Setting
Policy for On-Access Scanning” starting on page 29.
8. Dep loying the inst allat ion policy
After you have finished making configuration choices for the Install Sites, MSI
Sites, and Log Activity property pages, youare ready to distribute the policies
and install VirusScanTC on the target computers.
¥
NOTE: In most situations, you will want to configure the on-access
scanner before deploying and installingthe VirusScan TC program. For
detailed information about configuring this component, see Chapter 3,
“Setting Policy for On-Access Scanning,” starting on page 29.
You can configure AutoUpdate before you deploy the VirusScan TC
program. However, AutoUpdate cannot run until you have deployed the
VirusScan TC program and it has been installed on the client machines.
For information about configuring this component, see Chapter 4,
“Updating and Mirroring Tasks,” starting on page 49.
Administrator’s Guide25
Deploying and Installing VirusScan TC
To deploy the policy and install VirusScan TC, follow these steps:
1. Select a target in the ePolicyO rchestrator consoletree where you will be
installing the Installer and VirusScan TC program s. The target can be a
group or a single computer (See Figure 2-9 on page 26).
2. Deselect Inherit on the Installation Options page, located in the lower
portion of the details pane. See the NOTE on page 20 for information
about Inheritance.
3. Make sure that E nforce Policies fo r Installer for VirusScan TC v6.0.0for Windows is selected.
4. Select Force Install Installer for VirusScan TC v6.0.0 for Windows.
5. Verify that the Install Package box displays the path of the Installer, or
click Select to locate the package.
NOTE: By default, when you placed the Installer program in the
ePolicy Orchestrator software r epo sitory, its executable file was
automatically placed on the ePolicy Orchestrator server at the
following locati on:
<drive>:\Program Files\McAfee\EPO\Db\Software
\LWI___1000\1.0.0\English\InstallFiles
Deploying and Installing VirusScan TC
6. Click Apply. The policy is r eady for deployment to the computers that
you selected in the console tree in Step 1 on page 26.TheVirusScanTC
program will be transmitted when the ePolicy Orchestrator agent
requests new policies from the server.
+
WARNING: Ifyoudo not click Apply, the optionsthat you selected
are ign ored.
Uninstalling the VirusScan TC program
This chapter does not include instructions for the use of the Force Uninstall
Installer for VirusScan TC v6.0.0 for Windows option. Thisfeature is useful
onlyaftertheprogramhasalreadybeen installed. Briefly,the Force Uninstall
checkbox allowsyou to remove any previously installed versionorcopy of the
Installer software, including VirusScan TC.
An alternative approach to uninstalling the prog ra m involves issuing the
following command at the command line prompt on each client machine:
LWI /script uninstall.LWS
Administrator’s Guide27
Deploying and Installing VirusScan TC
28McAfee VirusScan TC
Loading...
+ 63 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.