McAfee AVM85M - VirusScan For Mac User Manual page 61

User guide
Table of Contents

Advertisement

®
VirusScan
8.6 for Mac User Guide
Extra DAT files
Firewall
FTP
Global Administrator
group
HTTP
immediate event
forwarding
inactive agent
inherit, inheritance
Joke program
Log/log file
Lost&Found group
Macro
McAfee Virus
Information Library
On-Access scanner
Supplemental virus definition file that is created in response to an outbreak
of a new virus or a new variant of an existing virus.
A program that acts as a filter between your computer and the network or
Internet. It can scan all traffic arriving at your computer (incoming traffic) and
all traffic sent by your computer (outgoing traffic). It scans traffic at the packet
level, and either blocks it or allows it, based on rules that you set up.
File Transfer Protocol. It is a common way to move files between two Internet
sites.
A user account with read, write, and delete permissions, and rights to all
operations. Operations that affect the entire installation are reserved for use
only by global administrator user accounts.
In the console tree, a logical collection of entities assembled for ease of
management. Groups can contain other groups or computers, and can be
assigned IP address ranges or IP subnet masks to allow the sorting of
computers by IP address. If you create a group by importing a Windows NT
domain, you can automatically send the agent installation package to all
imported computers in the domain.
HyperText Transfer Protocol. It is a protocol for moving files across the
Internet. It requires an HTTP client program on one end and an HTTP server
program on the other.
The act of immediately sending events of a specific severity or higher to the
ePolicy Orchestrator server once a predefined number of events are available.
This communication is done outside of other agent-server communication.
Any agent that has not communicated with the ePolicy Orchestrator server
within a specified time period.
The act of applying the settings defined for an item within a hierarchy from
the item above it.
A non-replicating program that may alarm or annoy users, but contains no
malware and does not do any actual harm to files or data.
A record of the activities of a component of McAfee anti-virus software. Log
files record the actions taken during an installation, or during scanning, or
updating tasks.
A group used to temporarily store computers whose appropriate location in
the Directory cannot be determined.
In some programs, like word-processing programs, a macro is a saved
sequence of commands that can be stored and then recalled with a single
command or keyboard stroke.
The Virus Information Library (
has detailed information about the origins of viruses, how they infect your
computer, and how to remove them. The site also contains information on
hoaxes.
The On-Access scanner continuously monitors all files in use to determine if
a virus or other potentially unwanted malware is present. It takes place
whenever a file is read from the disk, and/or written to the disk. Multiple
directories and volumes can be scanned.
61
http://vil.nai.com/vil/default.aspx
Glossary
)

Advertisement

Table of Contents
loading

This manual is also suitable for:

Virusscan for mac 8.6

Table of Contents