Managing Detections; Viewing Scan Results On Client Computers - McAfee TSA00M005PAA - Total Protection Service Product Manual

Processor guide
Hide thumbs Also See for TSA00M005PAA - Total Protection Service:
Table of Contents

Advertisement

Using Virus and Spyware Protection

Managing detections

Managing detections
• Use these tasks to view and manage threats detected during virus and spyware scans.
• For an individual client computer, perform tasks at the computer (users and administrators).
• For multiple computers, groups, or an entire account, access administrative reports from
the SecurityCenter.
Tasks

Viewing scan results on client computers

Managing potentially unwanted programs on client computers
Viewing quarantined files on client computers
Viewing user-approved programs and applications
Viewing threats detected on the account
Viewing unrecognized programs detected on the account
Viewing scan results on client computers
Users and administrators can use this task from a client computer to view the Scan Statistics
report on a client computer after completing an on-demand scan.
NOTE:
Client computers also send information about threats detected during scans to the
SecurityCenter in encrypted XML files. Administrators can access three reports containing
information about detected virus and spyware threats and potentially unwanted programs
from the Reports page on the SecurityCenter.
Before you begin
Run an on-demand scan.
Task
• Select View detailed report in the Scan Completed panel. A browser window opens and
displays the Scan Statistics report, which includes this information:
• Date and time the scan was started.
• Elapsed time for the scan.
• Version of the scanning engine software and DAT file.
• Date of the last update.
• Completion status of the scan.
• Location of the scanned items.
• Status for scanned files, registry keys, and cookies.
Status
Scanned
Detected
Cleaned
Deleted
McAfee Total Protection Service Product Guide
What it means...
Number of items scanned.
The item is still a threat and still resides on the system. For files, they are most
likely contained within a compressed archive (for example, a .ZIP archive) or on
write-protected media. For registry keys and cookies, the file they are associated
with has a status of Detected.
The item was cleaned of the threat. A backup copy of the original item was
saved in a quarantine folder, in a proprietary binary format, where it can be
accessed only with the Quarantine Viewer.
The item could not be cleaned; it was deleted instead. A copy was saved in a
quarantine folder, in a proprietary binary format, where it can be accessed only
with the Quarantine Viewer.
73

Advertisement

Table of Contents
loading

Table of Contents