McAfee VirusScan® Command Line Scanner 1yr Gold Support VCLYFM-AA-AA データシート

製品コード
VCLYFM-AA-AA
ページ / 2
McAfee Command Line Scanners and VirusScan for UNIX
DATA SHEET
networkassociates.com
N E T W O R K   A S S O C I AT E S
When Only a Command Line Scanner Will Do
McAfee
®
VirusScan
®
is trusted by millions of enterprises to
provide effective defense from virus attack. In most cases,
of course, this means continuous background protection
under various versions of Microsoft Windows. However,
there are occasions when it’s useful to have a command line
scanner at your disposal. Perhaps you need to use a com-
mand line scanner alongside another application—for
example, in tandem with a third party content filter at the
Internet gateway. Or perhaps you wish to integrate a com-
mand line scanner into your own custom business applica-
tion or process. McAfee’s VirusScan command line scanners
are  perfect for such situations. They combine comprehen-
sive detection and cleaning with the granular control that
you can only get by using a command line scanner.
Scanning under DOS and Windows
When SCAN.EXE is run, it checks to see if you’re running
Windows. If you are, it uses McAfee’s 32-bit Windows scan
engine. If you’re running DOS, it calls SCANPM.EXE, which
switches the PC into protected mode and scans using
McAfee’s 32-bit DOS scan engine. SCANPM.EXE will run in
a Windows environment if it’s launched explicitly from the
command line. However, this isn’t recommended since it is
not optimized for this environment.
Scanning UNIX File Systems
McAfee provides command line scanners for a wide range
of UNIX platforms—AIX, FreeBSD, HP-UX, Linux v2.x kernels,
SCO UNIX, and Solaris (SPARC). Our UNIX scanners provide
more than just “search and destroy” scanning capability for
the growing number of native UNIX viruses. They scan for all
viruses that may be stored on any UNIX systems operating
as a file-store for Windows desktops across your enterprise.
Comprehensive Scanning for Today’s Threats
Today there are more than 60,000 threats and alongside
“traditional” viruses there are now mass-mailers, Internet
worms, DDoS (distributed denial-of-service) attacks, and
backdoor Trojans and zombies. McAfee’s command line
scanners, using the superior scanning technology built into
the McAfee scan engine, detect all of these threats.
Proactive Security for Tomorrow
New threats appear all the time and many of today’s viruses
and worms travel at “Internet-speed”—they strike fast and
move quickly! So a scanner’s ability to flag new, unknown
threats is more important than ever. McAfee’s command line
scanners harness the McAfee scan engine’s proactive detec-
tion technologies to isolate new threats.
Heuristic Detection 
McAfee’s advanced heuristic analysis lets us look through the
code in a file to determine if the actions it takes are typical of
a virus. The more “virus-like” code that’s found, the more
likely it is to be infected. To reduce the risk of false alarms—
identifying a virus when there isn’t one—this “positive”
heuristics approach is combined with “negative” heuristics—
a search for those things that are distinctly non virus-like.
Generic Detection and Cleaning 
Generic detection involves using a single virus definition to
detect and clean many variants of the same virus family. This
is especially useful today, when a “successful” threat is often
followed by a host of variants. Of course, they must all be
detected, but it is a lot less efficient to build individual signa-
tures for each one as they appear. Piecemeal detection is
not just less efficient. It also means that a new variant has the
opportunity to spread before the scanner is able to detect it.
McAfee’s generic detection capability, developed over
several years, has brought enormous benefits to McAfee
customers, who have been protected—in advance—from
threats such as AnnaKournikova, Homepage, Badtrans.b,
Fbound.c, Klez.h, and many others.
The Hidden Threat
When a file is compressed or archived, the original bytes of
the file are re-arranged as part of the space-saving process.
If the file is infected, the bytes belonging to the virus are
also re-arranged and the characteristic “string” that an anti-
virus scanner looks for may no longer exist. So there could
be a hidden threat lurking within any compressed, archived
or packed file. McAfee’s command line scanners are able to
drill-down into multiple layers of compression, to seek out
the hidden threat within.
Y O U R   N E T W O R K. O U R   B U S I N E S S.