User’s Guide 41
McAfee VirusScan
NOTE:Because the VS hie ld scanne r runs co ntinuously, you shou ld
not insta ll or ru n m ore than one V Shield scanner on the same
work station. Do ing so ca n c ause the scanners to interfere with each
others' operations.
Why use the VShield scanner?
The VShield scanner has unique capabilities that make it a n inte gral part of the
VirusScan comprehensive anti-virus software security package. These
capabili ties in clude:
• On-access scanning. This mean s that the scanner looks for v irus e s in file s
that you open, copy, save, or otherwise modify, and files that you read
from or write to floppy disks and network dr ives. It theref ore can de tect
and s top v iruses as soon as they appear on your s ystem, including those
that arrive via e-mail or as downloads from the Internet. This means you
can make the VShield s c anner bo t h your first line of anti-virus defense, and
your backstop protection in between each scan operation that you perform.
The VShield scanner detects viruses in memory an d as they attempt to
execute from within infected files.
• M alicious object detection a nd blocking. The VS hiel d scanne r can b lock
harmful ActiveX and Java objects from gaining access to your system,
before they po se a threat. The scanner d oes this by scanning the hundreds
ofobjects you downloadasyouconnectto thewebor to otherInternet sites,
and the file attachments you receive with your e-mail . It compares these
itemsagainstacurrentlistofharmfulobjectsthatitmaintains,andblocks
those that could cause problems.
• Internet site filtering. Th e VShield sca nne r come s with a list o f dangero us
web- or Intern et sites that pose a hazard to your system, usuallyi n the form
of downloadable malicious software. You can add any other site that you
wantto keep your browsersoftware fromconnectingto,either by listing its
Internet P rotocol (IP) address or its d omain name.
• Automatic ope ration. Th e VShield scanner integ rates with a range of
browser softw are and e- ma il client applications. This allows the s ca nner to
log on to and scan your e-mail attachments for viruses before th ey ever
reach your computer.