manuals.online logo
Brands
  1. Home
  2. •
  3. Brands
  4. •
  5. McAfee
  6. •
  7. Software
  8. •
  9. McAfee VirusScan User manual

McAfee VirusScan User manual

When Only a Command Line Scanner Will Do
McAfee®VirusScan®is trusted by millions of enterprises to
provide effective defense from virus attacks. In most cases,
of course, this means continuous background protection
under various versions of Microsoft®Windows®
.However,
there are occasions when it’s useful to have a command line
scanner at your disposal. Perhaps you need to use a
command line scanner alongside another application—for
example, in tandem with a third-party content filter at the
Internet gateway. Or perhaps you wish to integrate a
command line scanner into your own custom business
application or process. McAfee command line scanners are
perfect for such situations. They combine comprehensive
detection and cleaning with the granular control that you can
get only by using a command line scanner.
Scanning Under DOS and Windows
When SCAN.EXE is run, it checks to see if you’re running
Windows. If you are, it uses the McAfee 32-bit Windows
scan engine. If you’re running DOS, it calls SCANPM.EXE,
which switches the PC into protected mode and scans using
the McAfee 32-bit DOS scan engine. SCANPM.EXE will run
in a Windows environment if it’s launched explicitly from the
command line. However, this isn’t recommended since it is
not optimized for this environment.
Scanning UNIX File Systems
McAfee provides command line scanners for a wide range
of UNIX platforms—AIX, FreeBSD, HP-UX, Linux v2.x kernels,
SCO UNIX, and Solaris (SPARC). Our UNIX scanners provide
more than just search-and-destroy scanning capability for the
growing number of native UNIX viruses. They scan for all
viruses that may be stored on any UNIX systems operating
as file stores for Windows desktops across your enterprise.
Comprehensive Scanning for Today’s Threats
There are now in excess of 85,000 threats, and more than
275 new threats appear each month. Alongside “traditional”
virus threats, there are now e-mail worms, Internet worms,
DDoS (Distributed Denial of Service) attacks, backdoor and
remote access Trojans, and zombies. Many of these threats
combine multiple-attack mechanisms to maximize their
chances of spreading quickly through corporate networks
worldwide. Blended threats, in particular, have had a marked
effect, combining the use of system exploits, formerly
associated with hacking activities, with the spreading
capabilities of viruses and worms. An increasing number of
threats are designed to cash in on vulnerabilities in operating
systems and applications. McAfee command line scanners,
using the superior scanning technology of the McAfee scan
engine, detect all of these threats.
Advance Protection from Tomorrow’s Threats
New threats appear all the time, and many of today’s viruses
and worms travel at Internet speed—they strike fast and
move quickly. So a scanner’s ability to flag new, unknown
threats is more important than ever. McAfee command line
scanners harness the McAfee scan engine’s proactive
detection technologies to isolate new threats.
Heuristic Detection
The McAfee advanced heuristic analysis lets us look through
the code in a file to determine if the actions it takes are
typical of a virus. The more virus-like code that’s found, the
more likely the file is to be infected. To reduce the risk of
false alarms—identifying a virus when there isn’t one—we
combine positive heuristics with negative heuristics to
search for those things that are distinctly non-virus like.
Generic Detection and Cleaning
Generic detection involves using a single virus definition to
detect and clean many variants of the same virus family.
This is especially useful today when a successful threat is
often followed by a host of variants. Of course, all threats
must be detected, but it is much less efficient to build
individual signatures for each one as they appear. Piecemeal
detection isn’t just less efficient—it also means that a new
variant has the opportunity to spread before the scanner is
able to detect it.
McAfee’s generic detection capability, developed over
several years, has brought enormous benefits to McAfee
customers, who have been protected—in advance—from
threats such as Anna Kournikova, Homepage, Badtrans.b,
Fbound.c, Klez.h, W32/Frethem, Bugbear.b, Sobig.e,
W32/Mimail, Lovsan, and many others.
The Hidden Threat
When a file is compressed or archived, the original bytes of
the file are rearranged as part of the space-saving process. If
the file is infected, the bytes belonging to the virus are also
rearranged, and the characteristic string that an anti-virus
scanner looks for may no longer exist. So there could be a
hidden threat lurking within any compressed, archived, or
McAfee Command Line Scanners
and VirusScan for UNIX
www.mcafeesecurity.com
Data Sheet
McAfee System Protection Solutions
Data Sheet Page 2
McAfee Command Line Scanners and VirusScan for UNIX
packed file. McAfee command line scanners are able to drill
down into multiple layers of compression to seek out the
hidden threat within.
The threat isn’t confined just to common archive utilities like
WinZip. Windows applications can be packed to reduce the
size of the program. Such packers may be used legitimately,
so they can’t all simply be branded as a potential threat.
However, many of today’s Trojans arrive in packed format, so
McAfee command line scanner’s ability to identify hostile
code within the packing is essential.
Maintain Business Continuity
The McAfee command line scanners make full use of the
scan engine’s ability to clean infected files. This is very
important. If a scanner simply flags an infection, the system
administrator must replace the file—either from an original
master disk or CD (in the case of EXE files) or from a backup
(for documents and spreadsheets)—if a backup even exists.
If the scanner is able to clean the infected file, business
continuity is maintained, downtime is minimized, and costs
are reduced.
Key Features
•32-bit command line scanner for Windows environments
•32-bit command line scanners for a range of UNIX
environments—AIX, FreeBSD, HP-UX, Linux v2.x kernels,
SCO UNIX, and Solaris (SPARC)
•Comprehensive detection for today’s and tomorrow’s
threats
•Detects viruses, e-mail worms, Internet worms, DDoS
attacks, backdoor and remote access Trojans, and
zombies
• Uses heuristic analysis to flag new threats, without a
false-alarm problem
•Includes generic detection and cleaning for new variants
of existing threats
•Scans compressed, archived, and packed files
•Maintains business continuity by cleaning infected files
System Requirements
VirusScan Command Line
An IBM-compatible PC with an Intel 80386 processor
or equivalent. VirusScan Command Line supports the
following platforms:
•SCANPM.EXE
•MS-DOS 6.22
•SCAN.EXE
•MS-DOS 6.22 (requires SCANPM.EXE)
•Windows 9x
•Windows ME
•Windows NT 3.51
•Windows NT 4
•Windows 2000
•Windows XP
•Minimum 4MB of free hard-drive space
•Minimum 4MB of RAM
VirusScan for UNIX
VirusScan for UNIX supports the following platforms:
•IBM AIX 4.2.1, 4.3.x, and 5.0L, with all
recommended patches installed
•FreeBSD 3.2 and 4.3
•Hewlett-Packard HP-UX 10.20, 10.30, 11.x, and 11.I,
with all recommended patches installed
•Linux v2.x kernels up to, and including, v2.4 kernels
with libc6 (glibc) and the stdc++ library v2.8*
•Santa Cruz Operation (SCO) OpenServer Release 5
and SCO UnixWare 7.1.1**
•Sun Microsystems Solaris for SPARC architecture
v2.5.1, 2.6, 7, and 8, with all recommended patches
•Minimum 10MB of free hard-drive space
McAfee recommends that you have root-account permissions
to install VirusScan for UNIX software and perform on-demand
scan operations on your file system.
* McAfee does not recommend the use of VirusScan for UNIX in conjunction with any Linux development kernel (v2.1.x and 2.3.x). These kernels are built for testing purposes only and
are not supplied with any major Linux distribution.
** The use of VirusScan for UNIX with SCO OpenServer requires installation of the SCO UnixWare Binary Compatibility Module (BCM).
McAfee Security 3965 Freedom Circle, Santa Clara, CA 95054, 888.VIRUSNO (888.847.8766), www.mcafeesecurity.com
Network Associates®products denote years of experience and commitment to customer satisfaction. The PrimeSupport®team of
responsive, highly skilled support technicians provides tailored solutions, delivering detailed technical assistance in managing the success
of mission critical projects—all with service levels to meet the needs of every customer organization. McAfee®Research, a world leader
in information systems and security, continues to spearhead innovation in the development and refinement of all our technologies.
Network Associates, McAfee, VirusScan, and PrimeSupport are registered trademarks or trademarks of Network Associates, Inc.
and/or its affiliates in the US and/or other countries. Sniffer®brand products are made only by Network Associates, Inc. All other
registered and unregistered trademarks herein are the sole property of their respective owners. ©2004 Networks Associates
Technology, Inc. All Rights Reserved.1-sps-cls-001-0104

This manual suits for next models

2

Other McAfee Software manuals

McAfee DR SOLOMON S ANTI-VIRUS 8.5 Service manual

McAfee

McAfee DR SOLOMON S ANTI-VIRUS 8.5 Service manual

McAfee UNINSTALLER 6.0 User manual

McAfee

McAfee UNINSTALLER 6.0 User manual

McAfee SAV85E - Active VirusScan - PC Owner's manual

McAfee

McAfee SAV85E - Active VirusScan - PC Owner's manual

McAfee MTP08EMB3RUA - Total Protection - PC User manual

McAfee

McAfee MTP08EMB3RUA - Total Protection - PC User manual

McAfee VIRUSSCAN 4.5 - Service manual

McAfee

McAfee VIRUSSCAN 4.5 - Service manual

McAfee VIRUSSCAN ENTERPRISE 8.7I PATCH 1 - S... Instruction Manual

McAfee

McAfee VIRUSSCAN ENTERPRISE 8.7I PATCH 1 - S... Instruction Manual

McAfee AGENT 4.0 PATCH 2 - FOR WINDOWS S 10-03-2009 Instruction Manual

McAfee

McAfee AGENT 4.0 PATCH 2 - FOR WINDOWS S 10-03-2009 Instruction Manual

McAfee VSF09EMB1RAA - VirusScan Plus 2009 User manual

McAfee

McAfee VSF09EMB1RAA - VirusScan Plus 2009 User manual

McAfee VIRUSSCAN 8.7I User manual

McAfee

McAfee VIRUSSCAN 8.7I User manual

McAfee EPOCDE-AA-BA - ePolicy Orchestrator - PC User manual

McAfee

McAfee EPOCDE-AA-BA - ePolicy Orchestrator - PC User manual

McAfee PSMCDE-AB-AA - PortalShield For Microsoft SharePoint Server External Connection... User manual

McAfee

McAfee PSMCDE-AB-AA - PortalShield For Microsoft SharePoint Server External Connection... User manual

McAfee TSA00M005PAA - Total Protection Service User manual

McAfee

McAfee TSA00M005PAA - Total Protection Service User manual

McAfee OFFICE 3.1 User manual

McAfee

McAfee OFFICE 3.1 User manual

McAfee ENDPOINT ENCRYPTION ENTERPRISE - BEST PRACTICES... User manual

McAfee

McAfee ENDPOINT ENCRYPTION ENTERPRISE - BEST PRACTICES... User manual

McAfee VIRUSSCAN 5.1 Service manual

McAfee

McAfee VIRUSSCAN 5.1 Service manual

McAfee INTERNET SECURITY 2009 User manual

McAfee

McAfee INTERNET SECURITY 2009 User manual

McAfee VPF40E001RAA - VirusScan 2005 - PC User manual

McAfee

McAfee VPF40E001RAA - VirusScan 2005 - PC User manual

McAfee TOTAL PROTECTION 2009 User manual

McAfee

McAfee TOTAL PROTECTION 2009 User manual

McAfee DFFCDE-AA-DA - Endpoint Encryption For Files User manual

McAfee

McAfee DFFCDE-AA-DA - Endpoint Encryption For Files User manual

McAfee NAPCKE-AB-AA - VirusScan For NetApp User manual

McAfee

McAfee NAPCKE-AB-AA - VirusScan For NetApp User manual

McAfee WEBSHIELD SMTP User manual

McAfee

McAfee WEBSHIELD SMTP User manual

McAfee EPOLICY ORCHESTRATOR 4.0 - LOG FILES FOR User manual

McAfee

McAfee EPOLICY ORCHESTRATOR 4.0 - LOG FILES FOR User manual

McAfee MIS80E001RAI - Internet Security Suite 2006 User manual

McAfee

McAfee MIS80E001RAI - Internet Security Suite 2006 User manual

McAfee Agent 4.0 Instruction Manual

McAfee

McAfee Agent 4.0 Instruction Manual

Popular Software manuals by other brands

LEI Extras MapCreate Canada 6.3 Addendum

LEI Extras

LEI Extras MapCreate Canada 6.3 Addendum

Yamaha mLAN Driver owner's manual

Yamaha

Yamaha mLAN Driver owner's manual

SonicWALL OS 2.x quick start guide

SonicWALL

SonicWALL OS 2.x quick start guide

Sanyo VPC-AZ3 instruction manual

Sanyo

Sanyo VPC-AZ3 instruction manual

Panasonic Workio DP-2310 operating instructions

Panasonic

Panasonic Workio DP-2310 operating instructions

LaCie 131018 - StorView Snapshot - Mac user manual

LaCie

LaCie 131018 - StorView Snapshot - Mac user manual

Sigma PHOTO PRO 4.2 - FOR WINDOWS manual

Sigma

Sigma PHOTO PRO 4.2 - FOR WINDOWS manual

Aiphone CommunCenter Operation manual

Aiphone

Aiphone CommunCenter Operation manual

Avision FS-5900C user guide

Avision

Avision FS-5900C user guide

Sharp PN-L702B Operation manual

Sharp

Sharp PN-L702B Operation manual

KAPERSKY MAIL GATEWAY 5.5 - Administrator's guide

KAPERSKY

KAPERSKY MAIL GATEWAY 5.5 - Administrator's guide

Autodesk 23802-091408-9020 - PSG Dwf Composer 2 Tips and tricks

Autodesk

Autodesk 23802-091408-9020 - PSG Dwf Composer 2 Tips and tricks

Whistler GPS100 user manual

Whistler

Whistler GPS100 user manual

AVG ANTI-VIRUS 2011 - REV 2011.11 user manual

AVG

AVG ANTI-VIRUS 2011 - REV 2011.11 user manual

PRESONUS MEGASTUDIO PRODUCER VIDEO SOFTWARE datasheet

PRESONUS

PRESONUS MEGASTUDIO PRODUCER VIDEO SOFTWARE datasheet

KAPERSKY ANTI-VIRUS 5.0 - FOR LOTUS NOTES-DOMINO user guide

KAPERSKY

KAPERSKY ANTI-VIRUS 5.0 - FOR LOTUS NOTES-DOMINO user guide

Omron SENSOR SUPPORT SOFTWARE S3 Operation manual

Omron

Omron SENSOR SUPPORT SOFTWARE S3 Operation manual

Adobe FLEX 2 - CREATING AND EXTENDING  COMPONENTS manual

Adobe

Adobe FLEX 2 - CREATING AND EXTENDING COMPONENTS manual

manuals.online logo
manuals.online logoBrands
  • About & Mission
  • Contact us
  • Privacy Policy
  • Terms and Conditions

Copyright 2025 Manuals.Online. All Rights Reserved.