McAfee VirusScan Enterprise for SAP

McAfee VirusScan Enterprise for SAP

Proven security for mission-critical SAP environments

Next Steps:


McAfee VirusScan Enterprise for SAP continuously secures mission-critical SAP NetWeaver environments against potential security threats. It also stops zero-day threats and speeds the time to resolution when vulnerabilities are discovered. And it provides comprehensive management reporting, updates, and auditing capabilities, all in one package. McAfee is an SAP-certified integration partner.

VirusScan Enterprise for SAP offers:

Continuous, comprehensive coverage — Scan, quarantine, and remediate sensitive documents, configuration files, and templates before they reach your SAP environment.

Simplified security management — Manage agents, policies, and reports for your SAP environment and all your McAfee products from the McAfee ePolicy Orchestrator (ePO) platform, the centralized security management console.

Flexible deployment — Use as a standalone server or as a virtual machine.

Proven protection — Count on McAfee’s anti-malware expertise, trusted by more than 50 million enterprise users worldwide, and the 24/7 anti-threat vigilance of McAfee Labs.

Features & Benefits

Secure your mission-critical SAP environment

Block malware, scan external files, quarantine infected files, and stop zero-day threats before they reach your SAP NetWeaver environment.

Save time with automatic updates

Count on automatic, real-time updates from McAfee Labs to ensure the most current protections are always in place.

Save money by leveraging existing investments

Extend your investment in enterprise security management by adding VirusScan Enterprise for SAP to your McAfee ePolicy Orchestrator (ePO) infrastructure. No additional training is required for IT staff who already use the ePO platform.

Save trouble with simplified, centralized management

Use the ePO platform as the hub of your security risk management solutions, so you can reduce the risk of rogue, noncompliant systems; keep protection up to date; configure and enforce protection policies; and monitor security status 24/7 from one centralized, web-based console.

System Requirements

Supported SAP Software

These are minimum system requirements. Actual requirements will vary depending on the nature of your environment.

  • SAP NetWeaver 2004 (SAP_BASIS 640) ABAP Stack Service Pack 11 (SP11) or higher
  • SAP NetWeaver 2004 (SAP_BASIS 640) J2EE Stack SP13 or higher
  • SAP NetWeaver 7.0 SP15 or higher
  • SAP NetWeaver 7.0 / 2004s ABAP (SAP_BASIS 7.00) or later
  • SAP NetWeaver 7.0 / 2004s J2EE (SAP_BASIS 7.00) or later


  • Intel Pentium 4 processor (recommended) running at 2 GHz

Operating Systems

  • Windows Server 2008 Enterprise x86
  • Windows Server 2008 Enterprise x64
  • Windows Server 2008 x86
  • Windows Server 2008 x64
  • Windows Server 2003 Standard with SP1 or SP2
  • Windows Server 2003 Enterprise with SP1 or SP2
  • Windows Server 2003 Standard x64 with SP1 or SP2
  • Windows Server 2003 Enterprise x64 with SP1 or SP2


  • Microsoft Internet Explorer 6 or higher

Windows Installer

  • Microsoft Windows Installer (MSI) 2 or higher


  • 1 GB RAM

Disk Space

  • 100 MB

McAfee Requirements

  • VirusScan 8.7i; see product documentation for installation and configuration requirements
  • ePolicy Orchestrator version 4.0 or higher for management and reporting


Data Sheets

McAfee VirusScan Enterprise for SAP

For a technical summary on the McAfee product listed above, please view the product data sheet.



  • Meet ‘Tox': Ransomware for the Rest of Us
    Jim Walter - May 23, 2015

    The packaging of malware and malware-construction kits for cybercrime “consumers” has been a long-running trend. Various turnkey kits that cover remote access plus botnet plus stealth functions are available just about anywhere. Ransomware, though very prevalent, has not yet appeared in force in easy-to-deploy kits. But now we have Tox–and it’s free.       […]

    The post Meet ‘Tox': Ransomware for the Rest of Us appeared first on McAfee.

  • Understanding the Scope of Venom (CVE-2015-3456)
    Jim Walter - May 19, 2015

    In recent days, much has been said and written around the recently disclosed “Venom” vulnerability. It is important to fully understand the real-world severity of vulnerabilities such as Venom. Although the threat is potentially severe and certainly interesting (it is in a class of relatively rare guest escapes from virtual machines), one has to take into […]

    The post Understanding the Scope of Venom (CVE-2015-3456) appeared first on McAfee.

  • Enhanced Certificate Security – Pinning
    McAfee Foundstone Professional Services - May 18, 2015

    Written by Deepak Choudhary There are always risks involved when relying on a third party to send and receive sensitive data over secure network channels. While we recognize the roles of the Public Key Infrastructure (PKI) and third party certificate authority (CA), we also believe that Certificate SSL Pinning can play a key role in […]

    The post Enhanced Certificate Security – Pinning appeared first on McAfee.

  • Defending Against Ransomware with McAfee Threat Intelligence Exchange
    Dan Larson - April 30, 2015

    In a blog last week, I discussed CryptoLocker, a particularly nefarious family of ransomware, and how to defend against it. I thought it would be worthwhile to demonstrate how McAfee Threat Intelligence Exchange can detect and stop malware like ransomware, even if the suspicious file has not been flagged as malware by antivirus signatures. Click […]

    The post Defending Against Ransomware with McAfee Threat Intelligence Exchange appeared first on McAfee.

  • Advice for Unfastening CryptoLocker Ransomware
    Dan Larson - April 22, 2015

    In the McAfee Labs Threats Report: November 2014, Intel Security predicted nine major threats that would occur in 2015. Regarding ransomware, we said this: “Ransomware will evolve its methods of propagation, encryption, and the targets it seeks.” Almost immediately, we began to see a huge rise in ransomware, especially with the family CTB-Locker, followed by […]

    The post Advice for Unfastening CryptoLocker Ransomware appeared first on McAfee.

Threats and Risks