McAfee VirusScan Enterprise

McAfee VirusScan Enterprise

The ultimate way to keep viruses out of your Microsoft Windows operating systems

Next Steps:

Overview

McAfee VirusScan Enterprise combines anti-virus, anti-spyware, firewall, and intrusion prevention technologies to stop and remove malicious software. It also extends coverage to new security risks and reduces the cost of responding to outbreaks with the industry’s lowest impact on system performance.

With VirusScan Enterprise, you get:

Maximum defense against malware — Safeguards your systems and files from viruses, spyware, worms, Trojans, and other security risks. It detects and cleans malware, and allows you to easily configure policies to manage quarantined items.

Proactive protection from attacks — Real-time scanning ensures all your systems, including remote locations, are protected from current and emerging threats. VirusScan Enterprise also guards against buffer-overflow exploits that target vulnerabilities in Microsoft applications.

Easy, centralized management — The McAfee ePolicy Orchestrator (ePO) platform is the centralized management console for deploying policies, managing security alerts, and viewing automated reports.

Enhanced security powered by McAfee Global Threat Intelligence — McAfee Global Threat Intelligence (GTI) is a comprehensive cloud-based threat intelligence service. Already integrated into McAfee security products, it works in real time, 24 hours a day, to protect customers against cyberthreats across all vectors — file, web, message, and network. McAfee GTI offers the broadest threat data, most robust data correlation, and most complete product integration in the industry. McAfee’s GTI network allows enabled products to evaluate threats on multiple vectors in real time, leading to faster identification of threats and higher capture rates. VirusScan Enterprise uses the McAfee GTI file reputation service to identify suspicious files before they are necessarily identified as carrying malicious payloads.

Features & Benefits

Block multiple threats

Defend your systems against viruses, worms, spyware, bots, Trojans, buffer overflows, and blended attacks. Block a broad range of viruses and malicious code — even those hidden in compressed files — with combined anti-virus, firewall, and intrusion prevention technology. McAfee’s industry-leading security also safeguards against spam, phishing attacks, malicious websites, and other threats that often evade standard anti-virus and URL filtering systems.

Stop malware in real time

Close the protection gap with McAfee Global Threat Intelligence (GTI). GTI offers comprehensive, real-time protection against both known and emerging threats across all key threat vectors — file, web, email, and network. A cloud-based service using reputation-based threat protection in addition to other techniques, McAfee GTI correlates real-world data collected from millions of sensors globally and delivers intelligence via a complete suite of McAfee security products.

Safeguard email programs

Detect and clean viruses in Microsoft Outlook and Lotus Notes, including HTML text and attachments.

Get high-performance security

Don’t let your anti-malware software slow down end users. VirusScan Enterprise scans faster, uses less memory, requires fewer CPU cycles, and protects users better than any other anti-malware product on the market.

Lessen damage from outbreaks

Limit the risk and impact of an outbreak if one occurs. Close ports, monitor applications and email engines, and block files and directories, even before .DAT files are issued.

Increase security confidence

Defend your desktops, laptops, and file servers against disruptions. Malware and hackers cannot disable McAfee VirusScan Enterprise.

Defend against threats that target Microsoft applications

Guard against buffer-overflow exploits that aim at vulnerabilities in Microsoft Windows operating system services, Microsoft Word, Microsoft Excel, Microsoft Internet Explorer, Microsoft Outlook, and Microsoft SQL Server. It also protects IIS services, WinZip, and Microsoft PowerPoint, Microsoft Office Access, Microsoft Office Visio, Microsoft Windows Media Player, and Microsoft Messenger.

Save money with efficient visibility and management

Control and manage VirusScan Enterprise from one central McAfee ePolicy Orchestrator (ePO) console, and get detailed enterprise-level reporting quickly and easily.

System Requirements

These are minimum system requirements. Actual requirements will vary depending on the nature of your environment. 64-bit operating system support is available for some technologies.

  • Workstations
    • Windows 8 Patch 1 (8.1) Update 1
    • Windows 8 Patch 1 (8.1)
    • Windows 8 (Win NT 6.2) Editions: Basic / Pro / Enterprise
    • Windows 7 (Home Premium / Professional / Ultimate / Enterprise)
    • Windows Vista
    • Windows XP Home, Professional, Embedded (WEPOS), Tablet PC
    • Windows Embedded for Point of Service (WEPOS)
    • Windows XP Embedded (SP2)
    • Windows XP Tablet PC Edition (SP2)
    • McAfee will continue to support current versions of enterprise endpoint products on Windows XP SP3 beyond April 8, 2014 for a limited time, as long as it is technically and commercially reasonable for McAfee to do so, and there is no external dependency. For example, if a McAfee product requires Microsoft to provide a fix and Microsoft does not provide the fix, then McAfee cannot support the product any longer.
  • Servers
    • Windows Sever 2012 (Win NT 6.2) Editions: Datacenter / Essentials / Foundation / Standard
    • Windows Server 2012 Release 2 (R2) Update 1
    • Windows Server 2012 R2
    • Windows Small Business Server 2011
    • Windows Embedded Standard 2009
    • Windows Server 2008, HyperV, Core, Datacenter, Storage Server, Cluster Server, Small Business Server
    • Windows Server 2003, Storage Server, Cluster Server, Datacenter, Small Business Server
    • VMware ESX, ESXi
    • Citrix XenDesktop and XenServer

Demos / Tutorials

Tutorials

For guidance on how to use this McAfee product, watch the Quick Tips video listed above.

Customer Stories

Brelje & Race Consulting Engineers

This small business centralizes antivirus security management with McAfee ePolicy Orchestrator, saving time for the company's security administrator.

Highlights
  • IT manager’s time spent configuring and updating individual workstations cut by 90%
  • Centralized management ensures that all workstations are up to date with latest protection
  • Protection running in the background without intruding on employees’ work
  • Comprehensive and centrallymanaged solution for same price as many standalone antivirus products

City of Chicago

Chicago protects its critical infrastructure with an integrated solution from McAfee, combining SIEM, endpoint, and network security.

Highlights
  • Maximized staff resources.
  • Malware incidents reduced by 2,000%.
  • Centralized management and analysis.
  • Integrated security event logging that captures events throughout the environment.

Cognizant

Cognizant centralizes its security environment with a single-vendor solution from McAfee that unifies endpoint security and provides better security visibility across the organization.

Highlights
  • Easily demonstrated compliance with complex government regulations and client requirements
  • Centralized view into entire security environment eases deployment, reporting and management
  • Maximum confidence and trust from key stakeholders

CSS Corp

CSS Corp., a long-time endpoint security customer, added network IPS and centralized management to further reduce security threats and improve network performance.

Highlights
  • Provided centralized management, control, and reporting on overall functioning of security environment
  • Ensured compliance with ISO277001 and PCI DSS
  • Contributed to network availability to meet SLAs
  • Maintained comprehensive protection from external and internal security threats

CSTISA

This Dominican Republic-based reseller of IT services relies on a portfolio of on-premises and cloud-based McAfee endpoint and data protection solutions to serve its base of SMB customers.

Highlights
  • Supports year-over-year scalability and business continuity
  • Helps build trust as an IT security advisor to customers
  • Provides expert service to customers, from sales and installation through ongoing support
  • Allows expansion into new markets, such as cloud security services

GAD eG

This provider of banking IT services centralizes security management and improves security throughout its endpoints, including ATMs and point-of service systems in branches.

Honeywell

With a dedicated McAfee resident support account manager, Honeywell gets onsite troubleshooting, faster problem resolution, and fewer escalations to McAfee Support.

IRCEP

This Mexican government agency protects endpoints and secures critical data with a range of McAfee solutions.

Large Retail Chain

This global membership-style retailer secures virtual business infrastructure from sophisticated threats with McAfee MOVE AntiVirus.

Awards / Reviews

Malware Threat Detection Effectiveness
See our latest malware detection results from third-party testing lab AV-Test.

Resources

Data Sheets

McAfee VirusScan Enterprise

For a technical summary on the McAfee product listed above, please view the product data sheet.

Community

Blogs

  • Advice for Unfastening CryptoLocker Ransomware
    Dan Larson - April 22, 2015

    In the McAfee Labs Threats Report: November 2014, Intel Security predicted nine major threats that would occur in 2015. Regarding ransomware, we said this: “Ransomware will evolve its methods of propagation, encryption, and the targets it seeks.” Almost immediately, we began to see a huge rise in ransomware, especially with the family CTB-Locker, followed by […]

    The post Advice for Unfastening CryptoLocker Ransomware appeared first on McAfee.

  • Building Secure Castles in the Cloud
    PageOne Pr - April 21, 2015

    You, along with the vast majority of companies, use public cloud servers for something. Whether they are your primary service infrastructure, overflow capacity, or emergency backup, this Infrastructure as a Service (IaaS) is delivering on the promises of reduced costs, greater agility, and enhanced scalability. But there are still questions about security. You need to […]

    The post Building Secure Castles in the Cloud appeared first on McAfee.

  • Update on the Beebone Botnet Takedown
    Raj Samani - April 20, 2015

    On April 8, the takedown operation for the polymorphic botnet known as Beebone successfully concluded. This action redirected traffic from infected hosts to a sinkhole operated by the Shadowserver Foundation. In addition to halting additional infections and the continued morphing of the W32/Worm-AAEH worm, the sinkhole allows McAfee Labs and other partners in the takedown […]

    The post Update on the Beebone Botnet Takedown appeared first on McAfee.

  • Taking a Close Look at Data-Stealing NionSpy File Infector
    Sanchit Karve - April 14, 2015

    W32/NionSpy is a family of malware that steals information from infected machines and replicates to new machines over networks and removable thumb drives. Aside from stealing keystrokes, passwords, Bitcoins, system information, and files on disk, NionSpy (also known as Mewsei and MewsSpy) can record video (using the webcam), audio (using the microphone), take screenshots, and […]

    The post Taking a Close Look at Data-Stealing NionSpy File Infector appeared first on McAfee.

  • VaultCrypt Ransomware Hides Its Traces While Stealing Web Credentials
    Diwakar Dinkar - April 13, 2015

    Since the beginning of the year we have seen a spike in ransomware including the emergence of new ransomware families. One family that has recently resurfaced is Vaultcrypt. This variant both tidies up after itself and steals web page login data. Infection vector The malware arrives on a victim’s machine through a spam email containing […]

    The post VaultCrypt Ransomware Hides Its Traces While Stealing Web Credentials appeared first on McAfee.

Threats and Risks