McAfee VirusScan Enterprise for Offline Virtual Images

McAfee VirusScan Enterprise for Offline Virtual Images

Purpose-built security for virtual environments

Next Steps:

Overview

McAfee VirusScan Enterprise for Offline Virtual Images — the first dedicated security solution for virtual machines (VMs) — protects your virtual environment and corporate network by automatically scanning, cleaning, and updating VMs before they go online.

VirusScan Enterprise for Offline Virtual Images offers:

An optimized solution — Developed specifically to work with all major virtualization environments, including Citrix, Microsoft, and VMware.

Scalable security — Provides on-demand protection for an unlimited number of VMs.

Comprehensive, cost-effective protection — Reduces IT overhead with integrated protection for pre-production (testing and development) and production (disaster recovery) virtual environments.

Features & Benefits

Secure your VMs and protect your enterprise

Automatically scan, clean, and update virtual machines (VMs) while they’re offline to eliminate the risk of dormant VMs threatening your corporate network.

Save money with automatic updates

Count on automatic, real-time, anti-malware updates via McAfee Global Threat Intelligence to maintain the latest threat protection without bringing VMs online, thus allowing your IT staff to focus on other issues.

Save time with unified security management

Minimize IT efforts and reduce operating costs with common security management via the McAfee ePolicy Orchestrator (ePO) platform, for both physical and virtual environments.

Save trouble with a single solution

Reduce IT migration issues with one security solution that supports all top virtualization vendors, including Citrix, Microsoft, and VMware.

Facilitate real-time disaster recovery

Secure offline VMs at secondary sites.

Support regulatory compliance

Scan and update offline virtual images periodically to enable archiving for longer periods.

System Requirements

These are minimum system requirements. Actual requirements will vary depending on the nature of your environment.

Supported Operating Systems

  • Microsoft Windows Vista base or higher (includes 64-bit)
  • Microsoft Windows XP with Service Pack 1 (SP1) or higher (no support for XP 64-bit)
  • Microsoft Windows Server 2008: Standard, Enterprise, and Datacenter editions (includes 64-bit; no support for Server Cores)
  • Microsoft Windows Server 2003 with SP1 or higher: Standard, Enterprise, and Datacenter editions (no support for Server 2003 64-bit)

Supported VMware Images

  • Supports images using the Virtual Machine Disk Format (VMDK) and Open Virtualization Format (OVF) specification
  • Microsoft Windows 7, all versions
  • Microsoft Windows Vista base or higher (includes 64-bit)
  • Microsoft Windows XP with SP1 or higher (includes 64-bit)
  • Microsoft Windows 2000 with SP4
  • Microsoft Windows Server 2008: Standard, Enterprise, and Datacenter editions (includes 64-bit)
  • Microsoft Windows Server 2003 with SP1: Standard, Enterprise, and Datacenter editions (includes 64-bit)

Supported Microsoft Virtual PC Images

  • Supports images using the Microsoft Virtual Hard Disk Image Format specification
  • Microsoft Windows Vista base or higher (includes 64-bit)
  • Microsoft Windows XP with SP1 or higher (includes 64-bit)
  • Microsoft Windows 2000 with SP4
  • Microsoft Windows Server 2008: Standard, Enterprise, and Datacenter editions (includes 64-bit)
  • Microsoft Windows Server 2003 with SP1 or higher: Standard, Enterprise, and Datacenter editions (includes 64-bit)

Resources

Data Sheets

McAfee VirusScan Enterprise for Offline Virtual Images

For a technical summary on the McAfee product listed above, please view the product data sheet.

Community

Blogs

  • Update on the Beebone Botnet Takedown
    Raj Samani - April 20, 2015

    On April 8, the takedown operation for the polymorphic botnet known as Beebone successfully concluded. This action redirected traffic from infected hosts to a sinkhole operated by the Shadowserver Foundation. In addition to halting additional infections and the continued morphing of the W32/Worm-AAEH worm, the sinkhole allows McAfee Labs and other partners in the takedown […]

    The post Update on the Beebone Botnet Takedown appeared first on McAfee.

  • Taking a Close Look at Data-Stealing NionSpy File Infector
    Sanchit Karve - April 14, 2015

    W32/NionSpy is a family of malware that steals information from infected machines and replicates to new machines over networks and removable thumb drives. Aside from stealing keystrokes, passwords, Bitcoins, system information, and files on disk, NionSpy (also known as Mewsei and MewsSpy) can record video (using the webcam), audio (using the microphone), take screenshots, and […]

    The post Taking a Close Look at Data-Stealing NionSpy File Infector appeared first on McAfee.

  • VaultCrypt Ransomware Hides Its Traces While Stealing Web Credentials
    Diwakar Dinkar - April 13, 2015

    Since the beginning of the year we have seen a spike in ransomware including the emergence of new ransomware families. One family that has recently resurfaced is Vaultcrypt. This variant both tidies up after itself and steals web page login data. Infection vector The malware arrives on a victim’s machine through a spam email containing […]

    The post VaultCrypt Ransomware Hides Its Traces While Stealing Web Credentials appeared first on McAfee.

  • Takedown Stops Polymorphic Botnet
    Raj Samani - April 9, 2015

    Several global law enforcement agencies—with assistance from Intel Security—this week successfully dismantled the “Beebone” botnet behind a polymorphic worm known by Intel Security as W32/Worm-AAEH. The purpose of this worm is to facilitate downloading other malware, including ZBot banking password stealers, Necurs and ZeroAccess rootkits, Cutwail spambots, fake antivirus, and ransomware. The worm spreads quickly […]

    The post Takedown Stops Polymorphic Botnet appeared first on McAfee.

  • Hidden Low Hanging Avaya IP Office Default Credentials
    McAfee Foundstone Professional Services - March 30, 2015

    Written by Piyush Mittal. Default credentials are considered to be the most common, low hanging fruit, in the field of information security that is frequently exploited by the hackers as they are easily identifiable and exploitable. In this blog we will go through the default credentials for Avaya IP office, which can be used by […]

    The post Hidden Low Hanging Avaya IP Office Default Credentials appeared first on McAfee.

Related Solutions
Threats and Risks