McAfee VirusScan for Mac

McAfee VirusScan for Mac

Complete anti-virus protection for Mac, PowerPC, and Intel-based systems

Overview

McAfee VirusScan for Mac provides complete, proactive malware protection for Mac systems and users. Using proven protection methods, it stops all types of viruses and malicious code, including spyware, adware, Trojans, and new, unknown threats.

VirusScan for Mac delivers:

Centralized, simplified security management — With the McAfee ePolicy Orchestrator (ePO) platform, you can efficiently deploy and manage your Mac, Windows, and Linux clients on your network, giving you better security visibility across your entire infrastructure. Control policy configuration, deployment, and reporting for all your endpoints from the ePO platform’s single, web-based console.

Proactive threat protection — Uses heuristic analysis, generic protection, and on-access scanning to detect and remove viruses, worms, Trojans, spyware, adware, and other unwanted threats before they infect your system. VirusScan for Mac guards against Mac, PC, and Unix-based viruses.

Continuous and on-demand virus scanning — Automatically scans for threats each time a file is accessed. Also scans on demand with file drag and drop.

Seamless security updating — Automatically pulls the latest malware updates from McAfee Labs, our worldwide, 24/7 security research team.

Features & Benefits

Defend against known and unknown threats

Stop every type of virus, spyware, adware, and other malicious code that targets Mac OS X or Microsoft Windows. McAfee VirusScan for Mac can even detect compressed malware files and previously unknown viruses.

Enable users to securely deploy Macs

Allow end users to operate Macs in your environment and ensure their data is protected.

Enforce security policies across your network

Get continuous policy enforcement for multiple files, directories, and volumes, including volumes on remote Macs connected through your network.

Simplify security management

Deploy and monitor VirusScan for Mac using the familiar Mac OS X Aqua user interface. Alternatively, use the McAfee ePolicy Orchestrator (ePO) platform for easy deployment, enforcement, management, and reporting — all from a single console.

Get reliable and fast virus-scanning performance

Check files only when they are accessed to determine whether they’re infected with malware. Initiate on-demand scanning using file drag and drop, and schedule full-disk scans to run at convenient intervals, such as overnight or during off-peak hours.

Guard against email threats

Scan Apple Mail messages and attachments for threats, and protect users when they save or open files from shared network drives.

Stay up-to-date automatically

Count on streaming updates from McAfee Labs — our worldwide, 24/7 security research team — to ensure full compliance and up-to-the-minute protection against viruses, worms, and other threats.

System Requirements

These are minimum system requirements only. Recommended requirements are in parenthesis, where applicable. Actual requirements will vary depending on the nature of your environment.

System Requirements

  • CPU: Intel or PowerPC-based Mac
  • RAM: 1 GB
  • Disk space: 300 MB (500 MB recommended)

Operating Systems

  • Mac OS X Lion (10.7 or higher)
  • Mac OS X Snow Leopard (10.6 or higher)
  • Mac OS X Leopard (10.5 or higher)
  • Mac OS X Tiger (10.4 or higher)

Resources

Data Sheets

McAfee VirusScan for Mac

For a technical summary on the McAfee product listed above, please view the product data sheet.

Community

Blogs

  • Advice for Unfastening CryptoLocker Ransomware
    Dan Larson - April 22, 2015

    In the McAfee Labs Threats Report: November 2014, Intel Security predicted nine major threats that would occur in 2015. Regarding ransomware, we said this: “Ransomware will evolve its methods of propagation, encryption, and the targets it seeks.” Almost immediately, we began to see a huge rise in ransomware, especially with the family CTB-Locker, followed by […]

    The post Advice for Unfastening CryptoLocker Ransomware appeared first on McAfee.

  • Building Secure Castles in the Cloud
    PageOne Pr - April 21, 2015

    You, along with the vast majority of companies, use public cloud servers for something. Whether they are your primary service infrastructure, overflow capacity, or emergency backup, this Infrastructure as a Service (IaaS) is delivering on the promises of reduced costs, greater agility, and enhanced scalability. But there are still questions about security. You need to […]

    The post Building Secure Castles in the Cloud appeared first on McAfee.

  • Update on the Beebone Botnet Takedown
    Raj Samani - April 20, 2015

    On April 8, the takedown operation for the polymorphic botnet known as Beebone successfully concluded. This action redirected traffic from infected hosts to a sinkhole operated by the Shadowserver Foundation. In addition to halting additional infections and the continued morphing of the W32/Worm-AAEH worm, the sinkhole allows McAfee Labs and other partners in the takedown […]

    The post Update on the Beebone Botnet Takedown appeared first on McAfee.

  • Taking a Close Look at Data-Stealing NionSpy File Infector
    Sanchit Karve - April 14, 2015

    W32/NionSpy is a family of malware that steals information from infected machines and replicates to new machines over networks and removable thumb drives. Aside from stealing keystrokes, passwords, Bitcoins, system information, and files on disk, NionSpy (also known as Mewsei and MewsSpy) can record video (using the webcam), audio (using the microphone), take screenshots, and […]

    The post Taking a Close Look at Data-Stealing NionSpy File Infector appeared first on McAfee.

  • VaultCrypt Ransomware Hides Its Traces While Stealing Web Credentials
    Diwakar Dinkar - April 13, 2015

    Since the beginning of the year we have seen a spike in ransomware including the emergence of new ransomware families. One family that has recently resurfaced is Vaultcrypt. This variant both tidies up after itself and steals web page login data. Infection vector The malware arrives on a victim’s machine through a spam email containing […]

    The post VaultCrypt Ransomware Hides Its Traces While Stealing Web Credentials appeared first on McAfee.

Threats and Risks