McAfee VirusScan Enterprise for SAP

McAfee VirusScan Enterprise for SAP

信頼されたセキュリティで、ミッション クリティカルな SAP 環境を保護


McAfee VirusScan Enterprise for SAP は、ミッション クリティカルな SAP NetWeaver 環境を保護し、潜在的なセキュリティ脅威を未然に防ぎます。ゼロデイ脅威を阻止し、脆弱性が発見されてから解決するまでの時間を短縮します。このオールインワンのパッケージには、レポート、更新、監査を管理する包括的な機能が含まれています。マカフィーは、SAP 認定のインテグレーション パートナーです。

VirusScan Enterprise for SAP の特徴は次のとおりです。

継続した包括的な保護 - 重要文書、設定ファイル、テンプレートなどをスキャンし、SAP 環境に侵入する前にマルウェアを隔離し、修復を行います。

簡単なセキュリティ管理 - SAP 環境とすべてのマカフィー製品のエージェント、ポリシー、レポートを McAfee ePolicy Orchestrator (ePO) で一元管理します。

柔軟な配備 - 単独で使用することも、仮想マシンとして利用することもできます。

実績豊富な保護対策 - 5,000 万を超える企業ユーザーから信頼されているマカフィーのマルウェア対策を使用できます。McAfee Labs は 24 時間体制で脅威を警戒しています。


ミッション クリティカルな SAP 環境を保護

マルウェアのブロック、外部ファイルのスキャン、感染ファイルの隔離、ゼロデイ脅威の阻止を行い、SAP NetWeaver 環境を保護します。


McAfee Labs から更新を自動的に取得し、最新の保護対策を常に配備できます。


McAfee ePolicy Orchestrator (ePO) インフラに VirusScan Enterprise for SAP を追加するだけで、企業のセキュリティ管理を行うことができます。ePO に慣れている IT スタッフに必要な補足トレーニングはありません。


セキュリティ リスク管理ソリューションのハブとして ePO を使用すると、不正なシステムや非対応のシステムのリスクを低減できます。また、保護対策を最新の状態にし、保護ポリシーの使用と監視を実行できます。一元管理の Web ベースのコンソールから年中無効のサポートを利用できます。


対応する SAP ソフトウェア


  • SAP NetWeaver 2004 (SAP_BASIS 640) ABAP Stack Service Pack 11 (SP11) 以降
  • SAP NetWeaver 2004 (SAP_BASIS 640) J2EE Stack SP13 以降
  • SAP NetWeaver 7.0 SP15 以降
  • SAP NetWeaver 7.0/2004s ABAP (SAP_BASIS 7.00) 以降
  • SAP NetWeaver 7.0/2004s J2EE (SAP_BASIS 7.00) 以降


  • 2 GHzで動作するインテル Pentium 4 プロセッサー (推奨)


  • Windows Server 2008 Enterprise x86
  • Windows Server 2008 Enterprise x64
  • Windows Server 2008 x86
  • Windows Server 2008 x64 版
  • Windows Server 2003 Standard SP1、SP2
  • Windows Server 2003 Enterprise SP1、SP2
  • Windows Server 2003 Standard x64 SP1、SP2
  • Windows Server 2003 Enterprise x64 SP1、SP2


  • Microsoft Internet Explorer 6 以降

Windows インストーラー

  • Microsoft Windows Installer (MSI) 2 以降


  • 1 GB RAM


  • 100 MB


  • VirusScan 8.7i。インストールと設定の要件については、製品ガイドを参照してください。
  • ePolicy Orchestrator 4.0 以降 (管理およびレポート用)。




McAfee Total Protection for Endpoint Suite (英語)

Suite End-of-Life (EOL) and Auto-Migration Q&A

McAfee Client Proxy (英語)

This technical FAQ covers web protection for the mobile workforce.


Improved healthcare shouldn't come with increased risk. (英語)

This infographic highlights the benefits and risks of the IoT in healthcare devices.

IDC Business Value Snapshot

This snapshot of the IDC white paper "The Business Value of Network-Based Intrusion Prevention Systems," provides key data about McAfee Network Security Platform performance.


The 1-2-3- Security Approach for Windows Server 2003 EOS (英語)

End of Support for Windows Server 2003 is approaching, but that doesn’t mean your business has to lack security. Learn about the three migration paths available to remain compliant and secure.

Embrace Public Clouds with Confidence (英語)

Gain all of the benefits of public cloud services without compromising security. Learn how to secure your servers wherever they are with McAfee Public Cloud Server Security Suite.

McAfee Next Generation Firewall — Securing global healthcare networks (英語)

Learn how McAfee Next Generation Firewall secures global healthcare networks with the highest level of network defense while enabling greater efficiency and cost savings.

McAfee Next Generation Firewall — Securing global retail networks (英語)

Discover how McAfee Next Generation Firewall provides a high level of network protection for global retail environments across multiple geographic locations.

Advanced Threat Defense for SIEM (英語)

When advanced detection solutions, known as sandboxes, collaborate with SIEM solutions, enterprises can better understand and respond to unknown, advanced attacks. McAfee Advanced Threat Defense and McAfee Enterprise Security Manager work in concert to extract relevant data from advanced malware and dramatically reduce time to response by minimizing uncertainty and accelerating remediation.

Management of Native Encryption (英語)

With the rapid increase of PCs, tablets, and other devices in the enterprise environment, it’s critical to ensure that sensitive data is secure, and one of the best ways to achieve it is with encryption. Intel Security data protection solutions offer a variety of encryption capabilities and solutions to cover both Windows and Apple devices.


Learn how to protect against polymorphic worms like W/32Worm-AAEH.

モバイル アプリの 脆弱なSSLに対する 攻撃を阻止する

Many mobile apps are vulnerable to man-in-the-middle attacks. Learn how to protect against them.

Defeating the Angler Exploit Kit

The Angler exploit kit has become one of the most popular and powerful attack kits. Learn how to protect against it.

Protecting Against Potentially Unwanted Programs

PUPs are applications that have legitimate uses but have functions and behaviors that can be exploited against the user without the user’s consent. Learn about PUPs and how to contain them.

McAfee Threat Intelligence Exchange and Endpoint Protection (英語)

McAfee Threat Intelligence Exchange delivers innovative endpoint protection with a system that adapts and learns from threat encounters, and immediately neutralizes emerging attacks.

A Well-Connected Sandbox (英語)

A well-connected sandbox that is integrated from the network edge to endpoints is one of the most effective defenses against today’s constantly morphing and evasive advanced threats. This brief explains how McAfee Advanced Threat Defense, when integrated with other Intel Security solutions, provides an effective defense against zero-day threats.


McAfee Endpoint Protection for OEMs (英語)

For a technical summary on the McAfee product listed above, please view the product data sheet.

Building Secure Software (英語)

For a technical summary on the McAfee service listed above, please view the data sheet.

Enterprise Log Manager


McAfee Network Security Platform (NS-Series)


McAfee Public Cloud Server Security Suite


McAfee Security Information and Event Management (SIEM) Administration (英語)

McAfee MOVE AntiVirus


Avionics Security Assessment (英語)

The McAfee Foundstone Avionics Security Assessment — part of the Intel Security product and service offering — is designed to give you peace of mind that your avionics network is analyzed and fortified to reduce risk.

Embedded Systems Assessment (英語)

The McAfee Foundstone Embedded Systems Assessment — part of the Intel Security product and service offering — is designed to reduce risk by discovering security vulnerabilities in your embedded systems. It’s based on a proven methodology used by skilled consultants trained to analyze the critical components of any embedded system.

McAfee Content Security Reporter (英語)

For a technical summary on the McAfee product listed above, please view the product data sheet.

McAfee Endpoint Protection Suite (英語)

For a technical summary on the McAfee product listed above, please view the product data sheet.


Protect, Detect, Correct: Security Connected for Healthcare Providers (英語)

The Security Connected framework enables healthcare providers to operate more successfully and securely in their complex, heterogeneous environments. This approach helps healthcare providers take charge and secure sensitive data; safely embrace web portals, web services, and mobile devices; leverage situation awareness to better manage security incidents; and maintain compliance with strict industry mandates and regulations.

McAfee Product Entitlement Definitions (英語)

This document contains legal definitions that apply to McAfee products and solutions.


Best Practices for Dealing with Phishing and Next-Generation Malware (英語)

To combat phishing attempts and next-generation malware, organizations of all sizes should consider a variety of issues related to security. This Osterman white paper shows trends in how malware infiltrates organizations, efficacy of security technology and user training, and a variety of actions that organizations should undertake.

Best Practices for Migrating to Office 365 (英語)

This white paper is intended to help decision makers understand the implications of migrating to Microsoft Office 365 and offers practical advice for doing so. It also provides data from a survey of current and prospective Office 365-enabled organizations conducted specifically for this white paper in March 2015.

Securosis: Applied Threat Intelligence (英語)

One of the most compelling uses for threat intelligence is helping to detect attacks earlier. Examining for attack patterns identified via threat intelligence in your security monitoring and analytics processes shortens the window between compromise and detection. This Securosis white paper focuses on how to use threat intelligence to improve your ability to detect, prevent, and investigate attacks.

Protecting Mobile Devices from Malware Attack — An Osterman Research White Paper (英語)

How can you protect your employees’ computers against malware attack regardless of their location? How can you enforce acceptable usage policies for employees located remotely or mobile? The best way to protect against web threats is to redirect all web traffic through a proxy or web gateway that can block blacklisted or unsuitable sites, filter malware downloads, and enforce rules preventing sensitive data from being lost. In this white paper, Osterman Research describes the four ways to reroute web traffic from a mobile device or remote computer through a gateway, and highlights the strengths and weaknesses of each approach.

Secure Coding for Android Applications (英語)

More than one billion Android devices have been activated to date, and it’s estimate that 1.4 million devices are activated per day. The rapidly increasing popularity of this mobile OS demands that developers understand how to create secure Android applications. This white paper focuses on secure coding practices for Android applications.

PCI Guidance: Microsoft Windows Logging (英語)

This paper discusses what is involved in establishing logging for Microsoft Windows systems, and discusses how those settings will also be useful in detecting system anomalies that could be indicative of system misuse or even a system breach.

Securosis: Leveraging Threat Intelligence In Incident Response/Management (英語)

To contain an advanced attack you need to respond faster and smarter. Focusing on shortening the window between attack and detection, coupled with a solid plan to contain and remediate an attack provides the best chance to overcome the attack. This is one of the key pieces of knowledge for security experts.

The Business Value of Using McAfee IPS — IDC (英語)

In this white paper, leading market intelligence firm IDC provides a compelling view of the business value and benefits gained from using McAfee Network Security Platform. Derived from in-depth interviews with existing McAfee IPS customers, the report data shows how an IPS can provide cost and time savings across an organization.

Signature-less IPS: Secure Beyond the Signature (英語)

Learn how the McAfee signature-less intrusion prevention system (IPS) technology is changing the way malware is detected and blocked. Signature-based detection provides an important foundation for intrusion inspection, but a layered signature-less architecture greatly enhances malware detection and reduces the risk. Read about the seven signature-less detection methods McAfee offers and how they are transforming IPS.

Beyond Layer-7 Visibility: A Simpler Path to Endpoint Intelligence (英語)

Security products with layer-7 visibility are great. But in order to dramatically improve your understanding of security events, you need to extend your vision to the specific application processes responsible for initiating a connection. It’s something we call Beyond Layer-7 Visibility.


Throughput and Scalability Report McAfee NGFW 5206 — Miercom (英語)

Independent testing lab Miercom performed comprehensive throughput and scalability testing on the McAfee NGFW 5206 appliance. Testing was performed with application control, deep packet inspection, antivirus enabled, and in configurations of one to four clusters.

ESG Lab Validation Report: McAfee Next Generation SIEM (英語)

ESG Lab focused on the McAfee Enterprise Security Manager (ESM), the core product of McAfee’s end-to-end solution for addressing comprehensive threat detection and remediation. Testing was designed to explore how the solution accurately detects advanced threats using a layered approach, the speed and effectiveness of responding to an attack, and the operational efficiencies of this integrated solution.

ESG Report: Tackling Attack Detection and Incident Response (英語)

This report examines organizations’ security strategies, cyber-attack environments, incident response challenges and needs. A survey found that security professionals are inundated with security incidents and struggle with timely identification and resolution of targeted attacks. A lack of visibility into user and network activity, shortage of investigative skills and experience, and poor security analytics capabilities are key factors in slowing organizations’ response to incidents.

検出が困難な: ポリモーフィック型 ボットネット

This in-depth report discusses the polymorphic worm W/32Worm-AAEH, the control infrastructure behind it, and what it took to take it down.

SANS Data Center Server Security Survey 2014 (英語)

Learn how organizations are tackling the difficult problem of data center security, as well as the best practices for meeting data center compliance demands while reducing overall risk and management complexity.

Gartner Digital Newsletter: Best Practices Against Advanced Threats (英語)

The newsletter includes access to Gartner research ‘Five Styles of Advanced Threat Defense’ and discusses how Intel Security solutions help organizations with every aspect of their advanced threat defense strategy and has uniquely integrated them to provide a powerful security platform.

The Healthcare Internet of Things: Rewards and Risks (英語)

This report makes the case that industry must build security into healthcare devices and networks from the outset rather than as an afterthought.

レポートサマリー — 医療業界におけるIoT: メリットとリスク




Hacking the Human Operating System (英語)

This in-depth report examines social engineering as an attack vector. It details the psychological levers employed by social engineers to influence victims, communication channels used for attacks, and controls businesses should establish to reduce risk.

人の心理や行動を悪用 するハッキング — エグゼクティブサマリー

ソーシャル エンジニアリングの脅威は蔓延しています。サイバー犯罪者は、ソーシャル エンジニアリングで 不正に情報を入手し、犯罪行為に利用しています。この脅威に対処するには、ソーシャル エンジニアリングの特性をよく理解する必要があります。攻撃者、手口、リソースなどを把握し、リスクを回避するための手段を講じる必要があります。