MOVE AntiVirus Support



Install & Upgrade

Download the Installation and Upgrade Guide.

Multiplatform

The installation and configuration of the McAfee MOVE AntiVirus multiplatform environment require the installation of extensions on McAfee ePO, registering a cloud account, deploying the SVM Manager, and configuring the SVM auto scale settings.

Agentless

The installation and configuration of the McAfee MOVE AntiVirus agentless environment require the installation of extensions on McAfee ePO, registering a cloud account, integration with NSX Manager, deploying the SVM, and setting security policies.

Configuration & Management

Configuring McAfee MOVE AntiVirus

Configure McAfee MOVE AntiVirus settings to prevent malware access, keep your protection up to date, and scan for malware on client systems. McAfee MOVE AntiVirus provides two types of file scanning: on access and on demand. You can customize the scan settings based on your demands and requirements. For more information, see Configure McAfee MOVE AntiVirus.

Managing McAfee MOVE AntiVirus

Manage McAfee MOVE AntiVirus by responding to threat detections, managing quarantined items, and periodically analyzing your protection. For more information, see Managing McAfee MOVE Antivirus.

Best Practices & FAQ

Latest Known Issues

Additional Resources

Root Certificate Expiration

The McAfee product line uses TLS for secure communication. Two certificates validate McAfee TLS chains, including a primary expiring in 2038 and a secondary expiring on May 30, 2020. If either certificate, or both, are present in your environment, TLS will function correctly prior to May 30, 2020. After May 30, 2020, only the primary certificate will be valid. Out of an abundance of caution McAfee is informing customers of this impending event.

Generally, certificates are auto-updated through operation systems and customers will not be impacted. However, in environments where automatic management of root certificates is disabled and the primary certificate has not been manually deployed, customers will potentially be impacted. KB92937 provides information on how to verify and install the primary certificate.

Failure to have a valid certificate will cause product issues including reduced detection efficacy.

The primary certificate that needs to be validated is in a customer's environment as below:

Subject : CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, S=New Jersey, C=US
Thumbprint : 2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E
Expiration : 2038-01-18

Subscribe to KB92937 to receive updates.

Data Sheet

Download

Free Trial

Download

More Information

Contact Us