Product Guide: Part 2 - Detection: Finding Threats Flashcards

1
Q

What does the On-Access scanner do?

A

Examines files on your computer as they are accessed, providing continuous, real-time detection of threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What VSE features make use of the On-Access Scanner?

A

Access Protection and Buffer Overflow Protection both use the On-Access Scanner to detect Access Violations and Buffer Overflow exploits respectively

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does On-Access scanning work in VSE?

A

Hooks into systems at the lowest levels, scans files where they first enter your system

Acts as part of the system, and delivers notifications via the interface when detections occur

When an attempt is made to open, close, or rename a file, the scanner intercepts the operation and takes actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What criteria does the OAS use to determine if a file should be scanned?

A
  • The file’s extension matches the configuration
  • The file has not been cached
  • The file has not been excluded
  • The file has not been previously scanned
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Assuming a file meets the scanning criteria for the OAS, what happens next?

A

Compares the information in file to the known malware signatures in the currently loaded DAT files

-If the file is clean, the result is cached and read, write, or rename operation is granted
-If the file contains a threat, the operation is denied and the configured action is taken.
For example:
-If the file needs to be cleaned, that cleaning process is determined by the currently loaded DAT files

  • The results are recorded in the activity log, if the scanner was configured to do so.
  • The On-Access Scan Messages alert appears describing the file name and the action taken, if the scanner was configured to do so.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

If a file does not meet OAS criteria, what happens?

A

It is not scanned, it’s cached, and the requested operation is granted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When is the Scan File Cache flushed? What happens to the files?

A

When the OAS, an extra.dat file is added, or the cache is full

All files are rescanned

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does the On Access Scanning process differ for writing vs reading to disk?

A

When files are being written to disk, the on-access scanner scans these items:

  • Incoming files being written to the lcoal hard drive.
  • Files being created on the local hard drive or a mapped network drive(this includes new files, modified files, or files being copied or moved from one drive to another).
  • NOTE: To scan mapped network drives, you must enable the On Network Drives option. Refer to Enabling on-network drives.
  • These scans are only accessible by the same client where VSE is installed. It does not detect access to the mapped network drive by other systems.

When files are being read from disk, the on-access scanner scans these items:

  • Outgoing files being read from the lcoal hard drive or mapped network drives
  • NOTE: To scan mapped network drives, select the On network drives option, described in the previous bullets, to include remote network files.
  • Any file attempting to execute a process on the local hard drive
  • Any file opened on the local hard drive
  • Any file being renamed on the local hard drive, if the file properties have changed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does the On-Access Scanning process differ when?

A
  • When scanning all files, the scanner examines every file type for all possible threats
  • When scanning Default + additional file types, the scanner examines a list of specific files based on the file types you select.

Default file types: The on-access scanner examines the specified file type only for threats that attack that file type.

Additional file types: The on-access scanner examines the files with matching extensions for all possible threats.

Specified file types: The on-access scanner examines the user defined list of file extensions for all possible threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is script scanning? How does it work?

A

The script scanner operates as a proxy component to the real windows scripting host component. It intercepts scripts, then scans them before they are executed.

For example, the script scanner confirms:

If the script is clean, it is passed on to the real scripting host component.

If the script contains a potential threat, the script is not executed.

Trusted processes and also websites that utilize scripts can be excluded from inspection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Artemis? How does it work?

A

The Artemis feature uses heuristics to check for suspicious files. It provides users with Windows-based McAfee anti-virus products that have the most up to date real time detections for certain malware

Artemis does not provide protection for entire classes of malware; just for suspicious samples. The benefit of protecting against specific threats is the capability to protect users with McAfee security at virtually the same time that mcAfee Labs determines a sample is malicious

You can configure the administrator-configured sensitivity levels Artemis uses to look for suspicious programs and DLLs running on client systems protected by VSE. When Artemis detects a suspicious program, it sends a DNS request containing a fingerprint of the suspicious file to a central database server hosted by McAfee Labs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the difference between General Settings and Process Settings?

A

General settings apply to the scanning of all processes and include parameters, such as maximum scan time, scanning scripts, blocking unwanted threats from a remote computer, sending messages when threats are detected, and reporting detections.

On-access scan processes are configured based on the risk that you assign to each process. You can configure one default scanning policy for all processes, or configure different policies based on the risk assigned to each process. Parameters include assigning risk you assign to processes, defining items to scan, performing Artemis scanning, scanning compressed files, taking actions on detections, and scanning for potentially unwanted programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are on demand scan?

A

The on-demand scanner examines all parts of your computer for potential threats, at convenient times or at regular intervals. Use on demand scans to supplement the continuous protection that the on-access scanner offers, or to schedule regular scans at times that do not interfere with your work.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How does On Demand Scanning work?

A

The on-demand scanner searches your system’s files, folders, memory, registry, and more looking for any malware that could have infected your system. You decide when and how the on-demand scans occur. You can scan your system manually, at a scheduled time, or for example, when your system boots.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the On-Demand Scanning Methods, and How are they defined?

A

in-memory-process scanning

This method examines all active processes prior to running the on-demand scan task. Any detected potentially unwanted process is highlighted and the process is stopped. This means that a single pass with the on-demand scanner removes all instances of a potentially unwanted program

Incremental or resumable scanning

This method allows you to limit when on-demand scan activity occurs, and still scan the entire system in multiple sessions. Incremental scanning can be set by adding a time limit to the scheduled scan. The scan stops when the time limit is reached. The next time this task starts, it continues from the point in the file and folder structure where the previous scan stopped.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does scanning of remote storage work?

A

Remote storage data is hierarchical, with two defines levels of storage

Remote storage data is hierarchical, with two defines levels of storage

The two levels of storage:

Upper level, local storage – Includes the NTFS disk volumes of the computer running Remote Storage on Windows 2000 Server

Lower level, remote storage – Located on the robotic tape library, or a standalone tape drive connected to a server computer.

Remote storage automatically copies eligible files on your local volumes to a tape library, then monitors space available on the local volumes. File data is cached locally so that it can be accessed quickly as needed. When necessary, remote storage moves data from the remote storage to lcoal storage. When you need to access a file on a volume managed by remote storage, open the file as usual. If the data for the file is no longer cached on your local volume, remote storage recall the data from a tape library.
The two levels of storage:

Upper level, local storage – Includes the NTFS disk volumes of the computer running Remote Storage on Windows 2000 Server

Lower level, remote storage – Located on the robotic tape library, or a standalone tape drive connected to a server computer.

Remote storage automatically copies eligible files on your local volumes to a tape library, then monitors space available on the local volumes. File data is cached locally so that it can be accessed quickly as needed. When necessary, remote storage moves data from the remote storage to lcoal storage. When you need to access a file on a volume managed by remote storage, open the file as usual. If the data for the file is no longer cached on your local volume, remote storage recall the data from a tape library.

17
Q

How scan deferral works?

A

To improve performance, you can defer on-demand scan tasks when battery power is low or during full-screen presentations. You can also allow the user to defer scheduled scans in one-hour increments. The increments can last one hour, 24 hours, or the on-demand scan can be deferred forever

18
Q

How does System Utilization work?

A

The on-demand scanner uses the Windows Set Priority setting for the scan process and threads priority. This lets the OS set amount of CPU time that the on-demand scanner receives at any point in the scan process. The system utilization setting in the On-Demand Scan Properties maps to the Windows Set Priority control

19
Q

How can changing System Utilization settings affect performance?

A

Setting the system utilization for the scan to low provides improved performance for other running apps. The low setting is useful for systems with end user activity in progress. Conversely, by setting the system utilization to normal the scan completes faster. The normal setting is useful for systems that have large volumes and very little end user activity

20
Q

What is the Global System Cache? How does it improve performance

A

VSE scan cache saves a list of scanned files that are clean.

Improves system performance by saving this clean file scan cache info during a system reboot.

This allows the on-demand scanner to use this clean file cache info to reduce duplicate file scanning

Configure scan cache feature from General Options policy

21
Q

How does the email scanner

A

The email scanner automatically examines email messages and attachments

The email is scanned using

Microsoft Outlook – Email is scanned on-delivery, or you can invoke on-demand email scans directly from Microsoft Outlook.

Note: If you configure Heuristics and Artemis features, the email-on delivery and on-demand scanner uses heuristics to check for suspicious files.

Lotus Notes – Allows you to configure:

When accessed, email is scanned

When invoked, on-demand email scans directly from Lotus Notes

Which Notes databases to exclude