Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

Version 1 Next »

The policies that are established for workstations and laptops fall into two categories:

  1. Anti-Virus Scan Time Policies -- You can determine what time and what actually gets scanned when you choose the Full Anti-Virus Management model.  At this time, workstations and laptops can be scanned every day, 7 days a week, 365 days a year at any of the following times (assuming the system is left at the time the anti-virus scan is initiated:
    • 2:00 AM
    • 5:00 AM
    • 12:00 PM (noon)
    • 12:00 PM and 7:00PM
    • 4:00 PM
    • 6:00 PM
    • 7:00 PM
    • 8:00 PM
    • 10:00 PM
    • 11:00 PM
  2. Anti-Virus and Host Intrusion Prevention System Policies
    • Authorization -- Authorization or denial of applications to run on a system, based upon the following criteria:
      • Adware and Potentially Unwanted Applications (PUAs) -- Certain applications can be incorrectly identified as adware or PUAs.  This policy allows an administrator to "set" the application to be available to run or not run on a computer.
      • Buffer Overflow -- Again, the administrator can set or deny access to specific applications that seem to be misbehaving by overflow their memory buffers.  Sometimes this is a method used by hackers to gain access to your computer, but sometimes, buffer overflows can occur from a poorly written application that doesn't manage memory in an effective fashion.
      • Suspicious Files -- Some applications raise red flags by how they are named.  For example, infection.exe might be something you may or may not want to run on your computer.  Well, anti-virus programs don't know what to do with them, so they get flagged for review by support personnel.
      • Suspicious Behavior -- Sometimes, infected files are good files that have been rewritten to misbehave on a computer.  If a file begins to act in a suspicious fashion on a system, it can be allowed or denied on your system by support personnel.
      •  
  • No labels