McAfee VirusScan Enterprise Version 8.7
- Type:
- Applications > Windows
- Files:
- 33
- Size:
- 62.06 MiB (65071861 Bytes)
- Uploaded:
- 2008-09-28 11:59 GMT
- By:
- xxThugxx
- Seeders:
- 0
- Leechers:
- 1
- Info Hash: EF72CE7B8DBD573BF599B96E3C06680644951678
******* * * * * ***** * * * * * * * ****** * * * * * * * * * **** * * * * * * * * * * ******* ****** Presents McAfee VirusScan Enterprise Version 8.7 The ultimate way to keep viruses out of your desktops and servers With McAfee VirusScan Enterprise anti-virus protection was taken to the next level by smoothly combining intrusion prevention with firewall technology to create a single solution for computers and file servers. Here are some key features of "McAfee VirusScan Enterprise": · Cover all the bases Block a broad range of viruses and malicious code-even those hidden in compressed files; find new, unknown viruses with advanced heuristics and generic detection · Defend against threats that target Microsoft Protect against exploits targeted at Microsoft applications and services-especially for Microsoft Windows OS services, Microsoft Word, Microsoft Excel, Internet Explorer, Microsoft Outlook, and SQL server · Curb outbreak damage Limit outbreak damage, even before DAT files are issued; close ports, monitor applications and email engines, block files and directories, and trace and block infection sources · Scans memory for malicious code Detect threats that write to memory rather than disk, such as CodeRed and SQLSlammer · Protect email programs Detect and scour viruses in Microsoft Outlook and Lotus Notes-including HTML text and attachments · Keep script-type threats at bay Prevent threats that exploit JavaScript or Visual Basic from executing · Optimize updating for remote systems Tailor field updates to physical locations and connection speeds: resume updating after a broken connection is re-established · Lock down files Keep VirusScan Enterprise files from being altered with enhanced access protection rules · Advanced rootkit detection Scan system memory for installed rootkits, hidden processes, and other concealed malicious code Requirements: Workstation requirements · Intel Pentium or Intel Celeron processor running a minimum of 166 MHz · 32 MB of RAM · Minimum 38 MB free disk space · Microsoft Internet Explorer 5.0 or higher Server requirements: · Intel Pentium or Intel Celeron processor running a minimum of 166 MHz · 32 MB of RAM · Minimum 38 MB free disk space · Microsoft Internet Explorer 5.0 or higher