Getting Started with McAfee VirusScan Home Edition
22 McAfee VirusScan Home Edition
System Scan
The System scanner looks for viruses on your hard disk as you work with your
computer. It tracks files as your system or other computers read files from
your hard disk or write files to it. It can also scan floppy disks and network
drives mapped to your system.
The System scanner provides scanning protections against viruses embedded
in or attached to e-mail messages as well as well as files that you download
from the Internet. The System scanners functionality replaces that which was
included in the Download and Internet scanners included with previous
versions of McAfee VirusScan Home Edition.
E-mail Scan
The E-mail scanner monitors e-mail messages and message attachments that
you receive via interoffice e-mail systems, and via the Internet. It scans your
Microsoft Exchange or Outlook mailbox systems.
Hostile Activity Watch Kernel
HAWK monitors your computer for suspicious activity that may indicate a
virus is present on your system. As opposed to VirusScan, which cleans the
virus, HAWK prevents viruses, worms, and trojans from spreading further.
Hostile Activity Watch Kernel (HAWK) is a VirusScan option that enables
constant monitoring for suspicious activity that may indicate a virus is present
on your system. Suspicious activity includes:
n An attempt to forward e-mail to a large portion of your address book.
n Attempts to forward multiple e-mail messages in rapid succession.
E-mail attachments containing program files (executable files with an .exe file
extension) or scripts that can be used to mask the actual type document
transmitted to you.
By monitoring for these typically malicious activities, HAWK notifies you and
lets you take action before damage occurs. HAWK can prevent viruses,
worms, and trojans from spreading further, while VirusScan cleans the virus
to remove it from your computer.
About Script Stopper™
Script Stopper™ is a VirusScan protection mechanism associated with the
HAWK. Script Stopper™ detects the activities performed by malicious script
methods and routines. For example, Script Stopper
™ detects scripts that try
to:
n Delete, open, or make files in your computer.
n Send e-mail messages without your knowledge or consent.