![]() ( Good) If virus definitions are not available for the threat, or if parts of the network are not protected by Endpoint Protection, then use other means to identify possible infected computers. Quarantine computers where the scan cannot remediate the threat.Note: The scan may clean most of the infected computers. Scan ALL computers to determine which computers are infected.Deploy virus definitions to the entire affected network.Configure Auto-Protect to allow network scanning.Scan the computer to make sure that detection and remediation are working correctly.Download and install the correct virus definitions on a single infected client.( Recommended) Update virus definitions with a signature file that detects the variant of the threat You can use the Endpoint Protection Manager to identify infected computers (see Using Endpoint Protection Manager reports and logs to identify infected computers for details), but there are circumstances that may require additional methods. Once you have identified the threat, you must determine if other computers are infected. Use Application and Device Control to monitor or block a file based on MD5.Use Application and Device Control to log activity to common loading points for threats. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |