Purpose of Antivirus Team
Antivirus Team is a part of Enterprise Computing group. The Antivirus Team helps to secure the university network by providing McAfee AV products: McAfee Virus Scan Enterprise, McAfee Antispyware Enterprise, and McAfee SiteAdvisor to protect our university’s systems from virus and malware. Our mission is:
Making sure all University/Campus Computers and Servers are up-to-date with licensed McAfee Security products and virus signatures.
Providing end-users with instructions on how to install McAfee products properly to meet the University IT Services Department's Securit requirements.
Supporting University technology end-users with virus-related issues in timely manner.
If you have questions or concerns, please don’t hesitate to contact our Help Desk at 303-724-4357(Help) or by email address email@example.com.
McAfee Antivirus Software Download (accessible from on-campus only)
ePO agent for Windows \\epo2\epoagent\ or \\taconic\epoagent\
McAfee Antivirus for Windows:\\edsel\installs\virus\viruscan\vse8.7\
McAfee Antivirus for new Macs: \\edsel\Applelan\Mac_AC\McAfee_Security_for_Mac_9.1\
*Contact the IT Services Help Desk to schedule a technician to install this software for you or see your department's IT person or LAN Admin for assistance*
Tips - 13 Ways to Protect Your System
In addition to install McAfee products, we recommend that you follow these simple, common-sense precautions to reduce your exposure and protect your system.
Anti-Virus and Anti-malware Resources
- Do not open email attachments from an unknown, suspicious, or untrustworthy source. If you're not familiar with the sender, do not open, download, or execute any files or email attachments.
- Do not open an email attachment unless you know what it is, even if it appears to come from a friend or someone you know. Some viruses replicate themselves and spread via email. Stay on the safe side and confirm that the attachment was sent from a trusted source before you open it.
- Do not open any email attachments if the subject line is questionable. If you feel that the attachment may be important to you, always save the file to your hard drive before you open it.
- Delete chain emails and other spam from your inbox. It's best not to forward or reply to messages like these. Unsolicited, intrusive mail clogs up networks, may contain annoying or offensive content, and may result in security and privacy risks.
- Exercise caution when downloading files from the Internet. Make sure that the website is legitimate and reputable. Verify that an anti-virus program has checked the files on the download site. If you have any doubts, don't download the file at all. If you download software from the Internet, be especially vigilant of free software, which often carries adware or other potentially unwanted content along with it. Always read the privacy policies and end-user license agreements (EULAs) for software you install, regardless of the source. Be especially wary of screensavers, games, browser add-ons, peer-to-peer (P2P) clients, and any downloads claiming to be “cracked” or free versions of expensive applications, such as Adobe® PhotoShop® or Microsoft® Office. If it sounds too good to be true, it probably is.
- Avoid downloads from non-web sources altogether. The chances of downloading infected software from Usenet groups, IRC channels, instant messaging clients, or P2P is very high. Links to websites seen in IRC and instant messaging also frequently point to infected downloads. Avoid obtaining your software from these sources.
- Update your anti-virus software often. Threats are on the increase, and they are constantly evolving. Hundreds of viruses are discovered each month. To make sure that you are protected against the newest breed of threats, update your anti-virus software frequently. That means downloading the latest virus signature files and the most current version of the scanning engine.
- Back up your files frequently. If a virus infects your files, at least you can replace them with your backup copy. It's a good idea to store your backup files (on CDs or flash drives) in another secure physical location away from your computer.
- Update your operating system, web browser, and email program on a regular basis. For example, you can get Microsoft® security updates for Microsoft Windows and Microsoft Explorer at http://www.microsoft.com/security.
- Vigilance is the best defense against phishing scams. “Phishing” describes scams that attempt to acquire confidential information such as credit card numbers, personal identity data, and passwords by sending out emails that look like they come from real companies or trusted individuals. If you happen to receive an email message announcing that your account will be closed, that you need to confirm an order, or that you need to verify your billing information, do not reply to the email or click on any links. If you want to find out whether the email is legitimate, you can contact the company or individual directly by calling or writing to them.
- Do not open messages or click on links from unknown users in your instant messaging program. Instant messaging can be a vehicle for transmitting viruses and other malicious code, and it’s another means of initiating phishing scams.
- Use a personal firewall. A hardware firewall that sits between your DSL router or cable modem will protect you from inbound attacks. It’s a must for broadband connections. A software firewall runs on your PC and can protect you from both inbound and outbound attacks.
- Check your accounts and credit reports regularly. Identity thieves can begin using your personal information to open accounts, purchase goods, and make your life miserable within minutes of obtaining that data. Check your bank account and credit card statements frequently. That way, if you discover that your personal information has been compromised, you can alert credit companies and banks immediately, so they can close your accounts.
If you have any questions about virus-related issues, please contact firstname.lastname@example.org.
View recent malware: http://www.mcafee.com/threat-intelligence/malware/latest.aspx
McAfee Security Updates: http://www.mcafee.com/apps/downloads/security-updates/security-updates.aspx?region=us
McAfee free tools: http://www.mcafee.com/us/downloads/free-tools/index.aspx
McAfee Stinger (Virus and Malware Removal) http://www.mcafee.com/us/downloads/free-tools/stinger.aspx
Vulnerability Assessment: http://www.mcafee.com/us/mcafee-labs/resources/vulnerability-assessment.aspx