User's Manual Part 2

Automatic and Manual Updates
Chapter 9: Using SecureDesk 183
Chapter
SecureDesk allows you to make access through the firewall conditional upon
the state of a com r example, you can configure
SecureDesk to allow access for computers on which the antivirus software is
not u ich the
r ecureDesk
ftware on all
computers in the ltaneously and reports the status of the
antivirus software on each computer.
SecureDesk requires that you install McAfee VirusScan ASaP, a Web-based
ice
esk monitors the state of the installed VirusScan virus signatures,
nd engin not match
y level set in the Safe@Office Portal. Authorized users can
the bloc p
window.
If desired, you can disable SecureDesk for a specific computer or network.
nter with an IP
sScan does not
rt. To do s he computer or network as a network object.
formation rk objects and disabling or enabling
SecureDesk, see Using Network Objects on page 129.
9
puter's antivirus software. Fo
enabled but
antivirus softwa
enables you to q
p-to-date, or to block access for computers on wh
e is up-to-date, but not the most recent build. S
uickly and easily install and update antivirus so
network simu
antivirus serv
SecureD
agent, a
the securit
override
included in the SecureDesk subscription service.
e, and blocks access through the firewall if they do
k by providing the administrator password via a pop-u
For example, you might want to disable SecureDesk for a pri
address, or for a computer with an operating system that Viru
suppo
For in
o you must add t
on adding netwo
Note: SecureD
Cente
This chapter incl
Installing McAfee VirusScan ASaP ...................................................184
Updating McAfee VirusScan ASaP on All Computers ......................186
Setting the SecureDesk Security Level...............................................186
Checking Antivirus Compliancy ........................................................189
Overriding SecureDesk.......................................................................195
Viewing SecureDesk Reports.............................................................196
esk Using SecureD
esk is only available if you are connected to a Service
r and subscribed to this service.
udes the following topics: