Updates to documentation

Some updates to Endpoint Security 10.5.3 are not reflected in the product guide or Help.

Documentation Incorrect information Updated information
McAfee Endpoint Security 10.5.0 Product Guide and Common Help

Missing information — Event Logging section, Limit the size (MB) of event DB option

Limits the size of event databases to the specified maximum size (between 50 MB and 999 MB). The default is 50 MB.

This text will be included in the next version of the documentation.

McAfee Endpoint Security 10.5.0 Product Guide and Threat Prevention Help, Exploit Prevention topic

Missing information — Network Intrusion Prevention section, Enable Network Intrusion Prevention option and Automatically block network intruders option

Enable Network Intrusion Prevention option — Enables Network Intrusion Prevention (NIPS) and enforces network IPS signatures. Selecting this option exposes Network IPS signatures in the Signatures list.

Automatically block network intruders option — Blocks intruder hosts for a specified number of seconds.

Select this option to block all attempted actions from intruder hosts, even if the action for the Network IPS signature isn't set to Block.

  • Number of seconds (1-9999) to block — Specifies the number of seconds to automatically block intruders.
Automatically block network intruders

This text will be included in the next version of the documentation.

McAfee Endpoint Security 10.5.0 Product Guide and Threat Prevention Help, On-Access Scan topic

Missing information — Disable read/write scan of Shadow Copy volumes for SYSTEM process option

Disables read/write scans of Volume Shadow Copy (VSC) volumes by SYSTEM process (PID 4) only. Threat Prevention continues to scan all other access to VSC volumes by all other processes (other than SYSTEM), based on On-Access Scan settings.

This option provides improved performance.

(Disabled by default)

This text will be included in the next version of the documentation.

McAfee Endpoint Security 10.5.0 Product Guide and Threat Prevention Help, On-Access Scan topic

Missing information — Detect suspicious email attachments (Previously called Scan email attachments.)

Scans and detects suspicious files saved to disk by email client applications, such as Outlook or Windows Mail. This option enables aggressive email-attachment detection using heuristic signatures, which detect most executables, scripts, and .jar files by policy, rather than looking for malware.

Select this option to scan all downloads, including archives and their contents, and MIME-encoded files. Archives are scanned 2 levels deep.

Note: This option also prevents executables and scripts downloaded by email clients from running. If an email client update downloads an executable, the update might not work.

Although this option doesn't affect attachments downloaded from browser-based email, on-access scan examines those downloads.

Disabling this option doesn't prevent the on-access scanner from scanning email attachments — it just disables the additional heuristic signatures.

(Disabled by default)

This text will be included in the next version of the documentation.

McAfee Endpoint Security 10.5.0 Product Guide and Threat Prevention Help, On-Demand Scan topic and Custom On-Demand Scan client task topic

Missing information — Files that have been migrated to storage option

This option doesn't apply to files stored in Microsoft OneDrive. The on-demand scanner doesn't download OneDrive files or scan files that haven't been downloaded.

This text will be included in the next version of the documentation.

McAfee Endpoint Security 10.5.0 Product Guide and Adaptive Threat Protection Help, Options topic

Missing information — Real Protect Scanning section, Sensitivity level option Configures the sensitivity level to use with client-based scanning when determining whether the file matches known malware.
  • Low
  • Medium (Default)
  • High

The higher the sensitivity level, the higher the number of malware matches. But, allowing more detections might result in more false positive results.

This text will be included in the next version of the documentation.

McAfee Endpoint Security 10.5.0 Installation Guide

Appendix A Adaptive Threat Protection installation

(unmanaged only)

Removed.

Information about system requirements and product configuration will be integrated into other topics in the next version of the documentation.