Volgens mij zit er geen firewall in in de zin van wat wij onder een firewall verstaan, er zit b.v. wel een mogelijkheid in om poorten te blokkeren wat wel een firewall achtige funktie is. Ik vind de omschijving van McAfee dan ook wel een beetje misleidend.
ProductsIntegrated firewall and IPS technology â€“ Addition of firewall and intrusion prevention technology delivers maximum proactive protection in a single, integrated package
Complete outbreak response
The built-in outbreak response features in VirusScan 8.0i provide protection from new viruses before DAT files are available, enabling administrators to take action in the crucial vulnerability window that exists after a virus is identified but before a DAT has been released. Outbreak response functionality includes:
Port blocking/lockdown (firewall feature)
Allows the administrator or user to "turn off" (block) specified ports from either outbound or inbound network traffic (for example, for MyDoom port #3196 should have been blocked; Bagel.n was port #2556)
Application monitoring: email engines (firewall feature)
Allows administrators to block outbound ports, but set rules that allow certain processes to communicate through a closed port. For example, administrators could block port 25 to outbound traffic but allow outlook.exe to communicate outbound through the port. NetSky and MyDoom would not have gotten out of the system with this feature turned on.
File blocking, directory lockdown, folder/share blocking (IPS feature)
Creation of a policy (or policies) that controls the permitted actions that can occur to a specified file, directory, or folder/share (or group of files, folders, etc., with matching name pattern composed of text and wildcard symbols) by system or incoming network processes. For example, the policy for the Sasser worm would have blocked avserve*.exe, skynetave.exe, lsasss.exe, napatch.exe, *_up.exe, cmd.ftp, ftplog.txt, winlog2.*, and win*.log.
Infection trace and block
VirusScan can discover and trace the IP address of the end-point system (infection source) that sent malicious code to a system running VirusScan Enterprise 8.0i, reporting the infection source information back to the management console. Optionally, it can block further communications from the infection source end-point system for a specified time period (configurable) or indefinitely (until reset).
Zie ook: http://www.networkassociates.com/us/pro ... top/vs.htm