McAfee - Implement Step
McAfee - Implement Step
McAfee - Implement Step
Abstract
An antivirus solution is key for enterprises to be able to protect their data from viruses and
® ®
malware. Storage systems running the NetApp clustered Data ONTAP 8.2.1 operating
system can be protected through an off-box antivirus solution. This document covers
deployment procedures for the components of the solution, including the antivirus software,
along with best practices for the configuration of each component.
TABLE OF CONTENTS
1 Introduction ........................................................................................................................................... 4
1.1 Audience .........................................................................................................................................................4
2 Antivirus Solution Guide for Clustered Data ONTAP 8.2.1: McAfee © 2015 NetApp, Inc. All rights reserved.
9.2 Monitoring Status and Performance Activities...............................................................................................24
LIST OF TABLES
Table 1) System requirements for VirusScan Enterprise for Storage 1.1.0. ...................................................................7
Table 2) Options in the Filers tab. ..................................................................................................................................9
Table 3) Options in the Scan Items tab. .........................................................................................................................9
Table 4) Options in the Exclusions tab. ........................................................................................................................10
Table 5) Options in the Performance tab. .....................................................................................................................10
Table 6) Options in the Actions tab. .............................................................................................................................10
Table 7) Options in the Reports tab. .............................................................................................................................11
Table 8) Prerequisites for installing Antivirus Connector. .............................................................................................12
Table 9) Prerequisites for adding an SVM to Antivirus Connector. ...............................................................................13
Table 10) Prerequisite for configuring a scanner pool for SVMs. .................................................................................14
Table 11) Prerequisites for enabling virus scanning on the SVM. ................................................................................17
Table 12) Prerequisite for modifying the Vscan file-operations profile..........................................................................17
Table 13) Types of file-operations profiles....................................................................................................................18
Table 14) Prerequisite for adding privileged users to a scanner pool. ..........................................................................19
Table 15) Prerequisite for adding Vscan servers to a scanner pool. ............................................................................20
Table 16) Common virus-scanning issues....................................................................................................................23
Table 17) Commands for viewing information about the connection status of Vscan servers. .....................................24
Table 18) offbox_vscan counters: Vscan server requests and latencies across Vscan servers. .............................25
Table 19) offbox_vscan_server counters: individual Vscan server requests and latencies. ..................................26
Table 20) offbox_vscan_server counters: Vscan server utilization statistics. ........................................................26
LIST OF FIGURES
Figure 1) Antivirus solution architecture. ........................................................................................................................5
Figure 2) Workflow for configuring and managing virus scanning. .................................................................................6
3 Antivirus Solution Guide for Clustered Data ONTAP 8.2.1: McAfee © 2015 NetApp, Inc. All rights reserved.
1 Introduction
The off-box antivirus feature provides virus-scanning support to the NetApp clustered Data ONTAP
operating system. In this architecture, virus scanning is performed by external servers that host antivirus
software from third-party vendors. The feature offers antivirus functionality that is similar to the
functionality currently available in Data ONTAP operating in 7-Mode.
The off-box antivirus feature provides virus-scanning support by triggering in-band notifications to the
external virus-scanning servers during various file operations, such as open, close, rename, and write
operations. Due to the in-band nature of these notifications, the client’s file operation is suspended until
®
the file scan status is reported back by the virus-scanning server, a Windows Server instance that is
referred to as Vscan server.
The Vscan server, upon receiving a notification for a scan, retrieves the file through a privileged CIFS
share and scans the file contents. If the antivirus software encounters an infected file, it attempts to
perform remedial operations on the file. The remedial operations are determined by the settings
configured in the antivirus software.
After completing all necessary operations, the Vscan server reports the scan status to clustered Data
ONTAP. Depending on the scan status, clustered Data ONTAP allows or denies the file operation
requested by the client. In clustered Data ONTAP 8.2.1, virus scanning is available only for CIFS-related
traffic.
The off-box antivirus feature for clustered Data ONTAP is similar to the antivirus feature in the 7-Mode
implementation, but some key enhancements have been added:
Granular scan exclusion. Clustered Data ONTAP gives you the ability to exclude files from virus
scanning based on file size and location (path) or to scan only the files that are opened with execute
permissions.
Support for updates to the antivirus software. Clustered Data ONTAP supports rolling updates of
the antivirus software and maintains information about the software running version along with the
scan status of files. If the antivirus software running in a single server in a scanner pool is updated to
a later version, the scan status of all files that have already been scanned is not discarded.
Security enhancements. Clustered Data ONTAP validates incoming connection requests sent by
the Vscan server. Before the server is allowed to connect, the connection request is compared to the
privileged users and IP addresses defined in the scanner pools to verify that it is originating from a
valid Vscan server.
1.1 Audience
The target audience for this document is customers who want to implement virus scanning for clustered
Data ONTAP storage systems that use the CIFS protocol.
4 Antivirus Solution Guide for Clustered Data ONTAP 8.2.1: McAfee © 2015 NetApp, Inc. All rights reserved.
Figure 1) Antivirus solution architecture.
Antivirus Software
The antivirus software is installed and configured on the Vscan server to scan files for viruses or other
malicious data. The antivirus software must be compliant with clustered Data ONTAP. You must specify
the remedial actions to be taken on infected files in the configuration of the antivirus software.
Antivirus Connector
Antivirus Connector is installed on the Vscan server to process scan requests and provide communication
between the antivirus software and the storage virtual machines (SVMs; formerly called Vservers) in the
storage system running clustered Data ONTAP.
Scanner Pool
A scanner pool is used to validate and manage the connection between the Vscan servers and the SVMs.
You can create a scanner pool for an SVM to define the list of Vscan servers and privileged users that
can access and connect to that SVM and to specify a timeout period for scan requests. If the response to
a scan request is not received within the timeout period, file access is denied in mandatory scan cases.
Scanner Policy
A scanner policy defines when the scanner pool is active. A Vscan server is allowed to connect to an
SVM only if its IP address and privileged user are part of the active scanner pool list for that SVM.
Note: All scanner policies are system defined; you cannot create a customized scanner policy.
A scanner policy can have one of the following values:
Primary. Makes the scanner pool always active.
Secondary. Makes the scanner pool active only when none of the primary Vscan servers is
connected.
Idle. Makes the scanner pool always inactive.
5 Antivirus Solution Guide for Clustered Data ONTAP 8.2.1: McAfee © 2015 NetApp, Inc. All rights reserved.
On-Access Policy
An on-access policy defines the scope for scanning files when they are accessed by a client. You can
specify the maximum file size for files to be considered for virus scanning and file extensions and file
paths to be excluded from scanning. You can also choose a filter from the available set of filters to define
the scope of scanning.
6 Antivirus Solution Guide for Clustered Data ONTAP 8.2.1: McAfee © 2015 NetApp, Inc. All rights reserved.
3.1 Antivirus Software Requirements
The antivirus engine featured in this document is McAfee VirusScan Enterprise for Storage. VirusScan
Enterprise for Storage detects and removes viruses, malware, and other potentially unwanted programs
from your network-attached storage (NAS) devices.
VirusScan Enterprise for Storage is added to McAfee VirusScan Enterprise and expands its capabilities.
The software performs remote scanning on NAS devices such as NetApp storage systems and Internet
Content Adaptation Protocol (ICAP) storage appliances. It uses the McAfee virus-scanning engine that is
common to all McAfee antivirus products.
The VirusScan Enterprise for Storage 1.1.0 release supports the scanning of files stored in systems
running either clustered Data ONTAP 8.2.1 or Data ONTAP 7-Mode. For clustered Data ONTAP
scanning, it requires the Antivirus Connector application. VirusScan Enterprise for Storage 1.1.0 has the
system requirements listed in Table 1.
Component Requirement
Hardware An Intel dual-core processor or compatible architecture
7 Antivirus Solution Guide for Clustered Data ONTAP 8.2.1: McAfee © 2015 NetApp, Inc. All rights reserved.
4.1 Download and Install VirusScan Enterprise for Storage 1.1.0
To download and install VirusScan Enterprise for Storage, complete the following steps:
1. Navigate to the McAfee Downloads page and enter your grant number.
2. Locate VirusScan for Storage in the list of products for your grant number.
3. Select VirusScan for Storage 1.1.0 from the products list.
4. Download the product builds, documentation, and ePolicy Orchestrator extensions.
8 Antivirus Solution Guide for Clustered Data ONTAP 8.2.1: McAfee © 2015 NetApp, Inc. All rights reserved.
Table 2) Options in the Filers tab.
These Settings Apply to All Enable Keep-Alive Probes. Checks if the storage system and the
Filers Vscan server are in communication.
Reset Filer’s Clean File Cache After Each DAT or Engine Update.
Clears the cache of files that have been already scanned after the
Vscan server sends a DAT or engine update. Cleaning the cache makes
all files available for scanning with the latest DAT and engine files.
Note: McAfee recommends that you enable these two options for all
storage systems.
Administrator Account Common In this pane, specify a user account with proper permissions (read, write,
to All Filers and backup) to all storage systems. If this option is not selected, you must
set up an individual account for each locally installed VirusScan Enterprise
for Storage connection.
5. In the Scan Items tab, define the file types to scan for malware threats and the unwanted programs to
detect. Table 3 lists the options to configure in the Scan Items tab.
File Types to Scan All Files. Scans all files regardless of the file extension.
Default + Specified File Types. Scans files with extensions in the
default list of extensions and files with the additional extensions that you
specify (the default list is defined in the current DAT file).
Include Files with no Extension. Scans files that do not contain an
extension.
Also Scan for Macros in All Files. Scans for macro threats added to
the files.
Specified File Types Only. Scans only the files with the extensions that
you specify. You can also remove any extensions that you added
previously. If you select this option, type the file extensions and
separate them with spaces.
Include Files with No Extension. Scans files that do not contain an
extension.
9 Antivirus Solution Guide for Clustered Data ONTAP 8.2.1: McAfee © 2015 NetApp, Inc. All rights reserved.
6. In the Exclusions tab, specify the files and folders to exclude from scanning. Table 4 lists the options
to configure in the Exclusions tab.
How to Handle Client Overwrite Client Exclusions. Excludes the items specified in this
Exclusions policy. If you do not select this option, the antivirus engine uses the list
of excluded items that is defined in the local system.
7. In the Performance tab, configure the scanning duration options to improve performance. Table 5 lists
the options to configure in the Performance tab.
Number of Antivirus Scan Number of Antivirus Scan Threads. Specifies the number of antivirus
Threads scan threads. The default is 100 threads.
8. In the Actions tab, define the primary and secondary actions for the antivirus engine to perform when
a threat is detected. Table 6 lists the options to configure in the Action tab.
If the First Action Fails, then Perform this Action. In this list, select the
next action that you want the scanner to take if the first action fails:
Continue Scanning. A clean or delete action is not attempted on the
threatened file. The storage system is notified of the threat and the
action is logged.
Delete Files Automatically. The scanner deletes files with potential
threats as soon as it detects them.
10 Antivirus Solution Guide for Clustered Data ONTAP 8.2.1: McAfee © 2015 NetApp, Inc. All rights reserved.
Pane Name Option, Description, and/or Selection to Make
When an Unwanted Program Is Perform this Action First. In this list, select the first action that you want
Found the scanner to take when an unwanted program is detected:
Clean Files Automatically. The scanner tries to remove the detected
threat from the file.
Continue Scanning. A clean or delete action is not attempted on the
infected file. The storage system is notified of the threat and the action
is logged.
Delete Files Automatically. The scanner deletes files with potential
threats as soon as it detects them.
If the First Action Fails, then Perform this Action. In this list, select the
next action that you want the scanner to take if the first action fails:
Continue Scanning. A clean or delete action is not attempted on the
threatened file. The storage system is notified of the threat and the
action is logged.
Delete Files Automatically. The scanner deletes files with potential
threats as soon as it detects them.
9. On the Reports tab, set your log file preferences. Table 7 lists the options to configure in the Reports
tab.
What to Log in Addition to Session Settings. Records the properties for each scanning session in
Scanning Activity the log file.
Session Summary. Records a summary of the scanning actions for
each session in the log file. Summary information includes the number
of files scanned, the number and type of detections, the number of files
cleaned or deleted, and other information.
Failure to Scan Encrypted Files. Records the name of encrypted files
that the scanner failed to scan.
10. After you configure all options for the new policy, click Save.
11 Antivirus Solution Guide for Clustered Data ONTAP 8.2.1: McAfee © 2015 NetApp, Inc. All rights reserved.
5.1 Install Antivirus Connector
Before you can install Antivirus Connector, the prerequisites in Table 8 must be in place.
Description
You have downloaded the Antivirus Connector setup file from the NetApp Support site and saved it to a
directory on your hard drive.
You have verified that the requirements to install Antivirus Connector are met.
Best Practices
You must add the credentials used as service accounts to run the Antivirus Connector service as
privileged users in the scanner pool.
The same service account must be used to run the antivirus engine service.
5. On the Ready to Install the Program page, click Back to make any changes to the settings or click
Install to begin the installation. A status box opens and charts the installation progress.
6. On the InstallShield Wizard Completed page, select the Configure ONTAP Management LIFs
checkbox if you want to continue with the configuration of the Data ONTAP management LIFs.
Best Practices
Credentials used for polling must have at least read access to the network interface.
For security purposes, consider using a separate user to poll the Data ONTAP management LIFs.
The preferred accounts are cluster admin and vsadmin.
7. Select the Show the Windows Installer Log checkbox if you want to view the installation logs.
8. Click Finish to end the installation and close the wizard. The Configure ONTAP Management LIFs for
Polling icon is saved on your desktop for you to configure the Data ONTAP management LIFs.
Important
By default, the ONTAP AV Connector service does not have logging enabled. To enable logging, add
the following two values to the Vscan server registry:
The TracePath string value (gives the local path to the logging file; for example,
c:\folder\avshim.log)
The TraceLevel DWORD value (controls the logging level; level 2 is verbose and 3 is debug)
12 Antivirus Solution Guide for Clustered Data ONTAP 8.2.1: McAfee © 2015 NetApp, Inc. All rights reserved.
You must add the registry values to one of the following locations:
HKLM\SOFTWARE\Wow6432Node\Data ONTAP\Clustered Data ONTAP Antivirus
Connector\v1.0
HKLM \SOFTWARE\Data ONTAP\Clustered Data ONTAP Antivirus Connector\v1.0
For more details, see the NetApp KB 2018449 article: Troubleshooting Workflow: Clustered Data
ONTAP Antivirus Connector (Offbox\Offboard AV).
Description
You have verified that the cluster management LIF or the IP address of the SVM is enabled for ontapi.
You have created a user with at least read-only access to the network interface command directory for
ontapi. For more information about creating a user, see the security login role create and
security login create man pages.
Note: You can also use the domain user as an account by adding an authentication tunnel SVM for an
administrative SVM. For more information, see the security login domain tunnel man page.
13 Antivirus Solution Guide for Clustered Data ONTAP 8.2.1: McAfee © 2015 NetApp, Inc. All rights reserved.
Note: Exporting the list of connections to a file is useful if multiple Vscan servers use the same set
of management LIFs.
Description
SVMs and Vscan servers must be in the same domain or in trusted domains.
Note: For information about the parameters that you can use with this command, see the Vserver
vscan scanner-pool create man page.
14 Antivirus Solution Guide for Clustered Data ONTAP 8.2.1: McAfee © 2015 NetApp, Inc. All rights reserved.
Configure One Scanner Pool for Use with Multiple SVMs
You can configure virus scanning to leverage the same pool of Vscan servers for all SVMs instead of
using a separate pool for each SVM.
NetApp recommends that you use the domain account for the Vscan servers as the privileged access
credentials in the scanner pool configuration. Using this account makes the configuration less complex
and easier to troubleshoot for authentication issues.
Cluster-Scoped Configuration
In a cluster-scoped configuration, the pool of Vscan servers is used for scanning all SVMs in the cluster.
To configure a cluster-scoped scanner pool, complete the following steps:
1. Create a scanner pool with the cluster scope.
vserver vscan scanner-pool create -vserver <cserver name> -scanner-pool <scanner pool name> -
servers <vscan server ip> -privileged-users <domain\username>
SVM-Scoped Configuration
In an SVM-scoped configuration, the pool of Vscan servers is used for scanning specific SVMs in the
cluster. To configure an SVM-scoped scanner pool, complete the following steps:
1. Create a scanner pool with the SVM scope. Create the same configuration on all SVMs.
vserver vscan scanner-pool create -vserver <vserver name> -scanner-pool <scanner pool name> -
servers <vscan server ip> -privileged-users <domain\username>
2. Configure Antivirus Connector with the SVM management LIF or the data LIF.
3. Apply a scanner policy to the scanner pool, enable the on-access policy, and enable virus scanning
for each SVM.
Note: Due to the trust relationship between domains, the authentication request is sent to the
corresponding domain.
Best Practice
Verify that you applied a primary policy to a primary scanner pool and a secondary policy to the backup
scanner pool.
15 Antivirus Solution Guide for Clustered Data ONTAP 8.2.1: McAfee © 2015 NetApp, Inc. All rights reserved.
This example shows how to apply the scanner policy named primary to a scanner pool named SP1
on the SVM named vs1:
vserver vscan scanner-pool apply-policy -vserver vs1 -scanner-pool SP1 -scanner-policy primary
Note: For information about the parameters that you can use with this command, see the vserver
vscan scanner-pool apply-policy man page.
Note: For information about the parameters that you can use with this command, see the vserver
vscan on-access-policy create man page.
16 Antivirus Solution Guide for Clustered Data ONTAP 8.2.1: McAfee © 2015 NetApp, Inc. All rights reserved.
This example shows how to enable an on-access policy named Policy1 on the SVM named vs1:
vserver vscan on-access-policy enable -vserver vs1 -policy-name Policy1
Note: By default, the scan-mandatory filter is enabled if other filters are not specified. Use double
quotes ("" or "-") to disable filters. For information about the parameters that you can use with
the vserver vscan on-access-policy create command, see the command’s man
page.
Description
You have created one or more scanner pools and applied a scanner policy to them.
Note: For information about the parameters that you can use with this command, see the vserver
vscan enable man page.
Description
You have created a CIFS share.
Note: Virus scanning is not performed on CIFS shares for which the -continuously-available
parameter is set to Yes.
17 Antivirus Solution Guide for Clustered Data ONTAP 8.2.1: McAfee © 2015 NetApp, Inc. All rights reserved.
Table 13 lists the file-operations profile types and the file operations that they monitor.
Best Practices
Use the default, standard profile.
To further restrict scanning options, use the strict profile. However, using this profile generates
more scan requests and affects performance.
To maximize performance with liberal scanning, use the writes_only profile. This profile scans
only the files that have been modified and closed.
To modify the value of the -vscan-fileop-profile parameter, complete the following step:
1. Run the vserver cifs share modify command.
Note: For more information about modifying the CIFS shares, see the Clustered Data ONTAP 8.2
File Access Management Guide for CIFS.
18 Antivirus Solution Guide for Clustered Data ONTAP 8.2.1: McAfee © 2015 NetApp, Inc. All rights reserved.
List of Privileged Users: cifs\u5
Note: For information about the parameters that you can use with this command, see the vserver
vscan scanner-pool show man page.
Description
You have created a scanner pool for the SVM.
To add one or more privileged users to a scanner pool, complete the following step:
1. Run the vserver vscan scanner-pool privileged-users add command.
This example shows how to add the privileged users named cifs\u2 and cifs\u3 to a scanner
pool named SP1 on the SVM named vs1:
vserver vscan scanner-pool privileged-users add -vserver vs1 -scannerpoolSP1 -privileged-users
cifs\u2,cifs\u3
Note: For information about the parameters that you can use with this command, see the vserver
vscan scanner-pool privileged-users add man page.
19 Antivirus Solution Guide for Clustered Data ONTAP 8.2.1: McAfee © 2015 NetApp, Inc. All rights reserved.
Remove Privileged Users from Scanner Pool
If you no longer require privileged users, you can remove them from the scanner pool. To remove one or
more privileged users from a scanner pool, complete the following step:
1. Run the vserver vscan scanner-pool privileged-users remove command.
Note: For information about the parameters that you can use with this command, see the vserver
vscan scanner-pool privileged-users remove man page.
Description
You have created a scanner pool for the SVM.
To add one or more Vscan servers to a scanner pool, complete the following step:
1. Run the vserver vscan scanner-pool servers add command.
This example shows how to add a list of Vscan servers to a scanner pool named SP1 on the SVM
named vs1:
vserver vscan scanner-pool servers add -vserver vs1 -scanner-pool SP1 -servers
10.10.10.10,11.11.11.11
Note: For information about the parameters that you can use with this command, see the vserver
vscan scanner-pool servers add man page.
20 Antivirus Solution Guide for Clustered Data ONTAP 8.2.1: McAfee © 2015 NetApp, Inc. All rights reserved.
7.3 Manage On-Access Policies
You can manage on-access policies to define the scope of scanning when files are accessed by a client.
You can modify the maximum file size that is allowed for virus scanning and the file extensions and file
paths to be excluded from scanning. You can also delete and disable an on-access policy if it is no longer
required.
Note: For information about the parameters that you can use with this command, see the vserver
vscan on-access-policy show man page.
21 Antivirus Solution Guide for Clustered Data ONTAP 8.2.1: McAfee © 2015 NetApp, Inc. All rights reserved.
Note: For information about the parameters that you can use with this command, see the vserver
vscan on-access-policy disable man page.
If the LIF for Vscan traffic is configured on a different port than the LIF for client traffic, the Vscan LIF might
fail over to another node in case of a port failure. The change will make the Vscan server not reachable from
the new node and the scan notifications for file operations on the node will fail.
Ensure that the Vscan server is reachable through at least one LIF on a node so that it can process scan
requests for file operations performed on that node.
Connect the NetApp storage system and the Vscan server by using at least a 1GbE network.
For an environment with multiple Vscan servers, connect all servers that have similar high-performing
network connections. Connecting the Vscan servers improves performance by allowing load sharing.
22 Antivirus Solution Guide for Clustered Data ONTAP 8.2.1: McAfee © 2015 NetApp, Inc. All rights reserved.
For remote sites and branch offices, NetApp recommends using a local Vscan server rather than a
remote Vscan server because the former is a perfect candidate for high latency. If cost is a factor, use
a laptop or PC for moderate virus protection. You can schedule periodic complete file system scans
by sharing the volumes or qtrees and scanning them from any system in the remote site.
Use multiple Vscan servers to scan the data on the SVM for load-balancing and redundancy
purposes. The amount of CIFS workload and resulting antivirus traffic vary per SVM. Monitor CIFS
and virus-scanning latencies on the storage controller. Trend the results over time. If CIFS latencies
and virus-scanning latencies increase due to CPU or application bottlenecks on the Vscan servers
beyond trend thresholds, CIFS clients might experience long wait times. Add additional Vscan servers
to distribute the load.
Install the latest version of Antivirus Connector. For detailed information about supportability, see the
NetApp Interoperability Matrix Tool (IMT).
Always keep antivirus engines and definitions up to date. Consult McAfee for recommendations on
update frequency.
In a multi-tenancy environment, a scanner pool (pool of Vscan servers) can be shared with multiple
SVMs provided that the Vscan servers and the SVMs are part of the same domain or of a trusted
domain.
The Vscan servers are not able to connect to Check whether the scanner pool configuration specifies the
the clustered Data ONTAP storage system. Vscan server IP address. Check also if the allowed
privileged users in the scanner pool list are active. To
check the scanner pool, run the vserver vscan
scanner-pool show command on the storage system
command prompt.
23 Antivirus Solution Guide for Clustered Data ONTAP 8.2.1: McAfee © 2015 NetApp, Inc. All rights reserved.
Issue How to Resolve It
Clients observe high latency. It is probably time to add more Vscan servers to the
scanner pool.
Too many scans are triggered. Modify the value of the vscan-fileop-profile
parameter to restrict the number of file operations
monitored for virus scanning.
Some files are not being scanned. Check the on-access policy. It is possible that the path for
these files has been added to the path-exclusion list or that
their size exceeds the configured value for exclusions. To
check the on-access policy, run the vserver vscan
on-access-policy show command on the storage
system command prompt.
Table 17) Commands for viewing information about the connection status of Vscan servers.
vserver vscan connection-status Status of the connections that are available but not
show-not-connected connected
Note: For more information about these commands, see their respective man pages.
24 Antivirus Solution Guide for Clustered Data ONTAP 8.2.1: McAfee © 2015 NetApp, Inc. All rights reserved.
3. On the VirusScan console, right-click Network Appliance Filer AV Scanner and select Statistics.
Table 18) offbox_vscan counters: Vscan server requests and latencies across Vscan servers.
Example:
Object: offbox_vscan
Instance: SVM
Start-time: 10/16/2013 10:13:25
End-time: 10/16/2013 10:25:11
Cluster: cluster01
Number of Constituents: 2 (complete_aggregation)
Counter Value
-------------------------------- --------------------------------
scan_request_dispatched_rate 291
scan_noti_received_rate 292
dispatch_latency 43986us
scan_latency 3433501us
-----------------------------------------------------------------
25 Antivirus Solution Guide for Clustered Data ONTAP 8.2.1: McAfee © 2015 NetApp, Inc. All rights reserved.
1. Run the statistics show –object offbox_vscan –instance
SVM:servername:nodename command with the counters listed in Table 19.
Table 19) offbox_vscan_server counters: individual Vscan server requests and latencies.
Example:
Object: offbox_vscan_server
Instance: SVM:vscan_server:node
Start-time: 10/16/2013 10:13:25
End-time: 10/16/2013 10:25:11
Cluster: cluster01
Number of Constituents: 1 (complete_aggregation)
Counter Value
-------------------------------- --------------------------------
scan_request_dispatched_rate 291
scan_latency 3433830us
-----------------------------------------------------------------
26 Antivirus Solution Guide for Clustered Data ONTAP 8.2.1: McAfee © 2015 NetApp, Inc. All rights reserved.
Example:
Object: offbox_vscan_server
Instance: SVM:vscan_server:node
Start-time: 10/16/2013 10:13:25
End-time: 10/16/2013 10:25:11
Cluster: cluster01
Number of Constituents: 1 (complete_aggregation)
Counter Value
-------------------------------- --------------------------------
scanner_stats_pct_cpu_used 51
scanner_stats_pct_dropped_requests 0
scanner_stats_pct_input_queue_avg 91
scanner_stats_pct_input_queue_hiwatermark 100
scanner_stats_pct_mem_used 95
scanner_stats_pct_network_used 4
-----------------------------------------------------------------
Version History
Version Date Document Version History
Version 1.2 June 2015 Updated information about Antivirus Connector logging, scanner
pools for SVMs, trusted domains, and LIFs for Vscan traffic.
27 Antivirus Solution Guide for Clustered Data ONTAP 8.2.1: McAfee © 2015 NetApp, Inc. All rights reserved.
Refer to the Interoperability Matrix Tool (IMT) on the NetApp Support site to validate that the exact
product and feature versions described in this document are supported for your specific environment.
The NetApp IMT defines the product components and versions that can be used to construct
configurations that are supported by NetApp. Specific results depend on each customer's installation in
accordance with published specifications.
Copyright Information
Copyright © 1994–2015 NetApp, Inc. All rights reserved. Printed in the U.S. No part of this document
covered by copyright may be reproduced in any form or by any means—graphic, electronic, or
mechanical, including photocopying, recording, taping, or storage in an electronic retrieval system—
without prior written permission of the copyright owner.
Software derived from copyrighted NetApp material is subject to the following license and disclaimer:
THIS SOFTWARE IS PROVIDED BY NETAPP "AS IS" AND WITHOUT ANY EXPRESS OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE, WHICH ARE HEREBY
DISCLAIMED. IN NO EVENT SHALL NETAPP BE LIABLE FOR ANY DIRECT, INDIRECT,
INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
OF THE POSSIBILITY OF SUCH DAMAGE.
NetApp reserves the right to change any products described herein at any time, and without notice.
NetApp assumes no responsibility or liability arising from the use of products described herein, except as
expressly agreed to in writing by NetApp. The use or purchase of this product does not convey a license
under any patent rights, trademark rights, or any other intellectual property rights of NetApp.
The product described in this manual may be protected by one or more U.S. patents, foreign patents, or
pending applications.
RESTRICTED RIGHTS LEGEND: Use, duplication, or disclosure by the government is subject to
restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software
clause at DFARS 252.277-7103 (October 1988) and FAR 52-227-19 (June 1987).
Trademark Information
NetApp, the NetApp logo, Go Further, Faster, AltaVault, ASUP, AutoSupport, Campaign Express, Cloud
ONTAP, Clustered Data ONTAP, Customer Fitness, Data ONTAP, DataMotion, Fitness, Flash Accel,
Flash Cache, Flash Pool, FlashRay, FlexArray, FlexCache, FlexClone, FlexPod, FlexScale, FlexShare,
FlexVol, FPolicy, GetSuccessful, LockVault, Manage ONTAP, Mars, MetroCluster, MultiStore, NetApp
Insight, OnCommand, ONTAP, ONTAPI, RAID DP, RAID-TEC, SANtricity, SecureShare, Simplicity,
Simulate ONTAP, SnapCenter, Snap Creator, SnapCopy, SnapDrive, SnapIntegrator, SnapLock,
SnapManager, SnapMirror, SnapMover, SnapProtect, SnapRestore, Snapshot, SnapValidator,
SnapVault, StorageGRID, Tech OnTap, Unbound Cloud, WAFL and other names are trademarks or
registered trademarks of NetApp Inc., in the United States and/or other countries. All other brands or
products are trademarks or registered trademarks of their respective holders and should be treated as
such. A current list of NetApp trademarks is available on the web at
http://www.netapp.com/us/legal/netapptmlist.aspx. TR-4286-0615
28 Antivirus Solution Guide for Clustered Data ONTAP 8.2.1: McAfee © 2015 NetApp, Inc. All rights reserved.