What is the "fcag.exe" ? Variant 6145492
Our database contains 111 different files for filename fcag.exe but this page contains information about single file with specific attributes. If you want to see general information about the fcag.exe then visit General Information Page . You can also check most distributed file variants with name fcag.exe. This file belongs to product McAfee DLP Endpoint and was developed by company McAfee Inc.. This file has description McAfee DlpAgent. Agregate rating is 5(5) stars - based on 1 reviews.This is executable file. You can find it running in Task Manager as the process fcag.exe.
- Product:
- McAfee DLP Endpoint
- Company:
- McAfee Inc.
- Description:
- McAfee DlpAgent
- Version:
- 9.2.0.522
- MD5:
- f5970db54845028041c95d1fa417d908
- SHA1:
- 1c5a8684f2dab7109aec65190aa98db3577a1ce3
- SHA256:
- c9bd0d85442bbc2ae722967836b506fb259b992e72ab1a3648194a1f1216c7e3
- Size:
- 12051776
- Directory:
- %PROGRAMFILES%\McAfee\DLP\Agent
- Operating System:
- Windows XP
- Occurence:
- Medium
- Digital Signature:
- McAfee, Inc.
System Explorer Community Antivirus Report
Antivirus Name | Latest Toleration |
---|---|
McAfee VirusScan Enterprise | 2015-10-19 15:17:12 |
Symantec Endpoint Protection | 2014-05-08 05:47:44 |
Antivirus de Trend Micro OfficeScan | 2013-08-27 13:28:35 |
ESET Endpoint Security 5.0 | 2013-06-14 22:53:21 |
Is the Process "fcag.exe" Safe or Threat ?
User Reviews of the "fcag.exe"
-
SAFErating from user MikeOne for file %PROGRAMFILES%\McAfee\DLP\Agent\fcag.exe (Variant: 20634622)
This file is in most cases the DATA LOSS PREVENTION (DLP) Endpoint utility from McAfee Inc. This protective utility enables the user to safe the sensitive data and information on any device (from network storages to flash driver), check more about this functionality on http://www.mcafee.com/us/products/data-protection/data-loss-prevention.aspx :
"McAfee Data Loss Prevention (DLP) enables you to be proactive about data protection, helps you understand data use in your organization, and ensures that you create effective information protection policies, without months of trial and error."