Which of the following should an IS auditor verify when auditing the effectiveness of virus protection?