background image

 

 

Chapter 11    McAfee Total Protection 

59 

 
 

Click 

OK

Note

: For more information about trusted list types, see 

About 

trusted lists types

 (page 59). 

 

About trusted lists types 

SystemGuards on the Trusted Lists pane represent previously 
unauthorized registry and file changes that VirusScan has 
detected but that you have chosen to allow from an alert of from 
the Scan results pane. There are five types of trusted list types 
that you can manage on the Trusted Lists pane: Program 
SystemGuards, Windows SystemGuards, Browser SystemGuards, 
Trusted Programs, and Trusted Buffer Overflows. 

Option 

Description 

Program 
SystemGuards

Program SystemGuards on the Trusted Lists 
pane represent previously unauthorized registry 
and file changes that VirusScan has detected, but 
that you have chosen to allow from an alert or 
from the Scan Results pane. 

Program SystemGuards detect unauthorized 
registry and file changes associated with ActiveX 
installations, startup items, Windows shell 
execute hooks, and shell service object delay 
load activity. These types of unauthorized 
registry and file changes can harm your 
computer, compromise its security, and damage 
valuable system files. 

Windows 
SystemGuards

Windows SystemGuards on the Trusted Lists 
pane represent previously unauthorized registry 
and file changes that VirusScan has detected, but 
that you have chosen to allow from an alert or 
from the Scan Results pane. 

Windows SystemGuards detect unauthorized 
registry and file changes associated with context 
menu handlers, appInit DLLs, the Windows 
hosts file, the Winlogon shell, Winsock Layered 
Service Providers (LSPs), and so on. These types 
of unauthorized registry and file changes can 
affect how your computer sends and receives 
information over the Internet, change the 
appearance and behavior of programs, and allow 
suspect programs to run on your computer. 

Summary of Contents for MTP09EMB1RAA - Total Protection 2009

Page 1: ...User Guide...

Page 2: ......

Page 3: ...issions 81 Managing computer connections 89 Managing system services 97 Logging monitoring and analysis 103 Learning about Internet security 113 McAfee Anti Spam 115 Anti Spam features 117 Configuring...

Page 4: ...ons 203 Setting up a managed network 205 Managing the network remotely 211 Monitoring your networks 217 McAfee EasyNetwork 221 EasyNetwork features 222 Setting up EasyNetwork 223 Sharing and sending f...

Page 5: ...fic for suspicious activity guard your family s privacy block risky Web sites and more In this chapter McAfee SecurityCenter 5 McAfee VirusScan 29 McAfee Personal Firewall 61 McAfee Anti Spam 115 McAf...

Page 6: ......

Page 7: ...update SecurityCenter to ensure that you have the latest protection available from McAfee After your initial configuration tasks are complete you use SecurityCenter to monitor your computer s protect...

Page 8: ...updates and upgrades SecurityCenter automatically downloads and installs updates for your programs When a new version of a McAfee program is available it is automatically delivered to your computer a...

Page 9: ...used in this image see Understanding protection status page 8 and Understanding protection categories page 9 Then you can review your McAfee account information and verifying the validity of your subs...

Page 10: ...in each protection category the problem category s status is set to Action Required also in red For information about how to fix protection problems see Fixing protection problems page 17 Yellow Your...

Page 11: ...roblem within the category For more information about protection status see Understanding protection status page 8 Protection Category Description Computer Files The Computer Files category lets you c...

Page 12: ...and Script Scanning For detailed information about these particular protection services see the VirusScan help By default all protection services associated with a program are enabled when you instal...

Page 13: ...ubscription is about to expire That way you can avoid interruptions in your protection by renewing it early or by setting up auto renewal on our Web site If you see a link in SecurityCenter prompting...

Page 14: ...er prompting you to renew We ll also notify you periodically about pending expiration with alerts On the SecurityCenter Home pane under SecurityCenter Information click Renew Tip You can also renew yo...

Page 15: ...you before downloading or installing updates You can also disable automatic updating Note If you installed your McAfee product from a CD you must activate within 15 days or your products will not rec...

Page 16: ...and installing For more information see Working with alerts page 21 1 Open the SecurityCenter Configuration pane How 1 Under Common Tasks click Home 2 On the right pane under SecurityCenter Informati...

Page 17: ...ion click Configure 2 On the SecurityCenter Configuration pane under Automatic updates are enabled click Off 3 In the confirmation dialog box click Yes Tip You enable automatic updates by clicking the...

Page 18: ...blems do not require immediate action and may or may not compromise your protection status depending on the type of problem To achieve a green protection status you must fix all critical problems and...

Page 19: ...all the program from the McAfee Web site or CD A program is missing components Reinstall the program from the McAfee Web site or CD A program is not activated and cannot receive full protection Activa...

Page 20: ...roblems persist after you try to fix them automatically you can fix the problems manually 1 Under Common Tasks click Home 2 On the SecurityCenter Home pane click the protection category in which Secur...

Page 21: ...detects a non critical problem that you do not intend to fix you can ignore it Ignoring it removes the problem from the protection category information area in SecurityCenter 1 Under Common Tasks cli...

Page 22: ...20 McAfee Total Protection 4 Click OK Tip You can also ignore a problem by clicking the Ignore link beside the reported problem in the protection category information area...

Page 23: ...uires a response from you Red alerts occur when SecurityCenter cannot determine how to fix a protection problem automatically Yellow A yellow alert is a non critical notification that usually requires...

Page 24: ...ow it again at any time By default SecurityCenter shows all informational alerts Show or hide informational alerts You can configure SecurityCenter to show some informational alerts and hide others or...

Page 25: ...finish the game and exit full screen mode SecurityCenter starts displaying informational alerts again 1 Open the Alert Options pane How 1 Under Common Tasks click Home 2 On the right pane under Securi...

Page 26: ...right pane under SecurityCenter Information click Configure 3 Under Alerts click Advanced 2 On the Alert Options pane under Sound select the Play a sound when an alert occurs check box Hide the splash...

Page 27: ...security threat occurs check box Hide security messages You can hide security notifications about protecting more computers on your home network These messages provide information about your subscrip...

Page 28: ......

Page 29: ...ts use the event log to monitor their children s behavior on the Internet You view recent events if you want to examine only the last 30 events that occurred You view all events if you want to examine...

Page 30: ......

Page 31: ...VirusScan offers you the flexibility to customize this behavior if you want to but if you don t your computer remains protected With normal computer use viruses worms and other potential threats may i...

Page 32: ...le the option to use minimal computer resources but keep in mind that higher priority will be given to virus protection than to other tasks Automatic repairs If VirusScan detects a security threat whi...

Page 33: ...r You can also run manual scans in Windows Explorer while you work Scanning in SecurityCenter offers the advantage of changing scanning options on the fly However scanning from Windows Explorer offers...

Page 34: ...the Basic menu 2 On the Scan Options pane under Quick Scan click Start Start a Full Scan to thoroughly check your computer for threats 1 Click Scan on the Basic menu 2 On the Scan Options pane under F...

Page 35: ...ng minimal computer resources 4 Select one or more days 5 Specify a start time 6 Click OK The scan results appear in the Scan completed alert Results include the number of items scanned detected repai...

Page 36: ...tics Double click the Scan completed icon in the notification area on your taskbar View details about detected items infection status and type 1 Double click the Scan completed icon in the notificatio...

Page 37: ...decide whether to remove or trust the them If potentially unwanted programs are detected VirusScan does not take any automatic action instead it lets you decide whether to quarantine or trust the prog...

Page 38: ...revent it from causing damage to your computer or files 1 Open the Scan Results pane How 1 Double click the Scan completed icon in the notification area at the far right of your taskbar 2 On the Scan...

Page 39: ...your computer You can then restore or remove the quarantined items In most cases you can delete a quarantined without impacting your system 1 Open the Quarantined Programs and Tracking Cookies pane Ho...

Page 40: ...tracking cookies and network drives You can also take advantage of buffer overflow protection which is enabled by default except if you are using a Windows Vista 64 bit operating system To learn more...

Page 41: ...eduled scans always check your entire computer using your default scan options By default VirusScan performs a scheduled scan once a week If you find that you are experiencing slow scan speeds conside...

Page 42: ......

Page 43: ...mage occurs Spyware protection Spyware protection detects spyware adware and other potentially unwanted programs Spyware is software that can be secretly installed on your computer to monitor your beh...

Page 44: ...any time doing so leaves your computer vulnerable to harmful scripts Start spyware protection Turn on spyware protection to detect and remove spyware adware and other potentially unwanted programs th...

Page 45: ...t instant messaging protection Turn on instant messaging protection to detect security threats that can be included in inbound instant message attachments 1 Open the E mail IM Configuration pane How 1...

Page 46: ......

Page 47: ...uthorized changes made to the Windows registry or critical system files on your computer Unauthorized registry and file changes can harm your computer compromise its security and damage valuable syste...

Page 48: ...on of memory used to temporarily hold computer information Buffer overflows can occur when the amount of information suspect programs or processes store in a buffer exceeds the buffer s capacity When...

Page 49: ...ange some scanning options or troubleshoot a performance issue When real time virus protection is disabled your computer is not protected and your SecurityCenter protection status is red For more info...

Page 50: ...n only critical PC files items on your desktop or items in your Program Files folder Unless you want to be responsible for initiating each custom scan yourself you can set up a regular schedule for sc...

Page 51: ...ect Scan for spyware and potential threats Detect cookies Select Scan and remove tracking cookies Detect rootkits and stealth programs that can alter and exploit existing Windows system files Select S...

Page 52: ...50 McAfee Total Protection To Do this Scan critical system files Clear the My Computer check box and then select the Critical System Files check box...

Page 53: ...heck your entire computer for viruses and other threats using your default scan options By default VirusScan performs a scheduled scan once a week 1 Open the Scheduled Scan pane How 1 Under Common Tas...

Page 54: ...ystemGuards Program SystemGuards Windows SystemGuards and Browser SystemGuards Program SystemGuards Program SystemGuards detect potentially unauthorized changes to your computer s registry and other c...

Page 55: ...ges can harm your computer compromise its security and damage valuable system files 1 Open the Computer Files Configuration pane How 1 On the left pane click Advanced Menu 2 Click Configure 3 On the C...

Page 56: ...SystemGuards and Browser SystemGuards Program SystemGuards Program SystemGuards technology stops suspect ActiveX programs downloaded from the Internet in addition to spyware and potentially unwanted p...

Page 57: ...on Shell Spyware adware and other potentially unwanted programs that can make registry changes to the Winlogon shell allowing other programs to replace Windows Explorer Winlogon User Init Spyware adwa...

Page 58: ...net Explorer Bars Unauthorized registry changes to Internet Explorer Bar programs such as Search and Favorites that can affect the appearance and behavior of Internet Explorer Internet Explorer Add on...

Page 59: ...that can make registry changes to Internet Explorer security zones allowing potentially harmful files to run when you start your computer Internet Explorer Trusted Sites Spyware adware and other pote...

Page 60: ...have been previously detected and trusted You can also remove an item from a trusted list so that VirusScan detects it again 1 Open the Trusted Lists pane 1 Under Common Tasks click Home 2 On the Sec...

Page 61: ...sults pane Program SystemGuards detect unauthorized registry and file changes associated with ActiveX installations startup items Windows shell execute hooks and shell service object delay load activi...

Page 62: ...hanges can result in unwanted browser activity such as redirection to suspect Web sites changes to browser settings and options and trusting of suspect Web sites Trusted Programs Trusted programs are...

Page 63: ...non critical protection problems as soon as it detects them If you need help diagnosing your protection problems you can run McAfee Virtual Technician In this chapter Personal Firewall features 62 Sta...

Page 64: ...Web site which also provides current security information about programs on your computer as well as global security events and Internet port statistics Lockdown Firewall Block all inbound and outboun...

Page 65: ...inbound and outbound Internet connections If you must disable firewall protection do so temporarily and only when necessary You can also enable Firewall from the Internet Network Configuration panel F...

Page 66: ...omputer from intrusion and unwanted network traffic When Firewall is disabled you cannot manage inbound or outbound Internet connections 1 On the McAfee SecurityCenter pane click Internet Network and...

Page 67: ...r security These alerts can be grouped into three basic types Red alert Yellow alert Green alert Alerts can also contain information to help you decide how to handle alerts or get information about pr...

Page 68: ...rk Connection alert appears when a computer with Firewall installed is connected to a new network You can specify the level of trust that you want to assign to this new network and it then appears in...

Page 69: ...nfigure 3 On the SecurityCenter Configuration pane under Alerts click Advanced 4 On the Alert Options pane select Show informational alerts when gaming mode is detected 5 Click OK Hide informational a...

Page 70: ......

Page 71: ...to Automatic and your programs are allowed outgoing only Internet access However Firewall provides other levels ranging from highly restrictive to highly permissive Firewall also offers you the oppor...

Page 72: ...om the most restrictive to the least Level Description Stealth Blocks all inbound Internet connections except open ports hiding your computer s presence on the Internet The firewall alerts you when ne...

Page 73: ...tbound connections and alert you when new programs attempt Internet access 1 On the McAfee SecurityCenter pane click Internet Network then click Configure 2 On the Internet Network Configuration pane...

Page 74: ...72 McAfee Total Protection 5 Click OK Note The Allow Outgoing Only Access is the default option...

Page 75: ...not applied Firewall neither allows or blocks Internet access nor provides a recommendation in the alert When Smart Recommendations is set to Show an alert prompts you to allow or block access and Fir...

Page 76: ...ck Configure 2 On the Internet Network Configuration pane under Firewall protection is enabled click Advanced 3 On the Security Level pane under Smart Recommendations select Don t apply Smart Recommen...

Page 77: ...installation settings include automatic detection for the most common intrusion attempts such as Denial of Service attacks or exploits Using the standard installation settings ensures that you are pro...

Page 78: ...puter on the network using ping requests 4 Click OK Configure UDP settings You can allow other network computer users to send message units datagrams to your computer using the UDP protocol However yo...

Page 79: ...4 Under Detect Intrusion Attempts do one of the following Select a name to automatically detect the attack or scan Clear a name to disable automatic detection of the attack or scan 5 Click OK Configur...

Page 80: ...mputer and any network including the Internet 1 On the McAfee SecurityCenter pane under Common Tasks click Lockdown Firewall 2 On the Lockdown Firewall pane click Enable Firewall Lockdown 3 Click Yes...

Page 81: ...ess enables Smart Recommendations restores the list of default programs and their permissions in the Program Permissions pane removes trusted and banned IP addresses and restores system services event...

Page 82: ......

Page 83: ...nd Internet access Firewall lets you control full or outbound only access for programs You can also block access for programs In this chapter Allowing Internet access for programs 82 Allowing outbound...

Page 84: ...on is enabled click Advanced 3 On the Firewall pane click Program Permissions 4 Under Program Permissions select a program with Blocked or Outbound Only Access 5 Under Action click Allow Access 6 Clic...

Page 85: ...s 4 In the Program Permissions dialog click Yes to confirm Related topics View outbound events page 105 Allow full access from the Outbound Events log You can allow an existing blocked program that ap...

Page 86: ...OK Allow outbound only access from the Recent Events log You can allow an existing blocked program that appears in the Recent Events log to have outbound only Internet access 1 On the McAfee Security...

Page 87: ...k Program Permissions 4 Under Program Permissions select a program with Full Access or Outbound Only Access 5 Under Action click Block Access 6 Click OK Block access for a new program You can block a...

Page 88: ...appears in the Recent Events log from having inbound and outbound Internet access 1 On the McAfee SecurityCenter pane click Advanced Menu 2 Click Reports Logs 3 Under Recent Events select the event d...

Page 89: ...aving any inbound or outbound Internet access 1 On the McAfee SecurityCenter pane click Internet Network then click Configure 2 On the Internet Network Configuration pane under Firewall protection is...

Page 90: ...on pane under Firewall protection is enabled click Advanced 3 On the Firewall pane click Program Permissions 4 Under Program Permissions select a program 5 Under Action click Learn More Get program in...

Page 91: ...er can be vulnerable to infection Also McAfee recommends that the computer you trust is protected by a firewall and an up to date antivirus program Firewall does not log traffic or generate event aler...

Page 92: ...ist Firewall logs traffic and generates event alerts from Standard IP addresses An example of a Standard network is a computer or computers in a corporate network Public Firewall controls traffic from...

Page 93: ...Connection Sharing ICS you can add the following IP address range 192 168 0 1 to 192 168 0 255 9 Optionally select Rule expires in and enter the number of days to enforce the rule 10 Optionally type a...

Page 94: ...the From IP Address and To IP Address boxes If your computer connection is on an IPv6 network enter the starting IP address and the prefix length in the From IP Address and Prefix Length boxes 7 Under...

Page 95: ...nd its associated IP address 1 On the McAfee SecurityCenter pane click Internet Network then click Configure 2 On the Internet Network Configuration pane under Firewall protection is enabled click Adv...

Page 96: ...as your DNS or DHCP server or other ISP related servers 1 On the McAfee SecurityCenter pane click Internet Network then click Configure 2 On the Internet Network Configuration pane under Firewall pro...

Page 97: ...en enter the starting and ending IP addresses in the From IP Address and To IP Address boxes If your computer connection is on an IPv6 network enter the starting IP address and the prefix length in th...

Page 98: ...the McAfee SecurityCenter pane under Common Tasks click Advanced Menu 2 Click Reports Logs 3 Under Recent Events click View Log 4 Click Internet Network and then click Inbound Events 5 Select a sourc...

Page 99: ...from other computers through designated system service ports Typically Firewall closes these system service ports because they represent the most likely source of insecurities in your system To accep...

Page 100: ...Port 123 Remote Desktop Remote Assistance Terminal Server RDP Port 3389 Remote Procedure Calls RPC Port 135 Secure Web Server HTTPS Port 443 Universal Plug and Play UPNP Port 5000 Web Server HTTP Por...

Page 101: ...dit 6 Do one of the following To open the port to any computer on a trusted standard or public network for example a home network a corporate network or an Internet network select Trusted Standard and...

Page 102: ...a home network a corporate network or an Internet network select Trusted Standard and Public To open the port to any computer on a standard network for example a corporate network select Standard inc...

Page 103: ...ystem Services pane under Add System Service Rule modify the following System service name Local TCP IP ports Local UDP ports 6 Do one of the following To open the port to any computer on a trusted st...

Page 104: ...o longer access the network service on your computer 1 On the McAfee SecurityCenter pane click Internet Network then click Configure 2 On the Internet Network Configuration pane under Firewall protect...

Page 105: ...ing monitoring and analysis for Internet events and traffic Understanding Internet traffic and events helps you manage your Internet connections In this chapter Event Logging 104 Working with Statisti...

Page 106: ...types that you want or do not want to log Event types include the following Blocked Programs ICMP Pings Traffic from Banned IP Addresses Events on System Service Ports Events on Unknown Ports Intrusio...

Page 107: ...date and time of the event and the location of the program on your computer 1 On the Common Tasks pane click Reports Logs 2 Under Recent Events click View Log 3 Click Internet Network and then click...

Page 108: ...and 30 days 1 Ensure that the Advanced Menu is enabled and then click Tools 2 On the Tools pane click HackerWatch 3 Under Event Tracking view security event statistics View global Internet port activi...

Page 109: ...Tracer 3 Type the computer s IP address and click Trace 4 Under Visual Tracer select Map View Note You cannot trace looped private or invalid IP address events Obtain computer registration informatio...

Page 110: ...selected IP address Network View Locate network information using the selected IP address 6 Click Done Trace a computer from the Intrusion Detection Events log From the Intrusion Detection Events pane...

Page 111: ...Menu is enabled and click Tools 2 On the Tools pane click Traffic Monitor 3 Under Traffic Monitor click Active Programs 4 Select a program and then the IP address that appears below the program name 5...

Page 112: ...tes You can also view traffic volume including the amount of traffic since you started Firewall and the total traffic for the current and previous months The Traffic Analysis pane displays real time I...

Page 113: ...uring the past twenty four hour period The pie chart provides visual representation of the relative amounts of bandwidth used by the programs 1 Ensure that the Advanced Menu is enabled and then click...

Page 114: ...112 McAfee Total Protection Note To view the most up to date statistics click Refresh under Active Programs...

Page 115: ...rages McAfee s security Web site HackerWatch to provide up to date information about programs and global Internet activity HackerWatch also provides an HTML tutorial about Firewall In this chapter Lau...

Page 116: ...ch tutorial To learn about Firewall you can access the HackerWatch tutorial from SecurityCenter 1 Ensure that the Advanced Menu is enabled and then click Tools 2 On the Tools pane click HackerWatch 3...

Page 117: ...ink to a potentially fraudulent Web site you are redirected to the Phishing filter safe page If there are Web sites that you do not want filtered you can add them to the whitelist Web sites in this li...

Page 118: ...ion In this chapter Anti Spam features 117 Configuring spam detection 119 Filtering e mail 127 Setting up friends 129 Setting up your Webmail accounts 133 Working with filtered e mail 137 Configuring...

Page 119: ...nsure that all spam is filtered and report spam to McAfee for analysis Phishing filtering Identify potential phishing fraudulent websites that solicit personal information Customized spam processing M...

Page 120: ......

Page 121: ...personal filters to fine tune which messages Anti Spam identifies as spam For example if unsolicited e mail that contains the word mortgage is not filtered you can add a filter that contains the word...

Page 122: ...ify how often to update your spam rules Character sets Anti Spam can look for specific character sets when analyzing spam Character sets are used to represent a language including the language s alpha...

Page 123: ...You can specify a folder in which to put spam and phishing e mail change the SPAM or PHISH tag that appears in the e mail subject line specify a maximum size to filter and specify how often to update...

Page 124: ...ay specify a higher frequency such as 5 minutes for better results Not update the spam rules Select Don t update spam rules Apply character set filters Note Filtering messages that contain characters...

Page 125: ...cting some spam For example if you created a filter to look for the word viagra in the subject of the message but you are still receiving messages that contain the word viagra because it s appearing i...

Page 126: ...ger want to use 1 Open the Spam Protection pane How 1 On the SecurityCenter Home pane click E mail IM 2 In the E mail IM information area click Configure 3 On the E mail IM Configuration pane under Sp...

Page 127: ...t whether to block or allow e mail according to the words or phrases in your filter In Perform this action select either Block or Allow to block or allow e mail that contains the words or phrases in y...

Page 128: ......

Page 129: ...troubleshooting strategy when you are experiencing issues with your e mail program In this chapter Mark a message from the Anti Spam toolbar 127 Disable the Anti Spam toolbar 128 Mark a message from...

Page 130: ...How 1 On the SecurityCenter Home pane click E mail IM 2 In the E mail IM information area click Configure 3 On the E mail IM Configuration pane under Spam protection is enabled click Advanced 2 On the...

Page 131: ...add an entire domain if you want each user on the domain to be added to your friends list For example if you add the company com domain none of the e mail from that organization is filtered In this ch...

Page 132: ...n Outlook Outlook Express Windows Mail Click Add Friend Eudora On the Anti Spam menu click Add Friend Thunderbird On the Anti Spam toolbar point to M point to Mark As and then click Friend Add a frien...

Page 133: ...name of the organization or group in the Name box 5 Select Entire domain in the Type list 6 Type the domain name in the Email Address box 7 Click OK Edit a friend If the information for a friend chang...

Page 134: ...pane click Add 4 Change the name of the organization or group in the Name box 5 Select Entire domain in the Type list 6 Change the domain name in the Email Address box 7 Click OK Remove a friend If a...

Page 135: ...well as with various e mail accounts such as POP3 POP3 Webmail and MAPI Microsoft Exchange Server POP3 is the most common account type and is the standard for Internet e mail When you have a POP3 acc...

Page 136: ...ust edit your Webmail account information when changes to your account occur For example edit your Webmail account if you change your password or if you want Anti Spam to check for spam more frequentl...

Page 137: ...n The following tables describe the information you must specify when adding or editing Webmail accounts Account information Information Description Description Describe the account for your own refer...

Page 138: ...lly start your dial up connection Dial when no connection is available When an Internet connection is not available Anti Spam attempts to connect using the dial up connection you specify Always dial t...

Page 139: ...fee when you mark them as spam or not spam so that we can analyze them to create filter updates 1 Open the Spam Protection pane How 1 On the SecurityCenter Home pane click E mail IM 2 In the E mail IM...

Page 140: ...ail 3 Select a message 4 Under I want to do one of the following Click View to view the message in your default e mail program Click Export to copy the message to your computer Click Delete to delete...

Page 141: ...dd sites such as Google Yahoo or McAfee because these Web sites are not considered fraudulent Note If you have SiteAdvisor installed you do not receive Anti Spam phishing protection because SiteAdviso...

Page 142: ...ow you want to filter it remove it from the whitelist 1 Open the Phishing Protection pane 1 On the SecurityCenter Home pane click Internet Network 2 In the Internet Network information area click Conf...

Page 143: ...e storage area for personal passwords Before you begin using Parental Controls you can familiarize yourself with some of the most popular features Details about configuring and using these features ar...

Page 144: ...the Web for SecurityCenter users Parental Controls also lets you universally restrict access to specific Web sites and grant or block access based on associated keywords Personal Information Protecti...

Page 145: ...t rating group determines the kind of Web content that is accessible to a child based on the child s age group and Web browsing time limits define the days and times a child can access the Web You can...

Page 146: ......

Page 147: ...our computer However if you upgraded from a previous version of SecurityCenter that used McAfee users your McAfee users and their permissions are retained Note To configure users you must log into you...

Page 148: ...e set up on your computer You add a user edit a user s account information or remove a user under Computer Management in Windows You can then set up Parental Controls protection for those users in Sec...

Page 149: ...word Switch to Windows users For easy maintenance McAfee recommends that you switch to Windows users however if you do you can never switch back to McAfee users 1 Open the Users Settings pane How 1 Un...

Page 150: ...t type or automatic login ability 1 Log in to SecurityCenter as the Administrator user 2 Open the Users Settings pane How 1 Under Common Tasks click Home 2 On the SecurityCenter Home pane click Parent...

Page 151: ...ngs pane How 1 Under Common Tasks click Home 2 On the SecurityCenter Home pane click Parental Controls 3 In the Parental Controls information section click Configure 4 On the Parental Controls Configu...

Page 152: ...ge appropriate searching we ll make sure that the search engine s safe search filtering is turned on for that user and set to its most restrictive setting and if a user tries to turn it off in the sea...

Page 153: ...l Controls information section click Configure 3 On the Parental Controls Configuration pane click Advanced 4 On the Parental Controls pane click Users Settings 2 On the Users Settings pane click a us...

Page 154: ...p see Setting the content rating group page 153 Filter potentially inappropriate Web images By default new users are added to the Adult group and image filtering is disabled If you want to block poten...

Page 155: ...Web sites that are allowed in the Filtered Web Sites list For more information see Filtering Web sites page 155 Set a user s content rating group By default a new user is added to the Adult group whi...

Page 156: ...at they cannot do so If you prohibit Web browsing entirely the child can log in to and use the computer including other Internet programs such as e mail instant messengers ftp games and so on but cann...

Page 157: ...blocked To test blocked Web sites you must log in as a non Adult user but remember to clear your Web browser s browsing history when you re finished testing Block a Web site You block a Web site to pr...

Page 158: ...he http box and then click Allow 4 Click OK Tip You can allow a previously blocked Web site by clicking the Web site address in the Filtered Web Sites list and then clicking Allow Update a filtered We...

Page 159: ...ecurityCenter Home pane click Parental Controls 2 In the Parental Controls information section click Configure 3 On the Parental Controls Configuration pane ensure that Parental Controls are enabled a...

Page 160: ...in the default list Disable keyword filtering By default keyword filtering is enabled which means that a default list of keywords and corresponding rules is used to rate content for users according to...

Page 161: ...s Configuration pane ensure that Parental Controls are enabled and then click Advanced 2 On the Parental Controls pane click Keywords and ensure that keyword filtering is enabled 3 Under Keyword List...

Page 162: ......

Page 163: ...count numbers from being transmitted over the Web by adding it to a protected information area Note Parental Controls does not block the transmission of personal information by secure Web sites that i...

Page 164: ...tself is replaced with asterisks Protect personal information You can block the following types of personal information name address zip code social security information phone number credit card numbe...

Page 165: ...ault is a secure storage area for your personal passwords It allows you to store your passwords with confidence so that no other user even an Administrator can access them In this chapter Setting up t...

Page 166: ...The Password Vault is a secure location that can only be accessed by users who know your Password Vault password 1 Open the Password Vault pane How 1 Under Common Tasks click Home 2 On the SecurityCen...

Page 167: ...Click OK Remove a password You can remove a password from the Password Vault at any time There is no way to recover a password that you remove from the vault 1 Open the Password Vault pane How 1 Unde...

Page 168: ...In the Password Vault Password Changed dialog box click OK Reset your Password Vault password If you forget your Password Vault password you can reset it however all the passwords you have previously...

Page 169: ...u begin using Backup and Restore you can familiarize yourself with some of the most popular features Details about configuring and using these features are provided throughout the Backup and Restore h...

Page 170: ...rchive incremental archives occur automatically for you One click restore If files and folders are mistakenly deleted or become corrupt on your computer you can restore the most recently archived vers...

Page 171: ...our default archive location CD DVD USB drive external hard drive or network drive McAfee has preset some other settings for example the folders and file types that you want to archive but you can mod...

Page 172: ...chive You enable local archive if you want to archive a copy of the files on your computer to CD DVD USB drive external hard drive or network drive 1 In SecurityCenter on the Advanced Menu click Confi...

Page 173: ...and top level folders only If you set up a top level folders and subfolders location Backup and Restore archives the watch file types within that folder and its subfolders If you set up a top level f...

Page 174: ...k Add Folder under Archive Top Level Folders and Subfolders To archive the contents of a folder but not the contents of its subfolders click Add Folder under Archive Top Level Folders To archive an en...

Page 175: ...In the left pane click Settings 2 Click Watch Locations 3 Click Add Folder under Folders Excluded From Backup 4 In the Browse For Folder dialog box navigate to the folder that you want to exclude sele...

Page 176: ...ption and compression Encrypting archived files protects the confidentiality of your data by obscuring the content of the files so that they are unreadable Compressing archived files helps to minimize...

Page 177: ...s of your watch locations on demand you can do so at any time For example if you modify a file and want to archive it but Backup and Restore is not scheduled to run a full or quick archive for another...

Page 178: ...However if an automatic archive is in progress and you want to interrupt it you can do so at any time 1 In the left pane click Stop Archiving 2 In the confirmation dialog box click Yes Note The Stop...

Page 179: ...es or search for them You can also open files directly in the explorer view to examine the content without having to retrieve the files You retrieve files from an archive if your local copy of the fil...

Page 180: ...es and folders by the following criteria name file type size state that is archived not archived or archive in progress the date on which the files were last archived or the location of the files on y...

Page 181: ...e last archive click Unknown Open an archived file You can examine the content of an archived file by opening it directly in the local archive explorer 1 Click the Local Archive tab 2 In the right pan...

Page 182: ...rent computer For example if you archive a set of files to an external hard drive on computer A you can restore those files on computer B To do so you must install Backup and Restore on computer B and...

Page 183: ...then click OK Remove files from the missing files list When an archived file is moved out of a watch folder or deleted it automatically appears in the Missing Files list This alerts you to the fact th...

Page 184: ...n about your archive schedule such as the date on which the last and next archives occur View a summary of your archive activity You can view information about your archive activity at any time For ex...

Page 185: ...edder Disk Defragmenter arranges files and folders on your computer to ensure that they do not become scattered that is fragmented when saved on your computer s hard drive By defragmenting your hard d...

Page 186: ...rotection QuickClean features File Cleaner Delete unnecessary files safely and efficiently using various cleaners By deleting these files you increase the space on your computer s hard drive and impro...

Page 187: ...tcuts and shortcuts that do not have a program associated with them Lost File Fragment Cleaner Deletes lost file fragments on your computer Registry Cleaner Deletes Windows registry information for pr...

Page 188: ...utlook and Outlook Express Recently Used Cleaner Deletes recently used files that have been created with any of these programs Adobe Acrobat Corel WordPerfect Office Corel Office Jasc Lotus Microsoft...

Page 189: ...Used Cleaner you can click Properties to select or clear the files that have been recently created with the programs in the list and then click OK Click Restore Defaults to restore the default cleaner...

Page 190: ......

Page 191: ...mented files and folders are consolidated for quick retrieval later In this chapter Defragment your computer 189 Defragment your computer You can defragment your computer to improve file and folder ac...

Page 192: ......

Page 193: ...ragmenter task 194 Delete a Disk Defragmenter task 195 Schedule a QuickClean task You can schedule a QuickClean task to automatically clean your computer using one or more cleaners When finished under...

Page 194: ...sk You can modify a scheduled QuickClean task to change the cleaners it uses or the frequency with which it automatically runs on your computer When finished under QuickClean Summary you can view the...

Page 195: ...about shredding files see McAfee Shredder Delete a QuickClean task You can delete a scheduled QuickClean task if you no longer want it to run automatically 1 Open the Task Scheduler pane How 1 On the...

Page 196: ...modify a scheduled Disk Defragmenter task to change the frequency with which it automatically runs on your computer When finished under Disk Defragmenter you can view the date and time when your task...

Page 197: ...automatically 1 Open the Task Scheduler pane How 1 On the McAfee SecurityCenter under Common Tasks click Maintain Computer 2 Under Task Scheduler click Start 2 In the Select operation to schedule lis...

Page 198: ......

Page 199: ...be recovered because some programs make temporary hidden copies of open files Shredder protects your privacy by safely and permanently deleting these unwanted files It s important to remember that sh...

Page 200: ...s hard drive so that their associated information cannot be recovered It protects your privacy by safely and permanently deleting files and folders items in your Recycle Bin and Temporary Internet Fi...

Page 201: ...er 1 Open Shredder How 1 On the McAfee SecurityCenter pane under Common Tasks click Advanced Menu 2 On the left pane click Tools 3 Click Shredder 2 On the Shred files and folders pane under I want to...

Page 202: ...hredder 2 On the Shred files and folders pane under I want to click Erase an entire disk 3 Under Shredding Level click one of the following shredding levels Quick Shreds the selected drive once Compre...

Page 203: ...s that you don t recognize or trust that try to connect to it Before you use Network Manager you can familiarize yourself with some of the features Details about configuring and using these features a...

Page 204: ...k map to customize your view You can also view the details for any of the devices on the network map Remote management Manage the protection status of the computers that make up your home network You...

Page 205: ...Represents an online computer that does not have SecurityCenter installed or an unknown network device Represents an offline computer that does not have SecurityCenter installed or an offline unknown...

Page 206: ......

Page 207: ...on the network it must become a trusted member of the network Network membership is granted to new computers by existing network members computers with administrative permissions You can view the deta...

Page 208: ...resh the network map rename the network and show or hide items on the network map to customize your view You can also view the details associated with any of the items that appear on the network map A...

Page 209: ...all the computers and devices in your home network appear on the network map However if you have hidden items you can show them again at any time Only unmanaged items can be hidden managed computers...

Page 210: ...er is also recognized as a managed computer in those programs The permission level that is assigned to a computer in Network Manager applies to all McAfee networking programs For more information abou...

Page 211: ...ome Click Allow full access to managed network programs to allow the computer access to the network Click Allow administrative access to managed network programs to allow the computer access to the ne...

Page 212: ...computers on the network by mistake you can stop trusting them Click Stop trusting computers on this network under I want to Note The Stop trusting computers on this network link is not available if y...

Page 213: ...manage the computers and devices that make up your network You can manage the status and permission levels of the computers and devices and fix most security vulnerabilities remotely In this chapter M...

Page 214: ...rant other computers membership to the network Full and guest permissions allow a computer to access the network only You can modify a computer s permission level at any time Since a managed network c...

Page 215: ...e network map 2 Click Manage this device under I want to A Web browser opens and displays the device s administration Web page 3 In your Web browser provide your login information and configure the de...

Page 216: ...and then prompts you to fix the remaining issues by logging in to SecurityCenter on the vulnerable computer and following the recommendations provided In some cases the suggested resolution is to ins...

Page 217: ...ure that you are following these instructions on the computer that you want to manage remotely 2 Have your McAfee login information handy this is the e mail address and password used the first time th...

Page 218: ......

Page 219: ...er or device as a Friend and we won t notify you when they connect to the network in the future After three days we ll start notifying you about each unknown computer or device that connects so that y...

Page 220: ...ox Mark as Intruder Mark a computer or device on your network as an Intruder if you don t recognize or trust it We ll automatically alert you each time it connects to your network 1 On the Basic or Ad...

Page 221: ...t to the network Don t show alerts for Friends that I usually want to be notified about Don t remind me when unknown PCs or devices are detected Don t alert me when McAfee has finished detecting new F...

Page 222: ......

Page 223: ...can familiarize yourself with some of the features Details about configuring and using these features are provided throughout the EasyNetwork help Note SecurityCenter reports critical and non critica...

Page 224: ...er computers that have full or administrative access to your managed network members When you receive a file it appears in your EasyNetwork inbox The inbox is a temporary storage location for all the...

Page 225: ...e to leave the network you can do so at any time In this chapter Open EasyNetwork 223 Joining a managed network 224 Leaving a managed network 228 Open EasyNetwork You can open EasyNetwork from your Wi...

Page 226: ...sion level for the computer that joins the network for example guest file transfer only or full administrative file transfer and file sharing In EasyNetwork computers with administrative access can gr...

Page 227: ...isplays the playing cards that appear in the security confirmation dialog box and then click OK Note If the computer that invited you to join the managed network does not display the same playing card...

Page 228: ...3 Click OK 4 Confirm that the computer is displaying the playing cards that appear in the security confirmation dialog box and then click Grant Access Note If the computer does not display the same pl...

Page 229: ...f the first computer that joined however you can change the network name at any time When you rename the network you change the network description displayed in EasyNetwork 1 On the Options menu click...

Page 230: ...join however you must be granted permission again For more information about joining see Joining a managed network page 224 Leave a managed network You can leave a managed network that you previously...

Page 231: ...omputers read only access to them Only computers that are members of the managed network full or administrative access can share or access files shared by other member computers Note If you are sharin...

Page 232: ...annot be accessed from other computers using Windows Explorer because EasyNetwork file sharing must be performed over secure connections Share a file When you share a file it is available to all membe...

Page 233: ...ng results in the Shared Files window 1 In the Shared Files window click Search 2 Click the appropriate option page 231 in the Contains list 3 Type part or all of the file name or path in the File or...

Page 234: ...scription Any Search all shared file types Document Search all shared documents Image Search all shared image files Video Search all shared video files Audio Search all shared audio files Compressed S...

Page 235: ...a user on the recipient computer can view the file it must be saved to a local location For more information see Accept a file from another computer page 233 1 In Windows Explorer locate the file you...

Page 236: ...r computer on the managed network sends you a file If EasyNetwork is not running the notification message appears in the notification area at the far right of your taskbar 1 On the Options menu click...

Page 237: ...s shared by other computers on your network and allows you to configure and use them If you have configured a printer driver to print through a network print server for example a wireless USB print se...

Page 238: ...ot joined the managed network but are connected to it you can access the shared printers from the Windows printer control panel Stop sharing a printer When you stop sharing a printer members cannot us...

Page 239: ...Chapter 49 McAfee Total Protection 237...

Page 240: ...238 McAfee Total Protection Reference The Glossary of Terms lists and defines the most commonly used security terminology found in McAfee products...

Page 241: ...ommonly called a wireless router that plugs into an Ethernet hub or switch to extend the physical range of service for a wireless user When wireless users roam with their mobile devices transmission p...

Page 242: ...ow corrupts memory or overwrites data in adjacent buffers C cache A temporary storage area on your computer for frequently or recently accessed data For example to increase web browsing speed and effi...

Page 243: ...service attack overwhelms its target with false connection requests so that the target ignores legitimate requests dialers Software that redirects Internet connections to a party other than the user s...

Page 244: ...esigned to prevent unauthorized access to or from a private network Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet espec...

Page 245: ...and share resources such as printers and files launchpad A U3 interface component that acts as a starting point for launching and managing U3 USB programs M MAC address Media Access Control address A...

Page 246: ...at vulnerability or other potentially unwanted code It can take place immediately at a scheduled time in the future or at regularly scheduled intervals Compare to on access scanning See also vulnerabi...

Page 247: ...potentially unwanted program PUP A software program that might be unwanted despite the possibility that users consented to download it It can alter the security or the privacy settings of the compute...

Page 248: ...s including 802 1x authentication of a WLAN user s shared secret See also A string or key usually a password that has been shared between two communicating parties prior to initiating communication It...

Page 249: ...ur email program connects to an email server each time you send or receive email messages share Allowing email recipients access to selected backed up files for a limited period of time When you share...

Page 250: ...McAfee alerts that detect unauthorized changes to your computer and notify you when they occur T temporary file A file created in memory or on disk by the operating system or some other program to be...

Page 251: ...all disk drive making it easy to transfer files from one computer to another USB wireless adapter card A wireless adapter card that plugs into a USB port in the computer V virus A computer program tha...

Page 252: ...es whose messages you want to receive Compare to blacklist page 240 Wi Fi Wireless Fidelity A term used by the Wi Fi Alliance when referring to any type of 802 11 network Wi Fi Alliance An organizatio...

Page 253: ...with a high level of assurance that their data remains protected and that only authorized network users can access the network WPA PSK A special WPA mode designed for home users who do not require st...

Page 254: ......

Page 255: ...PPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED WHICH SETS FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE IF YOU DO NOT KNOW WHICH TYPE OF LICENSE YO...

Page 256: ...r other countries McAfee Red in connection with security is distinctive of McAfee brand products All other registered and unregistered trademarks and copyrighted material herein are the sole property...

Page 257: ...hnician For more information about McAfee Virtual Technician see the McAfee Virtual Technician help If you purchased your security software from a partner or provider other than McAfee open a Web brow...

Page 258: ...mation about Virtual Technician click the Help icon in Virtual Technician Launch Virtual Technician Virtual Technician collects information about your SecurityCenter programs so that it can help resol...

Page 259: ...e com root do wnloads asp Korea www mcafeehelp com kr mcafee com root do wnloads asp Mexico www mcafeehelp com mx mcafee com root d ownloads asp Norway www mcafeehjelp com no mcafee com root do wnload...

Page 260: ...cz MTP_userg uide_2008 pdf Denmark download mcafee com products manuals dk MTP_userg uide_2008 pdf Finland download mcafee com products manuals fi MTP_userg uide_2008 pdf France download mcafee com p...

Page 261: ...ducts manuals tr MTP_userg uide_2008 pdf United Kingdom download mcafee com products manuals en uk MTP_us erguide_2008 pdf United States download mcafee com products manuals en us MTP_us erguide_2008...

Page 262: ...ands download mcafee com products manuals nl MIS_usergu ide_2008 pdf Norway download mcafee com products manuals no MIS_userg uide_2008 pdf Poland download mcafee com products manuals pl MIS_usergu id...

Page 263: ...nuals dk VSP_userg uide_2008 pdf Finland download mcafee com products manuals fi VSP_usergu ide_2008 pdf France download mcafee com products manuals fr VSP_usergu ide_2008 pdf Germany download mcafee...

Page 264: ...mcafee com products manuals en uk VSP_us erguide_2008 pdf United States download mcafee com products manuals en us VSP_use rguide_2008 pdf McAfee VirusScan User Guides Country Regi on McAfee User Gui...

Page 265: ...manuals nl VS_usergui de_2008 pdf Norway download mcafee com products manuals no VS_usergu ide_2008 pdf Poland download mcafee com products manuals pl VS_usergui de_2008 pdf Portugal download mcafee c...

Page 266: ...reat_cent er cz mcafee com virusInf o Denmark www mcafee com us threat_cent er dk mcafee com virusIn fo Finland www mcafee com us threat_cent er fi mcafee com virusInf o France www mcafee com us threa...

Page 267: ...threat_cent er tw mcafee com virusIn fo Turkey www mcafee com us threat_cent er tr mcafee com virusInf o United Kingdom www mcafee com us threat_cent er uk mcafee com virusIn fo United States www mcaf...

Page 268: ...watch org lang es mx Netherlands www hackerwatch org lang nl Norway www hackerwatch org lang no Poland www hackerwatch org lang pl Portugal www hackerwatch org lang pt pt Russia www hackerwatch org la...

Page 269: ...ly access for a program 84 Allow outbound only access from the Outbound Events log 84 Allow outbound only access from the Recent Events log 84 Allowing Internet access for programs 82 Allowing outboun...

Page 270: ...omain 241 E EasyNetwork features 222 Edit a banned computer connection 95 Edit a computer connection 92 Edit a domain 132 Edit a friend 131 Edit a McAfee user s account information 148 Edit a personal...

Page 271: ...ograms and permissions 81 Managing status and permissions 212 Managing system services 97 Managing the network remotely 211 Managing your subscriptions 11 17 man in the middle attack 243 MAPI 243 Mark...

Page 272: ...subscription 12 Report e mail messages to McAfee 137 Reset your Password Vault password 166 Restore an older version of a file from a local archive 181 Restore Firewall settings 79 Restore missing fil...

Page 273: ...47 synchronize 248 system restore point 248 SystemGuard 248 T temporary file 248 TKIP 248 251 Trace a computer from the Inbound Events log 108 Trace a computer from the Intrusion Detection Events log...

Page 274: ...with quarantined files 36 Work with quarantined programs and cookies 37 Work with viruses and Trojans 35 Working with alerts 14 21 65 Working with archived files 177 Working with filtered e mail 137 W...

Reviews: