background image

Product Guide

75

5

McAfee Firewall

Introduction

Protect yourself while online with the advanced security of McAfee Firewall. 
Easy-to-use, yet highly configurable, McAfee Firewall secures your PCs 
connection to the Internet whether you connect via DSL, cable modem or 
dial-up. With intrusion detection, color coded security alerts, customizable 
audible alerts, detailed logging, and an application scan for Internet enabled 
applications, McAfee Firewall gives you the power you need to control the 
communications into and out of your PC, ensuring that your online experience 
is as safe as it is enjoyable.

McAfee Firewall:

n

Controls file and print share access.

n

Shows who is connecting to your computer if you allow sharing.

n

Stops floods and other attack packets from being received by the 
Operating System.

n

Blocks untrusted applications from communicating over the network.

n

Provides detailed information about which sites you have contacted and 
the type of connection that was made.

n

Can be set to block all traffic or traffic from a specific IP address 
immediately.

What’s new in this release?

n

Firewall security check:

 Examines your security settings for possible 

vulnerabilities.

n

Enhanced hacker tracing

 with the addition of McAfee’s Visual Trace 

technology. 

n

Intrusion Detection System:

 Detects common attack types and 

suspicious activity.

n

Home networking wizard: 

Set up protection for personal computers 

sharing an Internet connection.

n

Wizard for creating custom rules:

 Create custom configurations for 

specific programs.

Содержание INTERNET SECURITY 5.0

Страница 1: ...P R O D U C T G U I D E McAfee Internet Security 5 0 V E R S I O N 5 0...

Страница 2: ...E MCAFEE MCAFEE IN KATAKANA MCAFEE AND DESIGN MULTIMEDIA CLOAKING NET TOOLS NET TOOLS IN KATAKANA NETCRYPTO NETOCTUPUS NETSCAN NETSHIELD NETSTALKER NETWORK ASSOCIATES NETXRAY NOTESGUARD NUTS BOLTS OIL...

Страница 3: ...ed that the copy you make contains all of the Software s proprietary notices unaltered and unobstructed b Server Mode Use You may use the Software on a Client Device as a server Server within a multi...

Страница 4: ...mark tests regarding this Software contact McAfee to verify that You possess the correct Software for the test and the then current version and edition of the Software You agree not to permit any thir...

Страница 5: ...IDENTAL OR CONSEQUENTIAL DAMAGES SO THIS LIMITATION AND EXCLUSION MAY NOT APPLY TO YOU The foregoing provisions shall be enforceable to the maximum extent permitted by applicable law 8 United States G...

Страница 6: ...hours and upon prior written notice McAfee may visit you and you will make available to McAfee or its representatives any records pertaining to the Software to McAfee The cost of any requested audit...

Страница 7: ...as set forth in this Section 1 The Software is in use on a Client Device when it is loaded into the temporary memory i e random access memory or RAM or installed into the permanent memory e g hard dis...

Страница 8: ...lation or use of the Software does not transfer to you any title to the intellectual property in the Software and you will not acquire any rights to the Software except as expressly set forth in this...

Страница 9: ...CONDITION THAT THE SOFTWARE WILL BE ERROR FREE OR FREE FROM INTERRUPTIONS OR OTHER FAILURES OR THAT THE SOFTWARE WILL MEET YOUR REQUIREMENTS SOME STATES AND JURISDICTIONS DO NOT ALLOW LIMITATIONS ON I...

Страница 10: ...ess or implied warranty or condition of fitness for High Risk Activities 11 Miscellaneous This Agreement is governed by the laws of the Netherlands The application of the United Nations Convention of...

Страница 11: ...oting installation problems 24 Removing or modifying your McAfee Internet Security installation 25 Important information about Windows XP migration 26 3 Getting Started with McAfee Internet Security 5...

Страница 12: ...il Cleaner Does 53 4 McAfee VirusScan Home Edition 57 What s new in this release 57 What comes with McAfee VirusScan 59 Getting Started 62 The Title bar and Tool bar 62 Status information 63 The Task...

Страница 13: ...ernet Security s Shared Features 97 QuickClean Lite 97 McAfee Shredder 99 7 Updating McAfee Internet Security 101 About Instant Updater 101 Instant Updater features 101 A How to contact McAfee 103 www...

Страница 14: ...Contents xiv McAfee Internet Security 5 0 Virus Detection and Prevention Tips 120 Use a Firewall 121 Tips to maintaining your computer and its software 122 Index 123...

Страница 15: ...vernment entities and universities used almost exclusively to an information treasure house that people of all ages and occupations can now access With an Internet account you can send electronic mail...

Страница 16: ...e problem n VirusScan McAfee Internet Security uses McAfee VirusScan to address virus related problems you may encounter through the Internet This feature allows you to set how to perform a virus scan...

Страница 17: ...ities and games n Extended Stealth Program Protection Helps keep your PC free of hidden key loggers that try to capture and steal your passwords and a whole host of even more insidious programs that m...

Страница 18: ...uct McAfee Internet Security and your online connection You must have an Internet connection through a local network or a modem to use all McAfee Internet Security features Some networks have an Inter...

Страница 19: ...ur Web browsing trails such as cached files list of URLs Uniform Resource Locator also known as Web address visited and history files when you close your browser This feature prevents other users of y...

Страница 20: ...rag and drop a user name and password from Browser Buddy to the appropriate box in the login form To access Browser Buddy right click the McAfee Guardian icon in the Windows system tray and click Brow...

Страница 21: ...n on your computer System requirements To install this product you require the following Desktop and notebook computers n Windows 98 Windows Me Windows 2000 Professional Windows XP Home Edition or Win...

Страница 22: ...ny CE device with ActiveSync 3 will function properly Symbian EPOC System requirements McAfee VirusScan for Symbian s EPOC will install and run on any IBM PC or PC compatible computer equipped with Ps...

Страница 23: ...g box displays b Type X SETUP EXE in the text box provided then click OK 4 Here X represents the drive letter for your CD ROM drive or the path to the folder that contains your extracted McAfee Firewa...

Страница 24: ...allation Step 1 Close other software Disable all software running in the background 1 Hold down the Ctrl and Alt keys on your keyboard and then press the Delete key once The Close Program dialog box a...

Страница 25: ...selected M Only if errors found M Replace log M Delete M Free 4 Ignore the other options and click OK Click Start ScanDisk begins scanning your drive for errors Depending on the size of your hard driv...

Страница 26: ...t Security Installation Wizard to complete your changes Restart your computer as directed by setup Important information about Windows XP migration Upgrading your computer s operating system from any...

Страница 27: ...swering a few questions via the Interview so that McAfee Internet Security can effectively use its feature to protect you from Internet threats Introduction The McAfee Internet Security 5 0 Home page...

Страница 28: ...Next to go to any previously viewed screen during your current session n Help Click Help to view its submenu The Help submenu may include any of the following items Status information Depending upon...

Страница 29: ...ee Firewall Activation requires that you perform a few preliminary configuration steps the Firewall Configuration Assistant guides you through this process If the Network Traffic monitor does not disp...

Страница 30: ...include Temporary Internet Files and historical records such as URLs visited created by your Internet browser The Privacy settings sheet allows you to protect personal information about each user tha...

Страница 31: ...s to Internet Newsgroups Perform a Security Check After completing the interview you ll want to find out how your PC may be at risk Security Check examines your PC for privacy and security problems an...

Страница 32: ...nection to the Internet In addition to the wizards and features described earlier in this chapter McAfee Internet Security also includes utilities such as QuickClean Lite McAfee Shredder Instant Updat...

Страница 33: ...r s operating systems is Windows 98 or Windows Me n Visual Trace You must install McAfee Firewall to see this link About the McAfee list The McAfee list displays links to start the Home page to any ot...

Страница 34: ...onal and financial information that you want to protect All the information you enter into McAfee Internet Security is stored in an encrypted form on your hard disk it is never sent to McAfee Software...

Страница 35: ...ot want your children to access when browsing the Internet Creating the McAfee Internet Security Administrator account can only be done in the Interview feature of McAfee Internet Security And only th...

Страница 36: ...n Forgotten passwords Please do not lose or forget the Administrator s password As described above you must use the Administrator s profile to effectively use and configure McAfee Internet Security Du...

Страница 37: ...ivity Logs McAfee Internet Security now provides a list of activities that an Administrator can view via the Activity Logs feature This list is generated based on his preferred security and privacy se...

Страница 38: ...Updating McAfee Internet Security on page 101 If you purchased McAfee Internet Security on CD you should run Update even if you ve just installed McAfee Internet Security In the time between when the...

Страница 39: ...you are being alerted to potential security risks too often you can adjust the alert message settings in Protection Settings Cookie Blocker and Gatekeeper require a period of adjustment before McAfee...

Страница 40: ...assword to save dialog box displays 2 In the Web site text box enter the Web site address in the User name text box type the name by which you identify yourself to this Web site this may correspond to...

Страница 41: ...is designed so that you can easily encrypt or decrypt all of the files that you designate for encryption in File Guardian Before you can encrypt a file you must add it to the Guarded Files list in Fi...

Страница 42: ...redit card number pattern Responding to Gatekeeper Alert Messages McAfee Internet Security can display five different Gatekeeper related alert messages If you are using the default settings suggested...

Страница 43: ...ernet Security displays an alert message You can respond to the alert message in the following ways If you choose Then McAfee Internet Security This time only w allows the program to access the Intern...

Страница 44: ...his time If you choose Then McAfee Internet Security Not this time w prevents the program from sending the number this time This time only w allows the program to send the number just this time Use th...

Страница 45: ...ferent File Guardian related alert messages If you are using the default setting suggested by the Interview you will only see guarded file ActiveX scan ActiveX delete and drive format messages Guarded...

Страница 46: ...veX control to delete files For example if a control installs special software on your PC to let you interact with its Web site the control may need to delete files that it created for temporary use H...

Страница 47: ...ou have run a Security CheckUp and removed the suspicious ActiveX control from your PC Click Continue if you want the program to format your disk Why should I change my File Guardian settings You may...

Страница 48: ...ng formatted w want to be warned when any program tries to format any of your drives An alert message appears whenever you format a floppy disk other removable media or hard disk You may want to turn...

Страница 49: ...f the entity trying to set the cookie and provides you the option either to accept the cookie or not When setting up Cookie Blocker in Protection Settings you can select one option for direct sites an...

Страница 50: ...e the cookies for that site TIP You can run Security Check so that it only looks for cookies On the Perform an Internet Security Check of Your Computer window select Change How My Computer is Checked...

Страница 51: ...e person using your computer doesn t enter the McAfee Internet Security password it automatically replaces any protected personal information sent to an unsecure site with the text xxxx For example if...

Страница 52: ...nly w Allows the information to go out just this time Not this time w Prevents the information from going out this time If you Then use this option Are the only person using your PC and you don t want...

Страница 53: ...abled McAfee Internet Security detects a fast user switch and as such requires each respective user to input their password in order to use password required tasks What Web Trail Cleaner Does As you s...

Страница 54: ...wser the search information displays in the address box of your Web browser When you go to another site the browser retains the search information and the next site you visit can extract it without yo...

Страница 55: ...in the Security Settings of McAfee Internet Security it automatically removes search information before you go to another Web site McAfee Internet Security does not display an alert message for this f...

Страница 56: ...Getting Started with McAfee Internet Security 5 0 56 McAfee Internet Security 5 0...

Страница 57: ...mailers are present or attachments with double file extensions HAWK has been enhanced to include email clients other than just Microsoft Outlook it now supports Outlook Express Eudora and other email...

Страница 58: ...e 2000 documents to provide extra protection to users of Microsoft Word Excel and PowerPoint 2000 in the event that VShield background scanning must be disabled n Usability enhancements McAfee VirusSc...

Страница 59: ...i virus protection from viruses that arrive on floppy disks from your network or from various sources on the Internet The VShield scanner starts when you start your computer and stays in memory until...

Страница 60: ...Installation CD includes a CD version of the emergency startup disk If your computer is configured to start using its CD drive then you can use the CD to boot your computer in to a virus free environ...

Страница 61: ...SCAN EXE will transfer control to this scanner if your computer is running in 16 bit mode but without special memory configurations M BOOTSCAN EXE a smaller specialized scanner for use primarily with...

Страница 62: ...nt status and navigation links to all tasks The Title bar and Tool bar Title bar The Home page displays most of your standard Windows elements that which includes n The title bar displays the name of...

Страница 63: ...e a message displays describing as such Additionally virus definition files DATs version information displays here as well If there is an update to McAfee VirusScan available Click here to update McAf...

Страница 64: ...update This task starts McAfee Instant Updater and checks to see if there is an update to McAfee VirusScan available n Other Tasks Depending upon your McAfee VirusScan configuration this task provide...

Страница 65: ...can background scanner VShield property sheet Here you can view real time status information about VirusScan s background scan modules n Disable VirusScan Select this option to stop VirusScan s backgr...

Страница 66: ...plications VShield Scanner starts when you start your computer and stays in memory until you shut it or your system down VShield automatic protection settings The VShield scanner consists of related m...

Страница 67: ...it from your computer About Script Stopper Script Stopper is a VirusScan protection mechanism associated with the HAWK Script Stopper detects malicious activities script methods or routines perform Fo...

Страница 68: ...ar select Start Settings Control Panel The Windows Control Panel displays 2 Double click the VirusScan icon The VirusScan Services dialog box displays 3 Select the Service tab and click Stop VShield S...

Страница 69: ...Restore n Delete Select this option to delete the infected file Make sure to note the file location so you have a record of the deleted files You will need to restore deleted files from backup copies...

Страница 70: ...lect to have Safe Sound automatically create a backup set for you it creates the first backup set while you are stepping through the Safe Sound Wizard Thereafter while the Enable Automatic Backup opti...

Страница 71: ...ese backups The more recent your backup set the happier you ll be if your PC does encounter a problem that compromises the data on your primary drives However you may want to keep the default Write be...

Страница 72: ...Disk you create includes BOOTSCAN EXE a specialized small footprint command line scanner that can scan your hard disk boot sectors and Master Boot Record MBR BOOTSCAN EXE works with specialized set o...

Страница 73: ...the day week or month How VirusScan protects your wireless device McAfee VirusScan is an application designed to protect your data by scanning the files on your wireless device every time a data exch...

Страница 74: ...et PC w Jornada 540 w Jornada 680 w Jornada 720 Hewlett Packard Pocket PC w E125 w EM500 Cassiopeia Windows CE w PenCentra 130 Fujitso Windows CE w HPW 600 ET Hitachi Windows CE w WorkPad z50 IBM EPOC...

Страница 75: ...o is connecting to your computer if you allow sharing n Stops floods and other attack packets from being received by the Operating System n Blocks untrusted applications from communicating over the ne...

Страница 76: ...ards and modems This means that it can reject inbound traffic before that traffic can reach vital functions in your computer and waste valuable system resources McAfee Firewall the Gatekeeper When McA...

Страница 77: ...ated in this manner It is a good practice to scan files received using anti virus programs such as McAfee VirusScan before you open or view files and their attachments When on the Internet others can...

Страница 78: ...o filtering is done The Internet uses the IP protocols No others are sent Also IP networks are the most common How can I still be harassed even with McAfee Firewall Many people use McAfee Firewall to...

Страница 79: ...you select Cancel on any Configuration Assistant screen the activation and configuration process stops You must complete the Configuration Assistant on first use in order to activate and use McAfee Fi...

Страница 80: ...ll to allow access to your computer s network shares as well as allow your computer to access other computer s shares A share is a resource such as a drive directory file or printer available to a wor...

Страница 81: ...ansfer protocol clients On this screen you will identify programs that you will allow to access the Internet through McAfee Firewall To allow specific programs to access the Internet do the following...

Страница 82: ...r and Tool bar Title bar The Home page displays most of your standard Windows elements that which includes n The title bar displays the name of the program that is currently running n Close and minimi...

Страница 83: ...ctivity n Firewall warning information If there are any communication warnings select this task to view the warning log Internet traffic settings The Internet Traffic setting frame displays your curre...

Страница 84: ...accessing McAfee Firewall Activity Log If the attacker s IP address is available you can attempt to trace the attacker using McAfee Firewall s Visual Trace component The Task pane The Task pane displa...

Страница 85: ...irewall s advanced tasks include n Advanced options and logging Select this task to configure intrusion defense mechanisms set up the automatic configuration of filtering rules and identify the type o...

Страница 86: ...y Also helps keep your firewall protections secure by preventing the firewall from being shut down without your password About Visual Trace Visual Trace is a multi purpose Internet tool used for findi...

Страница 87: ...ettings On the other hand the programs classification is personalized Whenever you run a new program that attempts to communicate over the Internet McAfee Firewall will prompt and ask you whether you...

Страница 88: ...program s first attempt to communicate will cause an alert message to display n Although the Configuration Assistant performs a thorough analysis of your computer s programs that use the Internet to...

Страница 89: ...m to the list click Add and browse to select the program you want to add To remove a program from the list select the program you want to remove and click Remove 5 Click Apply How to customize filteri...

Страница 90: ...Click Remove to remove a rule from the selected program CAUTION There is no undo feature Edit w Click Edit to refine a filtering rule Restore w Click Restore to restore the default rules for the sele...

Страница 91: ...e your changes click OK System configuration Your computer s operating system performs many types of network communication without reporting directly to you McAfee Firewall lets you explicitly allow o...

Страница 92: ...ked This protocol is often abused as a method of breaking people s network connections especially on IRC ARP Allowed ARP is a necessary Ethernet protocol and is not known to be a threat DHCP Allowed i...

Страница 93: ...etect suspicious or known attack traffic For example if McAfee Firewall sees ICMP packets it analyzes those packets for suspicious traffic patterns by comparing the ICMP traffic against known attack p...

Страница 94: ...UNREACHABLE packet This flood of incoming packets results in a denial of service attack against the target machine High IP Spoofing IP spoofing involves sending data with a falsified return IP addres...

Страница 95: ...as begun looking at your system for potential weaknesses A port scan consists of checking every TCP and or UDP port to see what services and hence what vulnerabilities might be present Low Saihyousen...

Страница 96: ...d Make sure that Load Only When Needed is not checked in the TCP IP control panel Then TCP IP is loaded all the time allowing McAfee Firewall to function while the machine is asleep High Winnuke This...

Страница 97: ...shortcuts and system file references for applications that no longer exist on your computer n Delete temporary files n Remove deleted and sent messages from a Microsoft supported e mail client i e Out...

Страница 98: ...the QuickClean Lite wizard 1 From any VirusScan Professional screen click the Other tasks Task and select Start QuickClean Lite 2 From the Windows task bar click the Start button point to Programs McA...

Страница 99: ...ecially immediately after you delete the file and before you save any new information that might be written over the deleted file s contents For privacy and security reasons you may want to be positiv...

Страница 100: ...99 and can now have the option to shred an entire drive TIP If your computer is running on Windows Me some files even if shred may be retained on your PC since these are protected by the Windows Me S...

Страница 101: ...fixes are periodically available n New product content is updated periodically n Updates to anti virus signature files are frequently available How Does the Updating Process Work Instant Updater allow...

Страница 102: ...duct You can manually update while connected to the Internet To do this select the UPDATE function from within the individual product Manual Updating provides you with explicit control of the updating...

Страница 103: ...t please visit http www mcafeehelp com Our support Web site offers 24 hour access to solutions to the most common support requests in our easy to use 3 step Answer Wizard Additionally you may use our...

Страница 104: ...sScan includes twelve 12 months of free virus protection updates obtained using Instant Updater Renewal subscriptions are available at a cost of 9 95 per year at the www McAfee at home com Buy page Pl...

Страница 105: ...bilities built into the operating system The increased traffic in larger networks requires the services of a special computer called a server Servers help larger networks operate by figuring out how t...

Страница 106: ...ch packet as it arrives to verify that it s OK Once all the packets are received TCP puts them back in their original order Of course all of this happens quickly and automatically so you will never se...

Страница 107: ...as you don t share your PIN with others and don t leave your card lying around your checking account balance is safe from prying eyes n Integrity Nothing can intervene and change the information durin...

Страница 108: ...receives information the ISP must be able to keep the information safe Hackers like to attack the security of Web servers because Web server security is still in its infancy As a consequence Web admin...

Страница 109: ...er indicates the security level of sites refer to your browsers online help or the printed documentation If SSL is so great what is the problem SSL is affected by a couple of problems One problem is t...

Страница 110: ...recipient knows how you shifted the letters they can easily decrypt the message by reversing the process Of course a brute force approach to breaking this sort of encryption would simply try all poss...

Страница 111: ...s safe to run it Both security schemes offer a level of safety but no one can yet promise that executable content is entirely safe Nasty Applets One possible security threat is a malign Java or Active...

Страница 112: ...s of contracting a PC virus are slim and even more so your chances of contracting a truly vicious virus The scariest viruses are malicious programs that intentionally corrupt or delete the data on you...

Страница 113: ...file in the case of macro viruses A virus cannot travel over your telephone line and infect your PC on its own You must first download or copy an infected application and then run the application in...

Страница 114: ...u bought with their quantity and price What information do companies get when I register products online Companies get only the information that you enter in the registration form when you register el...

Страница 115: ...store keeps on your computer holding your user name and password so that you do not need to enter this information each time you connect to the site Some stores may use the cookie information to reco...

Страница 116: ...Internet Security and Privacy 116 McAfee Internet Security 5 0...

Страница 117: ...Internet Service Provider ISP it s practically free Global access to information shopping on line banking and finance management instant messaging file sharing streaming video etc brings about today...

Страница 118: ...apture the date and time the Web bug was accessed the browser version used and even the IP address of the computer that received the Web bug To maintain your privacy against Web bugs always block Web...

Страница 119: ...nd blocking inappropriate vocabulary in more than one language M Block access to specific Web sites Proxy sites and Newsgroups If there is a specific Web site or proxy site that you do not want a user...

Страница 120: ...sage from an unknown suspicious or untrustworthy source Do not open any files attached to an e mail message unless you know what it is even though it appears the e mail message came from someone you k...

Страница 121: ...data with other networks servers and computers connected to the Internet Firewalls can hide your computer s identity For example if a hacker tries to invade your computer by scanning for a susceptible...

Страница 122: ...d install updates upon their availability Updates include patches fixes updates to DATs virus definition files content and the virus scan engine itself n Configure your Internet security programs to s...

Страница 123: ...s 64 Alert Messages 39 46 to 47 88 ActiveX delete 46 ActiveX scan 46 Cookie blocker 49 Credit card number accessed 44 Drive format 47 Guarded file 45 Harmful site 43 Identity Protector 52 Internet acc...

Страница 124: ...g protocols 78 Firewall discussed 108 Firewall Communication Alert Messages 88 Flood blocking a TCP connection 78 Flushot 94 Forgotten Administrator password 36 Fraggle 94 Frequently asked questions A...

Страница 125: ...mand Scanning 59 Oshare 95 Other Tasks 32 P Palm OS 22 Password Manager 20 48 Passwords 20 Forgotten 36 Lost 122 Password Manager 48 user 30 Using Browser Buddy 39 Web site login 34 PDA Devices suppor...

Страница 126: ...Scan for viruses now 64 Set alert preferences 85 Set Startup Options 32 Set startup options 85 Set up Home Networking 85 View Activity Log 31 View network activity 85 TCP IP 105 Teardrop 95 Technical...

Страница 127: ...Product Guide 127 Index...

Страница 128: ...on products worldwide services and support contact your authorized McAfee sales representative or visit us at Network Associates 13465 Midway Road Dallas TX 75244 972 308 9960 www mcafee at home com N...

Отзывы: