background image

User Guide

Содержание Internet Security Suite

Страница 1: ...User Guide...

Страница 2: ...ritten by Robert Nordier Copyright 1996 7 Robert Nordier Software written by Douglas W Sauder Software developed by the Apache Software Foundation http www apache org A copy of the license agreement f...

Страница 3: ...Reserved Are you installing your product from a CD Are you installing your product from a Web site Yes Yes No 3 Click OK 2 In the Run dialog box type D SETUP EXE where D is the letter of your CD ROM d...

Страница 4: ...year of virus signatures 60 day warranty that guarantees replacement of your software CD if it is defective or damaged SpamKiller filter updates for one year after installation when you purchase Spam...

Страница 5: ...19 Testing ActiveShield 19 Testing Scan 19 Using McAfee SecurityCenter 21 Using ActiveShield 21 Enabling or disabling ActiveShield 21 Configuring ActiveShield options 23 Understanding security alerts...

Страница 6: ...page 60 Changing application rules 61 Allowing and blocking Internet applications 61 About the Inbound Events page 62 Understanding events 63 Showing events in the Inbound Events log 65 Responding to...

Страница 7: ...ocker setting 91 Editing the Accept and Reject Cookie List 91 Changing the age group 92 Changing Internet time Limits 92 Changing the Startup user 93 Removing users 93 Blocking Web sites 93 Allowing W...

Страница 8: ...erstanding the Summary page 105 Microsoft Outlook and Outlook Express integration 105 Using McAfee SecurityCenter 106 Disabling SpamKiller 107 Adding e mail accounts 107 Adding an e mail account 108 P...

Страница 9: ...Microsoft Outlook 130 Where are the blocked messages 130 Deleting a message manually 130 Modifying how spam messages are processed 130 Tagging 130 Blocking 130 Modifying how SpamKiller processes spam...

Страница 10: ...Contents x McAfee Internet Security Suite software...

Страница 11: ...cAfee Internet Security Suite destroys viruses outwits hackers secures your personal information privatizes your Web browsing blocks ads and pop ups manages your cookies and passwords locks down your...

Страница 12: ...Privacy Service Combines personal information protection online advertisement blocking and content filtering It secures your personal information while providing greater control over your family s Int...

Страница 13: ...icrosoft Windows Messenger 3 6 or later MSN Messenger 6 0 or later Using McAfee SecurityCenter McAfee SecurityCenter is your one stop security shop accessible from its icon in your Windows system tray...

Страница 14: ...rner of the Windows desktop and contains the clock If one or more of the McAfee applications installed on your computer are disabled the McAfee icon changes to black To open McAfee SecurityCenter 1 Ri...

Страница 15: ...e any open applications 2 Open Control Panel On your Windows taskbar select Start point to Settings and then click Control Panel Windows 98 ME and 2000 On your Windows taskbar select Start and then cl...

Страница 16: ...Introduction 16 McAfee Internet Security Suite software...

Страница 17: ...aused by worm like activity and suspect scripts New features This version of VirusScan provides the following new features Spyware and adware detection and removal VirusScan identifies and removes spy...

Страница 18: ...s and worms from spreading through e mail to other computers Script monitoring for worm like activity ScriptStopper monitors suspect script executions and stops viruses and worms from spreading throug...

Страница 19: ...er Download you will see four links 4 Click eicar com If ActiveShield is working properly it detects the eicar com file immediately after you click the link You can try to delete or quarantine detecte...

Страница 20: ...Scan to check only that folder You can also put the files in random locations on your hard drive for a more convincing demonstration of Scan s abilities 3 In the Scan Options area of the Scan dialog...

Страница 21: ...y in the lower right corner of the Windows desktop and contains the clock If one or more of the McAfee applications installed on your computer are disabled the McAfee icon changes to black To open the...

Страница 22: ...starts Enabling ActiveShield To enable ActiveShield for this Windows session only Right click the McAfee icon point to VirusScan then click Enable The McAfee icon changes to red If ActiveShield is st...

Страница 23: ...computer Configuring ActiveShield options You can modify ActiveShield starting and scanning options in the ActiveShield tab of the VirusScan Options dialog box Figure 2 1 which is accessible via the...

Страница 24: ...e that you are not connected to the Internet To stop ActiveShield from starting when Windows starts 1 Right click the McAfee icon point to VirusScan then click Options The VirusScan Options dialog box...

Страница 25: ...tected e mail Tries to quarantine or delete an uncleanable e mail Includes an alert file in the inbound e mail that contains information about the actions performed to remove the possible threat Outbo...

Страница 26: ...protection mechanism detects alerts and blocks suspect activity Suspect activity might include the following actions on your computer An attempt to forward e mail to a large portion of your address bo...

Страница 27: ...NOTE If you modify the number of recipients or seconds for monitoring sent e mails it might result in invalid detections McAfee recommends that you click No to retain the default setting Otherwise cli...

Страница 28: ...TE For your protection you cannot disable auto cleaning of instant message attachments If an inbound instant message attachment is detected VirusScan performs the following steps Tries to clean the de...

Страница 29: ...n click the Scanning tab Figure 2 3 3 Click Program files and documents only then click OK Scanning for new unknown viruses If you set ActiveShield to use the default Scan for new unknown viruses reco...

Страница 30: ...y Suspect activity might include the following action on your computer A script execution that results in the creation copying or deletion of files or the opening of your Windows registry If you set A...

Страница 31: ...ms recommended option in the Advanced Options dialog box Potentially Unwanted Program PUP protection quickly detects blocks and removes spyware adware and other programs that gather and transmit your...

Страница 32: ...n your entire computer immediately Unless you choose to hide the scan prompt it will periodically remind you until you perform the scan Managing detected files 1 If ActiveShield can clean the file you...

Страница 33: ...sure that you trust the script you can allow the script to run Click Allow this script this time to let all scripts contained within a single file run once Click Continue what I was doing to ignore th...

Страница 34: ...ninstaller Click Continue what I was doing to ignore the alert and block the program this time If you a recognize the PUP or b you might have installed the PUP as part of a bundle or accepted a licens...

Страница 35: ...or delete the file Manually scanning for viruses and other threats To scan your computer 1 Right click the McAfee icon point to VirusScan then click Scan The Scan dialog box opens Figure 2 7 2 Click t...

Страница 36: ...nt viruses in a ZIP file then insert that ZIP file into another ZIP file in an effort to bypass anti virus scanners Scan can detect these viruses as long as you leave this option selected Scan for new...

Страница 37: ...he more files you have the longer the scan takes 4 Click Scan to start scanning files When the scan is finished a scan summary shows the number of files scanned the number of files detected the number...

Страница 38: ...ses and other threats in selected message stores and their subfolders mailbox folders or e mail messages containing attachments from within Microsoft Outlook 97 or later To scan e mail in Microsoft Ou...

Страница 39: ...it b Select how often to scan your computer in the Schedule Task list and then select additional options in the dynamic area below it Daily Specify the number of days between scans Weekly the default...

Страница 40: ...ans and worms Scan automatically tries to clean the file You can then choose how to manage detected files including whether to submit them to the McAfee AVERT labs for research If Scan detects a poten...

Страница 41: ...try using a Rescue Disk to start your computer The Rescue Disk in many cases can start a computer if a detected file disables it See Creating a Rescue Disk on page 43 for details For more help consult...

Страница 42: ...to its original location 5 If VirusScan cannot clean the virus click Delete to remove the file 6 If VirusScan cannot clean or delete the file and if it is not a Potentially Unwanted Program you can s...

Страница 43: ...to ensure that both the computer and the floppy disk are virus free See Manually scanning for viruses and other threats on page 35 for details 2 Right click the McAfee icon point to VirusScan then cl...

Страница 44: ...to the drive 3 Turn the computer on A gray window with several options appears 4 Choose the option that best suits your needs by pressing the Function keys for example F2 F3 NOTE Rescue Disk starts au...

Страница 45: ...3 Accept the default Yes I want to participate to anonymously send your virus information to McAfee for inclusion in its World Virus Map of worldwide detection rates Otherwise select No I don t want...

Страница 46: ...orld Virus Map web page appears Figure 2 14 By default the World Virus Map shows the number of detected computers worldwide over the past 30 days and also when the reporting data was last updated You...

Страница 47: ...Internet then notify you with alerts and sounds By default SecurityCenter automatically downloads and installs any available updates NOTE In some cases you will be prompted to restart your computer t...

Страница 48: ...Update Wizard installs the update automatically 5 Click Finish when the update is finished installing NOTE In some cases you will be prompted to restart your computer to complete the update Be sure t...

Страница 49: ...ing event reporting self testing tools and the ability to email reported events to other online authorities Provides detailed tracing and event research features New features Improved Gaming Support M...

Страница 50: ...Personal Firewall Plus improves the functionality of HackerWatch org which includes event submission of potentially malicious events to the database Extended Intelligent Application Handling When an...

Страница 51: ...follow your firewall program s uninstall instructions to do so NOTE If you use Windows XP you do not need to disable the built in firewall before installing McAfee Personal Firewall Plus However we r...

Страница 52: ...nal Firewall or set its security setting to Open without manually enabling Windows Firewall all firewall protection will be removed except for previously blocked applications Setting the security leve...

Страница 53: ...s set to the Open or Lockdown security setting To prevent this you can either change the application s permissions to Allow Full Access or delete the Blocked permission rule from the Internet Applicat...

Страница 54: ...McAfee Personal Firewall Plus You can test your Personal Firewall installation for possible vulnerabilities to intrusion and suspicious activity To test your Personal Firewall installation from the Mc...

Страница 55: ...r 1 From SecurityCenter click the Personal Firewall Plus tab 2 Select a task from the I want to menu To launch Personal Firewall from Windows 1 Right click the McAfee icon in the Windows system tray t...

Страница 56: ...Change View to open a list of Summary pages From the list select a Summary page to view Right arrow Click the right arrow icon to view the next Summary page Left arrow Click the left arrow icon to vi...

Страница 57: ...ll blocked today this week and this month Click the link to view event details from the Inbound Event page Active Applications Active Applications displays the applications that are currently running...

Страница 58: ...n Port Comparison shows a pie chart of the most frequently attempted ports on your computer during the past 30 days You can click a port name to view details from the Inbound Events page You can also...

Страница 59: ...pen the Global Threat Analysis Map in HackerWatch org Event Tracking Event Tracking shows the number of inbound events submitted to HackerWatch org Global Port Activity Global Port Activity shows the...

Страница 60: ...plications page Right click the McAfee icon in the Windows system tray point to Personal Firewall then select Applications Figure 3 2 Figure 3 2 Internet Applications page The Internet Applications pa...

Страница 61: ...her change the application s access rule to Full Access or delete the Blocked permission rule from the Internet Applications list To delete an application rule 1 Right click the McAfee icon in the Win...

Страница 62: ...rnet connections To launch the Inbound Events page Right click the McAfee icon in the Windows system tray point to Personal Firewall then select Inbound Events Figure 3 3 Figure 3 3 Inbound Events pag...

Страница 63: ...e able to receive any replies to their traffic unless the packet is received by an application that understands the contents of the packet that will include instructions specific to that application A...

Страница 64: ...gainst certain malicious traffic Events from computers on your LAN Events can be generated from computers on your local area network LAN To show that these events are generated by your network Persona...

Страница 65: ...pane Showing today s events Use this option to review the day s events To show today s events 1 Right click the McAfee icon in the Windows system tray point to Personal Firewall then select Inbound Ev...

Страница 66: ...vents 2 On the Inbound Events log right click an entry then click Show Only Events From this Day Showing events from a specific Internet address Use this option to review other events which originate...

Страница 67: ...e IP addresses for an event in the Inbound Events log or get event details at the anti hacker online community HackerWatch org web site Tracing the selected event You can try to perform a Visual Trace...

Страница 68: ...wever to filter events and email events to a friend you must sign up for the service Signing up for the service allows your submissions to be tracked and lets us notify you if HackerWatch org needs mo...

Страница 69: ...ess from accessing open ports If you see an event in the Inbound Events page that contains an IP address that you want to ban you can configure Personal Firewall to prevent connections from it at all...

Страница 70: ...k OK 4 In the dialog box click Yes to confirm your setting Click No to return to the Add Banned IP Address Rule dialog If Personal Firewall detects an event from a banned Internet connection it will a...

Страница 71: ...ive in the default location or browse to a location where you want to save the archive Note By default Personal Firewall automatically archives the Inbound Events log Check or clear Automatically arch...

Страница 72: ...hen Accessories Select Notepad 5 Click Edit and then click Paste The event text appears in Notepad Repeat this step until you have all of the necessary events 6 Save the Notepad file in a safe place D...

Страница 73: ...allowed to access the Internet has changed If you have not recently upgraded the application be careful about granting the modified application access to the Internet Application Requests Server Acce...

Страница 74: ...ind Out More Information to get details about the event through the Inbound Events log see About the Inbound Events page on page 62 for details Click Launch McAfee VirusScan to scan your computer for...

Страница 75: ...plications Figure 3 5 Application Wants to Access the Internet alert If an alert appears recommending caution in allowing the application Internet access you can click Click here to learn more to get...

Страница 76: ...to allow the application an outbound and inbound Internet connection Click Grant Access Once to grant the application a temporary Internet connection Access is limited to the time the application lau...

Страница 77: ...ert If you selected Tight security in the Security Settings options Personal Firewall displays an alert Figure 3 8 when it detects that an application you have previously allowed to access the Interne...

Страница 78: ...ically allow the application Internet access Application Allowed to Access the Internet alert If you selected Trusting security in the Security Settings options Personal Firewall automatically grants...

Страница 79: ...ent then choose from these options Click View the Application Log to get details about the event through the Internet Applications Log see About the Internet Applications page on page 60 for details C...

Страница 80: ...fic Figure 3 10 Connection Attempt Blocked alert View a brief description of the event then choose from these options Click View the Event Log to get details about the event through the Personal Firew...

Страница 81: ...restore Save and restore Privacy Service settings at any time Web bug blocker Block Web bugs objects obtained at potentially harmful web sites so that they are not loaded within browsed web pages Pop...

Страница 82: ...e Setting up a Pre installed version of Privacy Service on page 82 and your PC manufacturer s documentation Setting up a Pre installed version of Privacy Service If Privacy Service is pre installed on...

Страница 83: ...from Safe Mode Windows 2000 and Windows XP only Removing Privacy Service with Safe Mode To remove Privacy Service with Safe Mode 1 Click Start and point to Shut Down The Shut Down Windows dialog box a...

Страница 84: ...l down menu 2 Enter your password in the Password field 3 Select Make this user the Startup User and then sign in Using McAfee SecurityCenter McAfee SecurityCenter is your one stop security shop acces...

Страница 85: ...ervice 1 Right click the McAfee icon in the Windows system tray point to McAfee Privacy Service and then select Sign In 2 Select your user name from the User name pull down menu 3 Enter your Password...

Страница 86: ...u must be logged in to Privacy Service as the Administrator to un install the product If this McAfee product is pre installed on your computer see your PC manufacturer s documentation for information...

Страница 87: ...tion process Installing Privacy Service To install Privacy Service 1 Go to the McAfee Web site and navigate to the Privacy Service page 2 Click the Download link on the Privacy Service page 3 Click Ye...

Страница 88: ...u assign a password to an older teenager or an adult make the password more complex Setting the age group Select the appropriate age based setting and then click Next Setting the cookie blocker Select...

Страница 89: ...If a user tries to use the Internet when they are not allowed to Privacy Service displays a message telling the user that they are not allowed to use the Internet at this time To prohibit Internet us...

Страница 90: ...nd those that appear below it are allowed to access Web sites where the word exists To modify existing Web site permissions 1 Right click the McAfee icon in the Windows system tray point to Privacy Se...

Страница 91: ...e appropriate option Reject all cookies Renders cookies unreadable to the web sites that sent them Some web sites require you to enable cookies to work properly Prompt user to accept cookies Enables y...

Страница 92: ...rmit unlimited Internet access 1 Select Can use Internet anytime and click Apply 2 Click OK in the confirmation dialog box To restrict Internet access 1 Select Restrict Internet usage and click Edit 2...

Страница 93: ...nfirmation dialog box 3 Close the Privacy Service window when you are finished making changes To configure Privacy Service options you must sign in to Privacy Service as the Administrator Blocking Web...

Страница 94: ...FE For example if you send the e mail Lance Armstrong wins tour and Armstrong is set as personal information that is to be blocked then the e mail that is actually sent is Lance MFEMFEMFE wins tour Ad...

Страница 95: ...ser windows presenting unwanted advertisements which automatically display when as you visit a web site Privacy Service only blocks those pop ups that are automatically loaded when a web page loads Po...

Страница 96: ...To save or view a saved log select the Saved Logs tab Date and time By default the Event Log displays information in chronological order with the most recent events at the top If the Event Log entrie...

Страница 97: ...Log 4 In the Select a saved log to view dialog select the backup database file and click Open To access the utilities you must sign in to Privacy Service as the Administrator and then click Utilities...

Страница 98: ...documents that you had deleted could be obtained What McAfee Shredder erases With McAfee Shredder you can securely and permanently erase One or more files or folders An entire disk The trails that yo...

Страница 99: ...Confirm password field and then click Backup 5 Click OK in the confirmation dialog box 6 Close the Privacy Service window when you are finished NOTE Keep this password secret and do not forget it You...

Страница 100: ...think someone knows your password This helps prevent others from using the Internet with your user name Changing your password 1 Right click the McAfee icon point to McAfee Privacy Service and then se...

Страница 101: ...ck OK to close the Internet Options dialog box Accepting cookies This option is available only if the Administrator allows you to accept or reject cookies as they are intercepted If you access web sit...

Страница 102: ...cookies you can reject the cookies without being prompted 1 Right click the McAfee icon point to McAfee Privacy Service and then select Options 2 Click Rejected Cookies 3 Enter the URL of the web sit...

Страница 103: ...ort friends addresses into the Friends List Fight back against spammers report spam complain about spam create custom filters Protect children from viewing spam messages One click block and one click...

Страница 104: ...nterface for keeping your computer free of spam Support free live instant messaging and e mail technical support for easy prompt and live customer service Spam message processing by default spam messa...

Страница 105: ...hat SpamKiller blocked messages removed from your Inbox E mail Overview the total number of e mail spam blocked messages and percentage of total spam you have received Recent Spam a breakdown of the t...

Страница 106: ...yCenter provides a consolidated view of your computer s security status plus the latest security and virus alerts You can run SecurityCenter from the McAfee icon in your Windows system tray or from yo...

Страница 107: ...le To enable filtering Right click the McAfee icon point to SpamKiller and then click Enable Or click the Summary tab and then click Click here to enable Adding e mail accounts You can add the followi...

Страница 108: ...l Accounts wizard appears 3 Follow the instructions on the dialog boxes that appear If you add an MSN Hotmail account SpamKiller searches for an MSN Hotmail address book to import into your Personal F...

Страница 109: ...hange the e mail address the account description server information how often SpamKiller checks the account for spam and how your computer connects to the Internet POP3 accounts Editing POP3 accounts...

Страница 110: ...nternet 6 Click the Connection tab to specify how SpamKiller dials an Internet connection so that it can check your Inbox for new messages to filter Never dial a connection SpamKiller does not automat...

Страница 111: ...amKiller waits to receive e mail before timing out and stopping Increase the server time out value if you have problems receiving mail Your e mail connection might be slow therefore increasing the ser...

Страница 112: ...nt Outgoing e mail name of the server that sends outgoing mail Use an SMTP server for outgoing e mail if you plan to send error messages and do not want to include the MSN signature line in the error...

Страница 113: ...ilter Hotmail accounts directly See the online help for details However you cannot block messages or add friends using the SpamKiller toolbar in Outlook or Outlook Express until you configure your Hot...

Страница 114: ...edit profile information Profile MAPI profile for the account Password password that corresponds with the MAPI profile if you have set one up not necessarily the e mail account password 5 Click the C...

Страница 115: ...permissions for each user type Administrators can perform all tasks while limited users can only perform tasks according to their personal profiles For example administrators can view the whole conten...

Страница 116: ...SpamKiller administrator user can create a new password for you Adding a user to SpamKiller 1 Click the Settings tab and then click Users 2 Click Add A list of Windows users appears To add a user who...

Страница 117: ...r located at the top of the page The Switch User dialog box appears 2 Select a user and then click OK If the user has a password the Log On dialog box appears Type the user password in the Password bo...

Страница 118: ...a friend and the total number of messages received from that friend Click the E mail Addresses tab to view e mail addresses on the Friends List Click the Domains tab to view domain addresses on the l...

Страница 119: ...your computer runs Windows 2000 or Windows XP and multiple users were added to SpamKiller limited users can only view their Personal Friends List Figure 5 3 Friends page Importing address books Impor...

Страница 120: ...e Schedule box select how often SpamKiller must check the address book for new addresses 5 Click OK After an update new addresses appear in your Personal Friends List Importing an address book manuall...

Страница 121: ...ically 1 Click the Settings tab and then click Address Books 2 Select an address book and then click Edit 3 Edit address book information and then click OK Deleting an address book from the automatic...

Страница 122: ...ail page appears 2 Select a message from a sender that you want to add to a Friends List and then click Add a Friend 3 In the Address box type the address to add to the Friends List The Address box mi...

Страница 123: ...address to the Global Friends List only ensure that the checkbox is not selected 5 Click OK All messages from that friend are marked as being messages from a friend and appear in the Accepted E Mail...

Страница 124: ...down arrow on one of the tabs and then select Personal Friends List NOTE If your computer runs Windows 2000 or Windows XP and multiple users were added to SpamKiller only administrators can access th...

Страница 125: ...ave been added to SpamKiller and you are logged on to SpamKiller as a limited user the message contents do not appear in the bottom preview pane The middle pane shows message details Click the down ar...

Страница 126: ...Error message sent an error message was sent to the reply address in the spam message Complaint and error messages sent both a complaint and error message were sent For more information on where block...

Страница 127: ...ane explains if a message was sent by someone on a Friends List or if the message fits the criteria of a filter but the filter action was set to either Accept or Mark as Possible Spam Click the down a...

Страница 128: ...a message back in your Inbox this option appears on the Blocked E mail page only and open the Rescue Options dialog box You can automatically add the sender to your Friends list and rescue all message...

Страница 129: ...your Inbox and the Accepted E mail page From the SpamKiller folder in Microsoft Outlook or Outlook Express Select the message s and click Rescue Selection from the SpamKiller menu or toolbar Your sele...

Страница 130: ...nually 1 Click the Messages tab and then click the Blocked E mail tab Or From the SpamKiller menu in Microsoft Outlook or Outlook Express select View Blocked Messages to open the Blocked E mail page f...

Страница 131: ...u specify Keep accepted e mail for ____ days accepted messages remain in the Accepted E mail page for the duration you specify 3 Click OK Using the AntiPhishing filter Unsolicited e mail is categorize...

Страница 132: ...Accepted E mail tab and click Add a Filter 2 Click Add to begin creating a filter condition The Filter Condition dialog box appears 3 Create a filter condition by following these steps A filter condi...

Страница 133: ...t match both filter conditions If you want SpamKiller to look for messages that match either one of the conditions change and to or by clicking and and then selecting or from the box that appears b Cl...

Страница 134: ...1er and V1AGRA but not SpamKiller and VIAGRA Marks the next character as either a special character or a literal For example n matches the character n n matches a new line character The sequence match...

Страница 135: ...o 0 1 is equivalent to o xyz A character set Matches any one of the enclosed characters For example abc matches the a in plain xyz A negative character set Matches any character not enclosed For exam...

Страница 136: ...acter w Matches any word character including underscore Equivalent to A Za z0 9_ W Matches any non word character Equivalent to A Za z0 9_ num Matches num where num is a positive integer A reference b...

Страница 137: ...vent a sender from sending you more spam For more information on sending complaints see Sending Complaints and Error Messages in the online Help 1 Click the Messages tab and then click the Blocked E m...

Страница 138: ...Starting the SpamKiller server manually This section only applies to Microsoft Windows 2000 and XP users 1 Click Start and select Run 2 Type SERVICES MSC and click OK 3 Right click the McAfee SpamKill...

Страница 139: ...error message if necessary 2 Verify that you are connected to the Internet by surfing to a site Verifying the POP3 server address for SpamKiller 1 Right click the McAfee icon in the system tray lower...

Страница 140: ...McAfee SpamKiller 140 McAfee Internet Security Suite software...

Страница 141: ...rs 132 adding users 87 content blocking 88 cookie blocking 88 Internet time limits 89 administrator 81 115 to 116 retrieving password 83 alerts Application Has Been Modified 73 Application Requests In...

Страница 142: ...from 0 0 0 0 63 from 127 0 0 1 63 from computers on your LAN 64 from private IP addresses 64 HackerWatch org advice 67 loopback 63 more information 67 reporting 68 responding to 67 showing all 65 from...

Страница 143: ...ts 34 cleaning 40 deleting 41 detecting 40 quarantining 40 removing 34 trusting 34 protecting children 116 Q Quarantine adding suspect files 41 cleaning files 41 to 42 deleting files 41 deleting suspe...

Страница 144: ...page 108 setup assistant 82 showing events in the Event Log 65 Shredder 97 SpamKiller Accepted E mail page 127 Blocked E mail page 125 disabling filtering 107 enabling filtering 107 Startup user 84 88...

Страница 145: ...al worms 33 stopping suspect scripts 33 VirusScan reporting viruses automatically 44 46 scanning via Microsoft Outlook toolbar 38 scanning via Windows Explorer 38 scheduling scans 38 testing 19 updati...

Отзывы: