User Guide
Index
User’s Guide 369
payload, xv
polymorphic, definition of
, xvii
programs similar to
Trojan horses
, xv
worms
, xiv
recognizing when computer problems do
notresultfrom
, 73
removing
before installation, necessity of and
steps for
, 69
from infected files
, 69 to 84
reporting new strains to McAfee
, xxiv
role of PCs in spread of
, xv
script language
, xx
spread of via e-mail and Internet
, xviii
stealth, definition of
, xvii
viewing information about
, 84 to 86
why worry?
, xiii to xiv
VirusScan
Action options
choosing for in Console
, 234 to 237
configuring in VirusScan
Advanced
, 196to 198
configuring in VirusScan
Classic
, 185 to 187
Alert options
choosing in Console
, 237 to 238
configuring in Advanced
mode
, 198 to 199
as component of Active Virus Defense
suite
, 30
BIOS anti-virus features, potential
conflicts with
, 74
components included with
, 33 to 37
configuring for scan
operations
, 228to 247
control panel
choosing options for
, 302 to 304
opening
, 301to 302
understanding
, 301
default responses to virus
detection
, 80 to 82
description of program
components
, 33 to 37
detection options
choosing in Console
, 229
configuring in VirusScan
Advanced
, 190 to 196
distribution methods
, 41
exclusion options
choosing in Console
, 241 to 245
configuring in VirusScan
Advanced
, 202 to 206
installation
as best protection against
infection
, 69
what to do when virus found
during
, 69
introducing
, 29
logging options, choosing in
Console
, 239to 241
main window
use of to select responses to
infections
, 81
overview of features
, 29
password protection, configuring
, 206
property pages
Action
, 185 to 187, 196 to 198,
234 to 237
Alert
, 198 to 202, 237 to 238
Detection
, 190 to 196, 229 to 234
Exclusion
, 202 to 206, 241to 245
Report, 200 to 202, 239 to 241
Security
, 245 to 247