User Guide
i Contents McAfee Total Protection 3 McAfee SecurityCenter....................................................................................................... 5 SecurityCenter features ............................................................................................ 6 Using SecurityCenter ................................................................................................ 7 Fixing or ignoring protection problems ................................................................
ii Contents McAfee Shredder............................................................................................................. 197 Shredder features .................................................................................................. 198 Shredding files, folders, and disks........................................................................ 199 McAfee Network Manager..............................................................................................
3 CHAPTER 1 McAfee Total Protection More than just security for your computer, Total Protection is a complete defense system for you and your family as you work or play online. You can use Total Protection to protect your computer against viruses, hackers, and spyware; monitor Internet traffic for suspicious activity; guard your family’s privacy; block risky Web sites; and more. In this chapter McAfee SecurityCenter ...............................................5 McAfee VirusScan .......................
5 CHAPTER 2 McAfee SecurityCenter McAfee SecurityCenter allows you to monitor your computer's security status, know instantly whether your computer's virus, spyware, e-mail, and firewall protection services are up-to-date, and act on potential security vulnerabilities. It provides the navigational tools and controls you need to coordinate and manage all areas of your computer's protection.
6 McAfee Total Protection SecurityCenter features Simplified protection status Easily review your computer's protection status, check for updates, and fix protection problems. Automated updates and upgrades SecurityCenter automatically downloads and installs updates for your programs. When a new version of a McAfee program is available, it is automatically delivered to your computer as long as your subscription is valid, ensuring that you always have up-to-date protection.
7 CHAPTER 3 Using SecurityCenter Before you begin using SecurityCenter, review the components and configuration areas you will use to manage your computer's protection status. For more information about the terminology used in this image, see Understanding protection status (page 8) and Understanding protection categories (page 9). Then, you can review your McAfee account information and verifying the validity of your subscription. In this chapter Understanding protection status..........................
8 McAfee Total Protection Understanding protection status Your computer's protection status is shown in the protection status area on the SecurityCenter Home pane. It indicates whether your computer is fully protected against the latest security threats and can be influenced by things like external security attacks, other security programs, and programs that access the Internet. Your computer's protection status can be red, yellow, or green.
Chapter 3 McAfee Total Protection 9 Understanding protection categories SecurityCenter's protection services are divided into four categories: Computer & Files, Internet & Network, E-mail & IM, and Parental Controls. These categories help you to browse and configure the security services protecting your computer. Click a category name to configure its protection services and view any security problems detected for those services.
10 McAfee Total Protection Understanding protection services Protection services are the various security components that you configure to protect your computer and files. Protection services directly correspond to McAfee programs. For example, when you install VirusScan, the following protection services become available: Virus Protection, Spyware Protection, SystemGuards, and Script Scanning. For detailed information about these particular protection services, see the VirusScan help.
Chapter 3 McAfee Total Protection 11 Managing your subscriptions Each McAfee protection product that you purchase comes with a subscription that lets you use the product on a certain number of computers for a certain period of time. The length of your subscription varies according to your purchase, but usually starts when you activate your product.
12 McAfee Total Protection Renew your subscription Shortly before your subscription is about to expire, you'll see a link in SecurityCenter prompting you to renew. We'll also notify you periodically about pending expiration with alerts. On the SecurityCenter Home pane, under SecurityCenter Information, click Renew. Tip: You can also renew your product from the notification message that periodically appears. Or, go to your Account page, where you can renew or set up auto-renewal.
13 CHAPTER 4 Updating SecurityCenter SecurityCenter ensures that your registered McAfee programs are current by checking for and installing online updates every four hours. Depending on the programs you have installed and activated, online updates may include the latest virus definitions and hacker, spam, spyware, or privacy protection upgrades. If you want to check for updates within the default four hour period, you can do so at any time.
14 McAfee Total Protection Configure automatic updates By default, SecurityCenter automatically checks for and installs updates every four hours when your computer is connected to the Internet. If you want to change this default behavior, you can configure SecurityCenter to automatically download updates and then notify you when the updates are ready to be installed or to notify you before downloading the updates.
Chapter 4 McAfee Total Protection 15 1. Under Common Tasks, click Home. 2. On the right pane, under SecurityCenter Information, click Configure. 2 On the SecurityCenter Configuration pane, under Automatic updates are enabled, click Off. 3 In the confirmation dialog box, click Yes. Tip: You enable automatic updates by clicking the On button or by clearing Disable automatic updating and let me manually check for updates on the Update Options pane.
16 McAfee Total Protection Fixing or ignoring protection problems SecurityCenter reports critical and non-critical protection problems as soon as it detects them. Critical protection problems require immediate action and compromise your protection status (changing the color to red). Non-critical protection problems do not require immediate action and may or may not compromise your protection status (depending on the type of problem).
Chapter 4 McAfee Total Protection 17 Fixing protection problems Most security problems can be fixed automatically; however, some problems may require you to take action. For example, if Firewall Protection is disabled, SecurityCenter can enable it automatically; however, if Firewall Protection is not installed, you must install it.
18 McAfee Total Protection Fix protection problems manually If one or more protection problems persist after you try to fix them automatically, you can fix the problems manually. 1 Under Common Tasks, click Home. 2 On the SecurityCenter Home pane, click the protection category in which SecurityCenter reports the problem. 3 Click the link following the description of the problem.
Chapter 4 McAfee Total Protection 19 Ignoring protection problems If SecurityCenter detects a non-critical problem, you can either fix or ignore it. Other non-critical problems (for example, if Anti-Spam or Parental Controls are not installed) are automatically ignored. Ignored problems are not shown in the protection category information area on the SecurityCenter Home pane, unless your computer's protection status is green.
20 McAfee Total Protection 4 Click OK. Tip: You can also ignore a problem by clicking the Ignore link beside the reported problem in the protection category information area.
21 CHAPTER 5 Working with alerts Alerts are small pop-up dialog boxes that appear in the bottom-right corner of your screen when certain SecurityCenter events occur. An alert provides detailed information about an event as well as recommendations and options for resolving problems that may be associated with the event. Some alerts also contain links to additional information about the event. These links let you launch McAfee's global Web site or send information to McAfee for troubleshooting.
22 McAfee Total Protection Showing and hiding informational alerts Informational alerts notify you when events occur that do not pose threats to your computer's security. For example, if you have set up Firewall Protection, an informational alert appears by default whenever a program on your computer is granted access to the Internet. If you do not want a specific type of informational alert to appear, you can hide it. If you do not want any informational alerts to appear, you can hide them all.
Chapter 5 McAfee Total Protection 23 Show or hide informational alerts when gaming You can hide informational alerts when you are playing a game in full-screen mode on your computer. When you finish the game and exit full-screen mode, SecurityCenter starts displaying informational alerts again. 1 Open the Alert Options pane. How? 1. Under Common Tasks, click Home. 2. On the right pane, under SecurityCenter Information, click Configure. 3. Under Alerts, click Advanced.
24 McAfee Total Protection Configuring alert options The appearance and frequency of alerts is configured by SecurityCenter; however, you can adjust some basic alert options. For example, you can play a sound with alerts or hide the splash screen alert from displaying when Windows starts. You can also hide alerts that notify you about virus outbreaks and other security threats in the online community.
Chapter 5 McAfee Total Protection 25 Hide virus outbreak alerts You can hide alerts that notify you about virus outbreaks and other security threats in the online community. 1 Open the Alert Options pane. How? 1. Under Common Tasks, click Home. 2. On the right pane, under SecurityCenter Information, click Configure. 3. Under Alerts, click Advanced. 2 On the Alert Options pane, clear the Alert me when a virus or security threat occurs check box.
27 CHAPTER 6 Viewing events An event is an action or configuration change that occurs within a protection category and its related protection services. Different protection services record different types of events. For example, SecurityCenter records an event if a protection service is enabled or disabled; Virus Protection records an event each time a virus is detected and removed; and Firewall Protection records an event each time an Internet connection attempt is blocked.
29 CHAPTER 7 McAfee VirusScan VirusScan's advanced detection and protection services defend you and your computer from the latest security threats, including viruses, Trojans, tracking cookies, spyware, adware, and other potentially unwanted programs. Protection extends beyond the files and folders on your desktop, targeting threats from different points of entry—including e-mail, instant messages, and the Web.
30 McAfee Total Protection VirusScan features Comprehensive virus protection Defend yourself and your computer from the latest security threats, including viruses, Trojans, tracking cookies, spyware, adware, and other potentially unwanted programs. Protection extends beyond the files and folders and on your desktop, targeting threats from different points of entry—including e-mail, instant messages, and the Web. No tedious administration required.
31 CHAPTER 8 Scanning your computer Even before you start SecurityCenter for the first time, VirusScan's real-time virus protection starts protecting your computer from potentially harmful viruses, Trojans, and other security threats. Unless you disable real-time virus protection, VirusScan constantly monitors your computer for virus activity, scanning files each time you or your computer access them, using the real-time scanning options that you set.
32 McAfee Total Protection To... Do this... Start Real-time scanning 1. Open the Computer & Files to constantly monitor Configuration pane. your computer for virus How? activity, scanning files each time you or your 1. On the left pane, click computer access them Advanced Menu. 2. Click Configure. 3. On the Configure pane, click Computer & Files. 2. Under Virus protection, click On. Note: Real-time scanning is enabled by default.
Chapter 8 McAfee Total Protection To... Do this... Start a Scheduled Scan that periodically scans your computer for threats 1. Open the Scheduled Scan pane. 33 How? 1. Under Common Tasks, click Home. 2. On the SecurityCenter Home pane, click Computer & Files. 3. In the Computer & Files information area, click Configure. 4. On the Computer & Files Configuration pane, ensure that virus protection is enabled, and click Advanced. 5. Click Scheduled Scan in the Virus Protection pane. 2.
34 McAfee Total Protection To... Do this... View scan results in the alert View scan results in the Scan completed alert. View more information about scan results Click View scan details in the Scan completed alert. View a quick summary of Point to the Scan completed icon in the the scan results notification area on your taskbar. View scan and detection Double-click the Scan completed icon in statistics the notification area on your taskbar. View details about 1.
35 CHAPTER 9 Working with scan results If VirusScan detects a security threat while running a scan, it tries to handle the threat automatically according to the threat type. For example, If VirusScan detects a virus, Trojan, or tracking cookie on your computer, it tries to clean the infected file. VirusScan always quarantines a file before attempting to clean it. If it's not clean, the file is quarantined. With some security threats, VirusScan may not be able to clean or quarantine a file successfully.
36 McAfee Total Protection 1. Double-click the Scan completed icon in the notification area at the far right of your taskbar. 2. On the Scan pane, click Details. 2 In the scan results list, click Viruses and Trojans. Note: To work with the files that VirusScan has quarantined, see Work with quarantined files (page 36). Work with potentially unwanted programs If VirusScan detects a potentially unwanted program on your computer, you can either remove or trust the program.
Chapter 9 McAfee Total Protection 4 37 To remove the infected file from your computer, click Remove. Click Yes to confirm your selected option. Tip: You can restore or remove multiple files at the same time. Work with quarantined programs and cookies When VirusScan quarantines potentially unwanted programs or tracking cookies, it encrypts and then moves them to a protected folder to prevent the programs or cookies from harming your computer. You can then restore or remove the quarantined items.
38 McAfee Total Protection Scan types VirusScan provides a complete set of scanning options for virus protection, including real-time scanning (which constantly monitors your PC for threat activity), manual scanning from Windows Explorer, and the ability to run a full, quick, custom scan from SecurityCenter, or customize when scheduled scans will occur. Scanning in SecurityCenter offers the advantage of changing scanning options on-the-fly.
Chapter 9 McAfee Total Protection 39 Manual Scan allows you to quickly check for threats in files, folders, and drives on the fly from Windows Explorer. Schedule scan Scheduled scans thoroughly check your computer for viruses and other threats any day and time of the week. Scheduled scans always check your entire computer using your default scan options. By default, VirusScan performs a scheduled scan once a week.
41 CHAPTER 10 Using additional protection In addition to real-time virus protection, VirusScan provides advanced protection against scripts, spyware, and potentially harmful e-mail and instant message attachments. By default, script scanning, spyware, e-mail, and instant messaging protection are turned on and protecting your computer. Script scanning protection Script scanning protection detects potentially harmful scripts and prevents them from running on your computer or web browser.
42 McAfee Total Protection Start script scanning protection Turn on script scanning protection to detect potentially harmful scripts and prevent them from running on your computer. Script scanning protection alerts you when a script tries to create, copy, or delete files on your computer, or make changes to your Windows registry. 1 Open the Computer & Files Configuration pane. How? 1. On the left pane, click Advanced Menu. 2. Click Configure. 3. On the Configure pane, click Computer & Files.
Chapter 10 McAfee Total Protection 43 1. On the left pane, click Advanced Menu. 2. Click Configure. 3. On the Configure pane, click E-mail & IM. 2 Under E-mail protection, click On. Note: Although you can turn off e-mail protection at any time, doing so leaves your computer vulnerable to e-mail threats. Start instant messaging protection Turn on instant messaging protection to detect security threats that can be included in inbound instant message attachments.
45 CHAPTER 11 Setting up virus protection You can set different options for scheduled, custom, and real-time scanning. For example, because real-time protection continuously monitors your computer, you might select a certain set of basic scanning options, reserving a more comprehensive set of scanning options for manual, on-demand protection. You can also decide how you would like VirusScan to monitor and manage potentially unauthorized or unwanted changes on your PC using SystemGuards and Trusted Lists.
46 McAfee Total Protection Setting real-time scan options When you start real-time virus protection, VirusScan uses a default set of options to scan files; however, you can change the default options to suit your needs. To change real-time scanning options, you must make decisions about what VirusScan checks for during a scan, as well as the locations and file types it scans.
Chapter 11 McAfee Total Protection To... Do this... Detect cookies Select Scan and remove tracking cookies. Detect viruses and other potential threats on drives that are connected to your network Select Scan network drives. 47 Protect your computer from Select Enable buffer overflow buffer overflows protection. Specify which types of files to scan Click either All files (recommended) or Program files and documents only.
48 McAfee Total Protection Setting custom scan options Custom virus protection lets you scan files on demand. When you start a custom scan, VirusScan checks your computer for viruses and other potentially harmful items using a more comprehensive set of scanning options. To change custom scanning options, you must make decisions about what VirusScan checks for during a scan.
Chapter 11 McAfee Total Protection 49 1. Under Common Tasks, click Home. 2. On the SecurityCenter Home pane, click Computer & Files. 3. In the Computer & Files information area, click Configure. 4. On the Computer & Files Configuration pane, ensure that virus protection is enabled, and click Advanced. 5. Click Custom Scan in the Virus Protection pane. 2 Specify your custom scanning options, and then click OK. To... Do this...
50 McAfee Total Protection To... Do this... Scan critical system files Clear the (My) Computer check box, and then select the Critical System Files check box.
Chapter 11 McAfee Total Protection 51 Scheduling a scan Schedule scans to thoroughly check your computer for viruses and other threats any day and time of the week. Scheduled scans always check your entire computer using the default scan options. By default, VirusScan performs a scheduled scan once a week.
52 McAfee Total Protection Using SystemGuards options SystemGuards monitor, log, report, and manage potentially unauthorized changes made to the Windows registry or critical system files on your computer. Unauthorized registry and file changes can harm your computer, compromise its security, and damage valuable system files. Registry and files changes are common and occur regularly on your computer.
Chapter 11 McAfee Total Protection 53 Like Program and Windows SystemGuards, Browser SystemGuards detect potentially unauthorized changes to your computer's registry and other critical files that are essential to Windows. Browser SystemGuards, however, monitor changes to important registry items and files like Internet Explorer add-ons, Internet Explorer URLs, and Internet Explorer security zones.
54 McAfee Total Protection 3 Browser SystemGuards Under I want to, do one of the following: To detect, log, and report unauthorized registry and file changes associated with Program, Windows, and Browsers SystemGuards, click Show alerts. To detect and log unauthorized registry and file changes associated with Program, Windows, and Browsers Systemguards, click Only log changes.
Chapter 11 McAfee Total Protection 55 Windows SystemGuards technology helps prevent your computer from sending and receiving unauthorized or personal information over the Internet. It also helps stop suspect programs that can bring unwanted changes to the appearance and behavior of the programs that are important to you and your family. SystemGuard Detects... Context Menu Handlers Unauthorized registry changes to Windows context menu handlers that can affect the appearance and behavior of Windows menus.
56 McAfee Total Protection SystemGuard Detects... Windows Messenger Service Spyware, adware, and other potentially unwanted programs that can make registry changes to the Windows messenger service, allowing unsolicited ads and remotely run programs on your computer. Windows Win.ini File Spyware, adware, and other potentially unwanted programs that can make changes to the Win.ini file, allowing suspect programs to run when you start your computer.
Chapter 11 McAfee Total Protection SystemGuard Detects... Internet Explorer Restrictions Spyware, adware, and other potentially unwanted programs that can make registry changes to Internet Explorer restrictions, affecting browser settings and options. Internet Explorer Security Zones Spyware, adware, and other potentially unwanted programs that can make registry changes to Internet Explorer security zones, allowing potentially harmful files to run when you start your computer.
58 McAfee Total Protection Using trusted lists If VirusScan detects a file or registry change (SystemGuard), program, or buffer overflow, it prompts you to trust or remove it. If you trust the item and indicate that you do not want to receive future notification about its activity, the item is added to a trusted list and VirusScan no longer detects it or notifies you about its activity. If an item has been added to a trusted list, but you decide you want to block its activity, you can do so.
Chapter 11 McAfee Total Protection 4 59 Click OK. Note: For more information about trusted list types, see About trusted lists types (page 59). About trusted lists types SystemGuards on the Trusted Lists pane represent previously unauthorized registry and file changes that VirusScan has detected but that you have chosen to allow from an alert of from the Scan results pane.
60 McAfee Total Protection Option Description Browser Browser SystemGuards on the Trusted Lists pane SystemGuards represent previously unauthorized registry and file changes that VirusScan has detected, but that you have chosen to allow from an alert or from the Scan Results pane. Browser SystemGuards detect unauthorized registry changes and other unwanted behavior associated with Browser helper objects, Internet Explorer add-ons, Internet Explorer URLs, Internet Explorer security zones, and so on.
61 CHAPTER 12 McAfee Personal Firewall Personal Firewall offers advanced protection for your computer and your personal data. Personal Firewall establishes a barrier between your computer and the Internet, silently monitoring Internet traffic for suspicious activities. Note: SecurityCenter reports critical and non-critical protection problems as soon as it detects them. If you need help diagnosing your protection problems, you can run McAfee Virtual Technician.
62 McAfee Total Protection Personal Firewall features Standard and custom protection levels Guard against intrusion and suspicious activity using Firewall's default or customizable protection settings. Real-time recommendations Receive recommendations, dynamically, to help you decide whether programs should be allowed Internet access or network traffic should be trusted.
63 CHAPTER 13 Starting Firewall As soon as you install Firewall, your computer is protected from intrusion and unwanted network traffic. In addition, you are ready to handle alerts and manage inbound and outbound Internet access for known and unknown programs. Smart Recommendations and Automatic security level (with the option selected to allow programs outgoing-only Internet access) are automatically enabled.
64 McAfee Total Protection Stop firewall protection You can disable Firewall if you do not want to protect your computer from intrusion and unwanted network traffic. When Firewall is disabled, you cannot manage inbound or outbound Internet connections. 1 On the McAfee SecurityCenter pane, click Internet & Network, and then click Configure. 2 On the Internet & Network Configuration pane, under Firewall protection is enabled, click Off.
65 CHAPTER 14 Working with alerts Firewall employs an array of alerts to help you manage your security. These alerts can be grouped into three basic types: Red alert Yellow alert Green alert Alerts can also contain information to help you decide how to handle alerts or get information about programs running on your computer. In this chapter About alerts..................................................................
66 McAfee Total Protection About alerts Firewall has three basic alert types. As well, some alerts include information to help you learn or get information about programs running on your computer. Red alert A red alert appears when Firewall detects, then blocks, a Trojan on your computer, and recommends that you scan for additional threats. A Trojan appears to be a legitimate program, but can disrupt, damage, and provide unauthorized access to your computer. This alert occurs in every security level.
67 CHAPTER 15 Managing informational alerts Firewall allows you to display or hide informational alerts when it detects intrusion attempts or suspicious activity during certain events, for example, during full-screen gameplay. In this chapter Display alerts while gaming........................................67 Hide informational alerts ...........................................
69 CHAPTER 16 Configuring Firewall protection Firewall offers a number of methods to manage your security and to tailor the way you want to respond to security events and alerts. After you install Firewall for the first time, your computer's protection security level is set to Automatic and your programs are allowed outgoing-only Internet access. However, Firewall provides other levels, ranging from highly restrictive to highly permissive.
70 McAfee Total Protection Managing Firewall security levels Firewall's security levels control the degree to which you want to manage and respond to alerts. These alerts appear when it detects unwanted network traffic and inbound and outbound Internet connections. By default, Firewall's security level is set to Automatic, with outgoing-only access.
Chapter 16 McAfee Total Protection 71 Set security level to Stealth You can set the Firewall security level to Stealth to block all inbound network connections, except open ports, to hide your computer's presence on the Internet. 1 On the McAfee SecurityCenter pane, click Internet & Network, then click Configure. 2 On the Internet & Network Configuration pane, under Firewall protection is enabled, click Advanced.
72 McAfee Total Protection 5 Click OK. Note: The Allow Outgoing-Only Access is the default option.
Chapter 16 McAfee Total Protection 73 Configuring Smart Recommendations for alerts You can configure Firewall to include, exclude, or display recommendations in alerts when any programs try to access the Internet. Enabling Smart Recommendations helps you decide how to handle alerts. When Smart Recommendations is applied (and the security level is set to Automatic with outgoing-only access enabled), Firewall automatically allows known programs, and blocks potentially dangerous programs.
74 McAfee Total Protection Disable Smart Recommendations You can disable Smart Recommendations for Firewall to allow or block programs, and alert you about unrecognized and potentially dangerous programs. However, the alerts exclude any recommendations about handling access for programs. If Firewall detects a new program that is suspicious or is known to be a possible threat, it automatically blocks the program from accessing the Internet.
Chapter 16 McAfee Total Protection 75 Optimizing Firewall security The security of your computer can be compromised in many ways. For example, some programs can attempt to connect to the Internet as Windows® starts up. Also, sophisticated computer users can trace (or ping) your computer to determine whether it is connected to a network. As well, they can send information to your computer, using the UDP protocol, in the form of message units (datagrams).
76 McAfee Total Protection Configure ping request settings You can allow or prevent detection of your computer on the network by other computer users. 1 On the McAfee SecurityCenter pane, click Internet & Network, then click Configure. 2 On the Internet & Network Configuration pane, under Firewall protection is enabled, click Advanced.
Chapter 16 McAfee Total Protection 77 Configure intrusion detection You can detect intrusion attempts to protect your computer from attacks and unauthorized scans. The standard Firewall setting includes automatic detection for the most common intrusion attempts, such as Denial of Service attacks or exploits; however, you can disable automatic detection for one or more attacks or scans. 1 On the McAfee SecurityCenter pane, click Internet & Network, then click Configure.
78 McAfee Total Protection Locking and restoring Firewall Lockdown instantly blocks all inbound and outbound network connections, including access to Web sites, e-mail, and security updates. Lockdown has the same result as disconnecting the network cables on your computer. You can use this setting to block open ports on the System Services pane and to help you isolate and troubleshoot a problem on your computer.
Chapter 16 McAfee Total Protection 79 Restore Firewall settings You can quickly restore Firewall to its original protection settings. This resets your security level to Automatic and allows outgoing-only network access, enables Smart Recommendations, restores the list of default programs and their permissions in the Program Permissions pane, removes trusted and banned IP addresses, and restores system services, event log settings, and intrusion detection.
81 CHAPTER 17 Managing programs and permissions Firewall allows you to manage and create access permissions for existing and new programs that require inbound and outbound Internet access. Firewall lets you control full or outbound-only access for programs. You can also block access for programs. In this chapter Allowing Internet access for programs ......................82 Allowing outbound-only access for programs ..........84 Blocking Internet access for programs ......................
82 McAfee Total Protection Allowing Internet access for programs Some programs, like Internet browsers, need to access the Internet to function properly. Firewall allows you use the Program Permissions page to: Allow access for programs Allow outbound-only access for programs Block access for programs You can also allow a program to have full and outbound-only Internet access from the Outbound Events and Recent Events log.
Chapter 17 McAfee Total Protection 83 Allow full access from the Recent Events log You can allow an existing blocked program that appears in the Recent Events log to have full inbound and outbound Internet access. 1 On the McAfee SecurityCenter pane, click Advanced Menu. 2 Click Reports & Logs. 3 Under Recent Events, select the event description, and then click Allow Access. 4 In the Program Permissions dialog, click Yes to confirm.
84 McAfee Total Protection Allowing outbound-only access for programs Some programs on your computer require outbound Internet access. Firewall lets you configure program permissions to allow outbound-only Internet access. Allow outbound-only access for a program You can allow a program to have outbound-only Internet access. 1 On the McAfee SecurityCenter pane, click Internet & Network, then click Configure.
Chapter 17 McAfee Total Protection 85 Blocking Internet access for programs Firewall allows you to block programs from accessing the Internet. Ensure that blocking a program will not interrupt with your network connection or another program that requires access to the Internet to function properly. Block access for a program You can block a program from having inbound and outbound Internet access. 1 On the McAfee SecurityCenter pane, click Internet & Network, then click Configure.
86 McAfee Total Protection Block access from the Recent Events log You can block a program that appears in the Recent Events log from having inbound and outbound Internet access. 1 On the McAfee SecurityCenter pane, click Advanced Menu. 2 Click Reports & Logs. 3 Under Recent Events, select the event description, and then click Block Access. 4 In the Program Permissions dialog, click Yes to confirm.
Chapter 17 McAfee Total Protection Removing access permissions for programs Before removing a program permission, ensure that its absence does not affect your computer's functionality or your network connection. Remove a program permission You can remove a program from having any inbound or outbound Internet access. 1 On the McAfee SecurityCenter pane, click Internet & Network, then click Configure. 2 On the Internet & Network Configuration pane, under Firewall protection is enabled, click Advanced.
88 McAfee Total Protection Learning about programs If you are unsure which program permission to apply, you can get information about the program on McAfee's HackerWatch Web site. Get program information You can get program information from McAfee's HackerWatch Web site to decide whether to allow or block inbound and outbound Internet access.
89 CHAPTER 18 Managing computer connections You can configure Firewall to manage specific remote connections to your computer by creating rules, based on Internet Protocol addresses (IPs), that are associated with remote computers. Computers that are associated with trusted IP addresses can be trusted to connect to your computer and those IPs that are unknown, suspicious, or distrusted, can be banned from connecting to your computer.
90 McAfee Total Protection About computer connections Computer connections are the connections that you create between other computers on any network and yours. You can add, edit, and remove IP addresses on the Networks list. These IP addresses are associated with networks for which you want to assign a level of trust when connecting to your computer: Trusted, Standard, and Public. Level Description Trusted Firewall allows traffic from an IP to reach your computer through any port.
Chapter 18 McAfee Total Protection 7 91 Select Range, and then enter the starting and ending IP addresses in the From IP Address and To IP Address boxes. If your computer connection is on an IPv6 network, enter the starting IP address and the prefix length in the From IP Address and Prefix Length boxes. Under Type, do one of the following: Select Trusted to specify that this computer connection is trusted (for example, a computer in a home network).
92 McAfee Total Protection Edit a computer connection You can edit a trusted, standard, or public computer connection and its associated IP address. 1 On the McAfee SecurityCenter pane, click Internet & Network, then click Configure. 2 On the Internet & Network Configuration pane, under Firewall protection is enabled, click Advanced. 3 On the Firewall pane, click Networks. 4 On the Networks pane, select an IP address, and then click Edit.
Chapter 18 McAfee Total Protection Remove a computer connection You can remove a trusted, standard, or public computer connection and its associated IP address. 1 On the McAfee SecurityCenter pane, click Internet & Network, then click Configure. 2 On the Internet & Network Configuration pane, under Firewall protection is enabled, click Advanced. 3 On the Firewall pane, click Networks. 4 On the Networks pane, select an IP address, and then click Remove. 5 Click Yes to confirm.
94 McAfee Total Protection Banning computer connections You can add, edit, and remove banned IP addresses in the Banned IPs pane. You can ban computers that are associated with unknown, suspicious, or distrusted IP addresses from connecting to your computer. Since Firewall blocks all unwanted traffic, it is normally not necessary to ban an IP address. You should ban an IP address only when you are sure that an Internet connection is a threat.
Chapter 18 McAfee Total Protection 95 Edit a banned computer connection You can edit a banned computer connection and its associated IP address. 1 On the McAfee SecurityCenter pane, click Internet & Network, then click Configure. 2 On the Internet & Network Configuration pane, under Firewall protection is enabled, click Advanced. 3 On the Firewall pane, click Banned IPs. 4 On the Banned IPs pane, click Edit. 5 If the computer connection is on an IPv6 network, select the IPv6 check box.
96 McAfee Total Protection Ban a computer from the Inbound Events log You can ban a computer connection and its associated IP address from the Inbound Events log. Use this log, which lists the IP addresses of all inbound Internet traffic, to ban an IP address that you suspect is the source of suspicious or undesirable Internet activity.
97 CHAPTER 19 Managing system services To work properly, certain programs (including web servers and file-sharing server programs) must accept unsolicited connections from other computers through designated system service ports. Typically, Firewall closes these system service ports because they represent the most likely source of insecurities in your system. To accept connections from remote computers, however, the system service ports must be open. In this chapter Configuring system service ports.......
98 McAfee Total Protection Configuring system service ports System service ports can be configured to allow or block remote network access to a service on your computer. These system service ports can be opened or closed for computers listed as Trusted, Standard, or Public in your Networks list.
Chapter 19 McAfee Total Protection 99 Allow access to an existing system service port You can open an existing port to allow remote network access to a system service on your computer. Note: An open system service port can make your computer vulnerable to Internet security threats; therefore, only open a port if necessary. 1 On the McAfee SecurityCenter pane, click Internet & Network, then click Configure.
100 McAfee Total Protection Configure a new system service port You can configure a new network service port on your computer that you can open or close to allow or block remote access on your computer. 1 On the McAfee SecurityCenter pane, click Internet & Network, then click Configure. 2 On the Internet & Network Configuration pane, under Firewall protection is enabled, click Advanced. 3 On the Firewall pane, click System Services. 4 Click Add.
Chapter 19 McAfee Total Protection 101 Modify a system service port You can modify inbound and outbound network access information about an existing system service port. Note: If port information is entered incorrectly, the system service fails. 1 On the McAfee SecurityCenter pane, click Internet & Network, then click Configure. 2 On the Internet & Network Configuration pane, under Firewall protection is enabled, click Advanced. 3 On the Firewall pane, click System Services.
102 McAfee Total Protection Remove a system service port You can remove an existing system service port from your computer. After removal, remote computers can no longer access the network service on your computer. 1 On the McAfee SecurityCenter pane, click Internet & Network, then click Configure. 2 On the Internet & Network Configuration pane, under Firewall protection is enabled, click Advanced. 3 On the Firewall pane, click System Services. 4 Select a system service, and then click Remove.
103 CHAPTER 20 Logging, monitoring, and analysis Firewall provides extensive and easy-to-read logging, monitoring, and analysis for Internet events and traffic. Understanding Internet traffic and events helps you manage your Internet connections. In this chapter Event Logging ..............................................................104 Working with Statistics ...............................................106 Tracing Internet traffic................................................
104 McAfee Total Protection Event Logging Firewall allows you to enable or disable event logging and, when enabled, which event types to log. Event logging allows you to view recent inbound, outbound events and intrusion events. Configure event log settings You can specify and configure the types of Firewall events to log. By default, event logging is enabled for all events and activities. 1 On the Internet & Network Configuration pane, under Firewall protection is enabled, click Advanced.
Chapter 20 McAfee Total Protection 105 View inbound events If logging is enabled, you can view inbound events. Inbound Events include the date and time, source IP address, host name, and information and event type. 1 Ensure the Advanced menu is enabled. On the Common Tasks pane, click Reports & Logs. 2 Under Recent Events, click View Log. 3 Click Internet & Network, and then click Inbound Events. Note: You can trust, ban, and trace an IP address from the Inbound Event log.
106 McAfee Total Protection Working with Statistics Firewall leverages McAfee's HackerWatch security Web site to provide you with statistics about global Internet security events and port activity. View global security event statistics HackerWatch tracks worldwide Internet security events, which you can view from SecurityCenter. Information tracked lists incidents reported to HackerWatch in the last 24 hours, 7 days, and 30 days. 1 Ensure that the Advanced Menu is enabled, and then click Tools.
Chapter 20 McAfee Total Protection 107 Tracing Internet traffic Firewall offers a number of options for tracing Internet traffic. These options let you geographically trace a network computer, obtain domain and network information, and trace computers from the Inbound Events and Intrusion Detection Events logs. Geographically trace a network computer You can use Visual Tracer to geographically locate a computer that is connecting or attempting to connect to your computer, using its name or IP address.
108 McAfee Total Protection Trace a computer from the Inbound Events log From the Inbound Events pane, you can trace an IP address that appears in the Inbound Events log. 1 Ensure the Advanced menu is enabled. On the Common Tasks pane, click Reports & Logs. 2 Under Recent Events, click View Log. 3 Click Internet & Network, and then click Inbound Events. 4 On the Inbound Events pane, select a source IP address, and then click Trace this IP.
Chapter 20 McAfee Total Protection 109 Trace a monitored IP address You can trace a monitored IP address to obtain a geographical view which shows the most probable route of data taken from the source computer to yours. In addition, you can obtain registration and network information about the IP address. 1 Ensure that the Advanced Menu is enabled and click Tools. 2 On the Tools pane, click Traffic Monitor. 3 Under Traffic Monitor, click Active Programs.
110 McAfee Total Protection Monitoring Internet traffic Firewall provides a number of methods to monitor your Internet traffic, including the following: Traffic Analysis graph: Displays recent inbound and outbound Internet traffic. Traffic Usage graph: Displays the percentage of bandwidth used by the most active programs during the past 24 hour period.
Chapter 20 McAfee Total Protection 111 Analyze inbound and outbound traffic The Traffic Analysis graph is a numerical and graphical representation of inbound and outbound Internet traffic. Also, the Traffic Monitor displays programs that use the most network connections on your computer and the IP addresses that the programs access. 1 Ensure that the Advanced Menu is enabled, and then click Tools. 2 On the Tools pane, click Traffic Monitor. 3 Under Traffic Monitor, click Traffic Analysis.
112 McAfee Total Protection Note: To view the most up-to-date statistics, click Refresh under Active Programs.
113 CHAPTER 21 Learning about Internet security Firewall leverages McAfee's security Web site, HackerWatch, to provide up-to-date information about programs and global Internet activity. HackerWatch also provides an HTML tutorial about Firewall. In this chapter Launch the HackerWatch tutorial..............................
114 McAfee Total Protection Launch the HackerWatch tutorial To learn about Firewall, you can access the HackerWatch tutorial from SecurityCenter. 1 Ensure that the Advanced Menu is enabled, and then click Tools. 2 On the Tools pane, click HackerWatch. 3 Under HackerWatch Resources, click View Tutorial.
115 CHAPTER 22 McAfee Anti-Spam Anti-Spam (formerly called SpamKiller) stops unsolicited e-mail from entering your Inbox by examining your incoming e-mail, and then marking it as spam (e-mail soliciting you to purchase something) or phishing (e-mail soliciting you to provide personal information to a potentially fraudulent Web site). Anti-Spam then filters the spam e-mail and moves it to the McAfee Anti-Spam folder.
116 McAfee Total Protection In this chapter Anti-Spam features .....................................................117 Configuring spam detection.......................................119 Filtering e-mail ............................................................127 Setting up friends ........................................................129 Setting up your Webmail accounts ............................133 Working with filtered e-mail ......................................
Chapter 22 McAfee Total Protection 117 Anti-Spam features Spam filtering Prevent unsolicited email from entering your Inbox. Anti-Spam's advanced filters are updated automatically for all your email accounts. You can also create custom filters to ensure that all spam is filtered, and report spam to McAfee for analysis. Phishing filtering Identify potential phishing (fraudulent) websites that solicit personal information.
119 CHAPTER 23 Configuring spam detection Anti-Spam allows you to customize how spam is detected. You can filter messages more aggressively, specify what to look for in a message, and look for specific character sets when analyzing spam. You can also create personal filters to fine-tune which messages Anti-Spam identifies as spam. For example, if unsolicited e-mail that contains the word mortgage is not filtered, you can add a filter that contains the word mortgage.
120 McAfee Total Protection Setting filtering options Adjust Anti-Spam's filtering options if you want to filter messages more aggressively, specify how you want to process spam, and look for specific character sets when analyzing spam. Filtering level The filtering level dictates how aggressively your e-mail is filtered. For example, if spam is not filtered and your filtering level is set to Medium, you can change it to Medium-High or High.
Chapter 23 McAfee Total Protection 121 1. On the SecurityCenter Home pane, click E-mail & IM. 2. In the E-mail & IM information area, click Configure. 3. On the E-mail & IM Configuration pane, under Spam protection is enabled, click Advanced. 2 On the Spam Protection pane, click Filtering Options. 3 In the Specify a spam filter level list, select the appropriate level, and then click OK. Level Description Low Most e-mail is accepted. Medium-Low Only obvious spam messages are filtered.
122 McAfee Total Protection To... Do this... Change the subject In Mark the subject of the phish email line of phish e-mail with, specify a tag to add to the subject line of phish e-mail. The default tag is [PHISH]. Specify the largest e-mail to filter In Specify largest email to filter (size in KB), enter the largest size of e-mail that you want to filter. Update the spam rules Select Update spam rules (in minutes), then enter the frequency in which to update your spam rules.
Chapter 23 McAfee Total Protection 123 Using personal filters A personal filter specifies whether to allow or block e-mail messages based on specific words or phrases. If an e-mail message contains a word or phrase that the filter is set to block, the message is marked as spam and left in your Inbox or moved to the McAfee Anti-Spam folder. For more information about how spam is handled, see Modify how a message is processed and marked (page 121).
124 McAfee Total Protection Edit a personal filter Edit existing filters to fine-tune which messages are identified as spam. 1 Open the Spam Protection pane. How? 1. On the SecurityCenter Home pane, click E-mail & IM. 2. In the E-mail & IM information area, click Configure. 3. On the E-mail & IM Configuration pane, under Spam protection is enabled, click Advanced. 2 On the Spam Protection pane, click Personal Filters. 3 Select the filter you want to edit, and then click Edit.
Chapter 23 McAfee Total Protection To... 125 Do this... Specify the words or In Words or phrases, type what to look for in phrases in your an e-mail. For example, if you specify filter mortgage, all e-mail that contains this word are filtered. Specify that the filter uses regular expressions Select This filter uses regular expressions.
127 CHAPTER 24 Filtering e-mail Anti-Spam examines your incoming e-mail, and categorizes it as spam (e-mail soliciting you to purchase something) or phishing (e-mail soliciting you to provide personal information to a potentially fraudulent Web site). By default, Anti-Spam then marks each unsolicited e-mail message as spam or phishing (the tag [SPAM] or [PHISH] appears in the subject line of the message), and moves the message to the McAfee Anti-Spam folder.
128 McAfee Total Protection Disable the Anti-Spam toolbar If you are using Outlook, Outlook Express, Windows Mail, Eudora, or Thunderbird, you can disable the Anti-Spam toolbar. 1 Open the Spam Protection pane. How? 1. On the SecurityCenter Home pane, click E-mail & IM. 2. In the E-mail & IM information area, click Configure. 3. On the E-mail & IM Configuration pane, under Spam protection is enabled, click Advanced. 2 On the Spam Protection pane, click Email Toolbars.
129 CHAPTER 25 Setting up friends Because of Anti-Spam's improved filter which recognizes and allows legitimate e-mail messages, it is rare that you need to add your friends' e-mail address to your friends list, whether you add them manually or import your address books. However, if you still add a friend's e-mail address, and someone spoofs it, then Anti-Spam will allow messages from that e-mail address in your Inbox.
130 McAfee Total Protection Setting up friends manually You manually update your list of friends by editing the entries one-by-one. For example, if you receive an e-mail from a friend whose address is not in your address book, you can manually add their e-mail address right away. The easiest way to do this is to use the Anti-Spam toolbar. If you do not use the Anti-Spam toolbar, you must specify your friend's information.
Chapter 25 McAfee Total Protection 131 Add a domain Add an entire domain if you want to add every user on that domain to your friends list. For example, if you add the company.com domain, none of the e-mail from that organization is filtered. 1 Open the Spam Protection pane. How? 1. On the SecurityCenter Home pane, click E-mail & IM. 2. In the E-mail & IM information area, click Configure. 3. On the E-mail & IM Configuration pane, under Spam protection is enabled, click Advanced.
132 McAfee Total Protection Edit a domain If the information for a domain changes, you can update your friends list to ensure that Anti-Spam does not mark the messages from that domain as spam. 1 Open the Spam Protection pane. How? 1. On the SecurityCenter Home pane, click E-mail & IM. 2. In the E-mail & IM information area, click Configure. 3. On the E-mail & IM Configuration pane, under Spam protection is enabled, click Advanced. 2 On the Spam Protection pane, click Friends.
133 CHAPTER 26 Setting up your Webmail accounts If you use a browser to read your e-mail messages, you must configure Anti-Spam to connect to your account and filter your messages. To add your Webmail account to Anti-Spam, simply add the account information provided by your e-mail provider. After you add a Webmail account, you can edit your account information, and obtain more information about filtered Webmail.
134 McAfee Total Protection 1. On the SecurityCenter Home pane, click E-mail & IM. 2. In the E-mail & IM information area, click Configure. 3. On the E-mail & IM Configuration pane, under Spam protection is enabled, click Advanced. 2 On the Spam Protection pane, click Webmail Accounts. 3 On the Webmail Accounts pane, click Add. 4 Specify the account information (page 135), and then click Next. 5 Under Checking Options, specify when Anti-Spam checks your account for spam (page 135).
Chapter 26 McAfee Total Protection 135 Remove a Webmail account Remove a Webmail account if you no longer want to filter its e-mail for spam. For example, if your account is not active any more or you are experiencing problems, you can remove the account while you troubleshoot the issue. 1 Open the Spam Protection pane. How? 1. On the SecurityCenter Home pane, click E-mail & IM. 2. In the E-mail & IM information area, click Configure. 3.
136 McAfee Total Protection Checking options Option Description Check every Anti-Spam checks this account for spam at the interval (number of minutes) you specify. The interval must be between 5 and 3600 minutes. Check on startup Anti-Spam checks this account every time you restart the computer. Connection options Option Description Never dial a connection Anti-Spam does not automatically dial a connection for you. You must manually start your dial-up connection.
137 CHAPTER 27 Working with filtered e-mail At times, some spam may not be detected. When this happens, you can report spam to McAfee, where it is analyzed to create filter updates. If you are using a Webmail account, you can view, export, and delete your filtered e-mail messages. This is useful when you are not sure whether a legitimate message was filtered, or if you want to know when the message was filtered. In this chapter Report e-mail messages to McAfee ............................
138 McAfee Total Protection Note: When you report an e-mail as not spam, and send the entire e-mail to McAfee, the e-mail message is not encrypted. View, export, or delete filtered Webmail You can view, export, or delete messages that have been filtered in your Webmail account. 1 Under Common Tasks, click Reports & Logs. 2 On the Reports & Logs pane, click Filtered Webmail. 3 Select a message.
139 CHAPTER 28 Configuring phishing protection Anti-Spam categorizes unsolicited e-mail as spam (e-mail soliciting you to purchase), or phishing (e-mail soliciting you to provide personal information to a known or potentially fraudulent Web site). Phishing protection protects you from accessing Web sites that are fraudulent. If you click a link in an e-mail message to a known or potentially fraudulent Web site, Anti-Spam redirects you to the Phishing filter safe page.
140 McAfee Total Protection Edit sites in your whitelist If you added a Web site to the whitelist and the Web site address changes, you can always update it. 1 Open the Phishing Protection pane. 1. On the SecurityCenter Home pane, click Internet & Network. 2. In the Internet & Network information area, click Configure. 2 On the Phishing Protection pane, click Advanced. 3 Under Whitelist, select the Web site you want to update, and then click Edit. 4 Edit the Web site address, and then click OK.
141 CHAPTER 29 McAfee Parental Controls Parental Controls offers advanced protection for you, your family, your personal files, and your computer. It helps you to guard against online identity theft, block the transmission of personal information, and filter potentially offensive online content (including images). It also allows you to monitor, control, and record unauthorized Web browsing habits, and provides a secure storage area for personal passwords.
142 McAfee Total Protection Parental Controls features Parental Controls Filter potentially inappropriate images, enable age-appropriate searching, configure a user's age (which determines what content will be blocked), and set Web browsing time limits (the days and times that a user can access the Web) for SecurityCenter users. Parental Controls also lets you universally restrict access to specific Web sites, and grant or block access based on associated keywords.
143 CHAPTER 30 Protecting your children If your children use your computer, you can use Parental Controls to help regulate what each child can see and do when browsing the Web. For example, you can enable or disable age-appropriate searching and image filtering, choose a content rating group, and set Web browsing time limits.
145 CHAPTER 31 Configuring users To configure Parental Controls to protect your children, you assign certain permissions to them in SecurityCenter. These permissions determine what each child can see and do on the Web. By default, SecurityCenter users correspond to the Windows users that you have set up on your computer. However, if you upgraded from a previous version of SecurityCenter that used McAfee users, your McAfee users and their permissions are retained.
146 McAfee Total Protection Working with Windows users By default, SecurityCenter users correspond to the Windows users that you have set up on your computer. You add a user, edit a user's account information, or remove a user under Computer Management in Windows. You can then set up Parental Controls protection for those users in SecurityCenter. If you upgraded from a previous version of SecurityCenter that used McAfee users, see Working with McAfee users (page 147).
Chapter 31 McAfee Total Protection 147 Working with McAfee users If you upgraded from a previous version of SecurityCenter that used McAfee users, your McAfee users and their permissions are automatically retained. You can continue to configure and manage McAfee users; however, McAfee recommends that you switch to Windows users. Once you switch to Windows users, you can never switch back to McAfee users.
148 McAfee Total Protection 1. Under Common Tasks, click Home. 2. On the SecurityCenter Home pane, click Parental Controls. 3. In the Parental Controls information section, click Configure. 4. On the Parental Controls Configuration pane, click Advanced. 3 On the Users Settings pane, click Add. 4 Follow the on-screen instructions to set up a user name, password, account type, and Parental Controls protection. 5 Click Create.
Chapter 31 McAfee Total Protection 149 1. Under Common Tasks, click Home. 2. On the SecurityCenter Home pane, click Parental Controls. 3. In the Parental Controls information section, click Configure. 4. On the Parental Controls Configuration pane, click Advanced. 3 On the Users Settings pane, under McAfee User Accounts, select a user name, and then click Remove.
150 McAfee Total Protection Enabling age appropriate searching Some popular search engines (like Yahoo! and Google) offer "safe searching"—a search setting that prevents potentially inappropriate search results from appearing in their result lists. These search engines usually let you choose how restrictive you want safe search filtering to be, but also let you or any other user turn it off at any time.
Chapter 31 McAfee Total Protection 151 1. On the SecurityCenter Home pane, click Parental Controls. 2. In the Parental Controls information section, click Configure. 3. On the Parental Controls Configuration pane, click Advanced. 4. On the Parental Controls pane, click Users Settings. 2 On the Users Settings pane, click a user name, and then click Edit. 3 In the Edit User Account window, under Age Appropriate Searching, click On. 4 Click OK.
152 McAfee Total Protection Filtering potentially inappropriate Web images Depending on a user's age or maturity level, you can filter (block or allow) potentially inappropriate images when the user browses the Web. For example, you can block potentially inappropriate images from appearing when your young children browse the Web, but allow them to appear for the older teenagers and adults in your home.
Chapter 31 McAfee Total Protection 153 Setting the content rating group A user can belong to one of the following content rating groups: Young child Child Younger teen Older teen Adult Parental Controls rates (blocks or allows) Web content based on the group to which a user belongs. This lets you block or allow certain Web sites for certain users in your home.
154 McAfee Total Protection Setting Web browsing time limits If you are concerned about irresponsible or excessive Internet use, you can set appropriate time limits on your children's Web browsing. When you restrict Web browsing to specific times for your children, you can trust that SecurityCenter will enforce those restrictions—even when you're away from home.
Chapter 31 McAfee Total Protection 155 Filtering Web sites You can filter (block or allow) Web sites for all users except those that belong to the Adult group. You block a Web site to prevent your children from accessing it when they browse the Web. If a child tries to access a blocked Web site, a message indicates that the site cannot be accessed because it is blocked by McAfee. You allow a Web site if McAfee has blocked it by default but you want to let your children access it.
156 McAfee Total Protection Allow a Web site You allow a Web site to make sure that it is not blocked for any users. If you allow a Web site that McAfee has blocked by default, you override the default setting. 1 Open the Parental Controls pane. How? 1. On the SecurityCenter Home pane, click Parental Controls. 2. In the Parental Controls information section, click Configure. 3. On the Parental Controls Configuration pane, ensure that Parental Controls are enabled, and then click Advanced.
Chapter 31 McAfee Total Protection 157 Remove a filtered Web site You can remove a filtered Web site if you no longer want to block or allow it. 1 Open the Parental Controls pane. How? 1. On the SecurityCenter Home pane, click Parental Controls. 2. In the Parental Controls information section, click Configure. 3. On the Parental Controls Configuration pane, ensure that Parental Controls are enabled, and then click Advanced. 2 On the Parental Controls pane, click Filtered Web Sites.
158 McAfee Total Protection Filtering Web sites using keywords Keyword filtering lets you block non-Adult users from visiting Web sites that contain potentially inappropriate words. When keyword filtering is enabled, a default list of keywords and corresponding rules is used to rate content for users according to their content rating group. Users must belong to a certain group to access Web sites that contain specific keywords.
Chapter 31 McAfee Total Protection 159 1. On the SecurityCenter Home pane, click Parental Controls. 2. In the Parental Controls information section, click Configure. 3. On the Parental Controls Configuration pane, ensure that Parental Controls are enabled, and then click Advanced. 2 On the Parental Controls pane, click Keywords and ensure that keyword filtering is enabled. 3 Under Keyword List, type a keyword in the Look for box. 4 Move the Minimum Age slider to specify a minimum age group.
161 CHAPTER 32 Protecting information on the Web You can prevent your personal information (such as name, address, credit card numbers, and bank account numbers) from being transmitted over the Web by adding it to a protected information area. Note: Parental Controls does not block the transmission of personal information by secure Web sites (that is, Web sites that use the https:// protocol), such as banking sites. In this chapter Protecting personal information................................
162 McAfee Total Protection Protecting personal information Prevent your personal information (such as name, address, credit card numbers, and bank account numbers) from being transmitted over the Web by blocking it. If McAfee detects personal information contained in something (for example, a form field or file) about to be sent across the Web, the following occurs: If you are an Administrator, you must confirm whether to send the information.
163 CHAPTER 33 Protecting passwords The Password Vault is a secure storage area for your personal passwords. It allows you to store your passwords with confidence so that no other user (even an Administrator) can access them. In this chapter Setting up the Password Vault....................................
164 McAfee Total Protection Setting up the Password Vault Before you start using the Password Vault, you must set up a Password Vault password. Only users who know this password can access your Password Vault. If you forget your Password Vault password, you can reset it; however, all of the passwords that were previously stored in your Password Vault are then deleted. After you set up a Password Vault password, you can add, edit, or remove passwords from your vault.
Chapter 33 McAfee Total Protection 165 1. Under Common Tasks, click Home. 2. On the SecurityCenter Home pane, click Internet & Network. 3. In the Internet & Network information section, click Configure. 4. On the Internet & Network Configuration pane, click Advanced under Password Vault. 2 Type your Password Vault password in the Password box. 3 Click Open. 4 On the Manage Password Vault pane, click a password entry, and then click Edit.
166 McAfee Total Protection 1. Under Common Tasks, click Home. 2. On the SecurityCenter Home pane, click Internet & Network. 3. In the Internet & Network information section, click Configure. 4. On the Internet & Network Configuration pane, click Advanced under Password Vault. 2 On the Password Vault pane, type your current password in the Password box, and then click Open. 3 On the Manage Password Vault pane, click Change Password.
167 CHAPTER 34 McAfee Backup and Restore Use McAfee® Backup and Restore to avoid accidental loss of your data by archiving your files to CD, DVD, USB drive, external hard drive, or network drive. Local archiving allows you to archive (back up) your personal data to CD, DVD, USB drive, external hard drive, or network drive. This provides you with a local copy of your records, documents, and other materials of personal interest in case of accidental loss.
168 McAfee Total Protection Backup and Restore features Local scheduled archiving Protect your data by archiving files and folders to CD, DVD, USB drive, external hard drive, or network drive. After you initiate the first archive, incremental archives occur automatically for you. One-click restore If files and folders are mistakenly deleted or become corrupt on your computer, you can restore the most recently archived versions from the archive media used.
169 CHAPTER 35 Archiving files You can use McAfee Backup and Restore to archive a copy of the files on your computer to CD, DVD, USB drive, external hard drive, or network drive. Archiving your files in this way makes it easy for you to retrieve information in case of accidental data loss or damage. Before you start archiving files, you must choose your default archive location (CD, DVD, USB drive, external hard drive, or network drive).
170 McAfee Total Protection Enabling and disabling local archive The first time you launch Backup and Restore, you decide whether to enable or disable local archive, depending on how you want to use Backup and Restore. Once you sign in and start using Backup and Restore, you can enable or disable local archiving at any time. If you do not want to archive a copy of the files on your computer to CD, DVD, USB drive, external hard drive, or network drive, you can disable local archive.
Chapter 35 McAfee Total Protection 171 Setting archive options Before you start archiving your files, you must set some local archive options. For example, you must set up the watch locations and watch file types. Watch locations are the folders on your computer that Backup and Restore monitors for new files or file changes. Watch file types are the types of files (for example, .doc, .xls, and so on) that Backup and Restore archives within the watch locations.
172 McAfee Total Protection Include a location in the archive You can set two types of watch locations for archiving: top-level folders and subfolders, and top-level folders only. If you set a top-level folders and subfolders location, Backup and Restore monitors the contents of the folder and its subfolders for changes. If you set a top-level folders location, Backup and Restore monitors the contents of folder only (not its subfolders). 1 Open the Local Archive Settings dialog box. How? 1.
Chapter 35 McAfee Total Protection 173 1. Click the Local Archive tab. 2. In the left pane, click Settings. 2 Click File Types. 3 Expand the file types lists, and select the check boxes beside the file types that you want to archive. 4 Click OK. Tip: To add a new file type to the Selected File Types list, type the file extension in the Add custom file type to Other box, click Add, and then click OK. The new file type automatically becomes a watch file type.
174 McAfee Total Protection Click Select Drive Location, navigate to a USB drive, local drive, or external hard drive, select it, and then click OK. Click Select Network Location, navigate to a network folder, select it, and then click OK. 4 Verify the new archive location under Selected Archive Location, and then click OK. 5 In the confirmation dialog box, click OK. 6 Click OK.
Chapter 35 McAfee Total Protection 175 Running full and quick archives You can run two types of archive: full or quick. When you run a full archive, you archive a complete set of data based on the watch file types and locations that you have set up. When you run a quick archive, you archive only those watched files that have changed since the last full or quick archive. By default, Backup and Restore is scheduled to run a full archive of the watch file types in your watch locations every Monday at 9:00 a.
176 McAfee Total Protection 4 Select the check box beside the day on which you want to run the full archive. 5 Click a value in the At list to specify the time at which you want to run the full archive. 6 To run a quick archive on a daily or hourly basis, click one of the following under Quick Archive: Hours Days 7 Type a number representing the frequency in the Quick archive Every box. 8 Click OK. Note: You can disable a scheduled archive by selecting Manual under Full Archive Every.
177 CHAPTER 36 Working with archived files After you archive some files, you can use Backup and Restore to work with them. Your archived files are presented to you in a traditional explorer view which allows you to locate them easily. As your archive grows, you might want to sort the files or search for them. You can also open files directly in the explorer view to examine the content without having to retrieve the files.
178 McAfee Total Protection Using the local archive explorer The local archive explorer allows you to view and manipulate the files that you have archived locally. You can view each file's name, type, location, size, state (archived, not archived, or archive in progress), and the date on which each file was last archived. You can also sort the files by any of these criteria. If you have a large archive, you can find a file quickly by searching for it.
Chapter 36 McAfee Total Protection 5 179 Click Search. Note: If you do not know the approximate size or date of the last archive, click Unknown. Open an archived file You can examine the content of an archived file by opening it directly in the local archive explorer. 1 Click the Local Archive tab. 2 In the right pane, click a file name, and then click Open. Tip: You can also open an archived file by double-clicking the file name.
180 McAfee Total Protection Restoring archived files If a watch file becomes corrupt, is missing, or is mistakenly deleted, you can restore a copy of it from a local archive. For this reason, it is important to ensure that you archive your files regularly. You can also restore older versions of files from a local archive. For example, if you regularly archive a file, but want to revert to a previous version of a file, you can do so by locating the file in the archive location.
Chapter 36 McAfee Total Protection 181 Restore an older version of a file from a local archive If you want to restore an older version of an archived file, you can locate it and add it to the Missing Files list. Then, you can restore the file, as you would any other file in the Missing Files list. 1 Click the Local Archive tab. 2 On the Missing Files tab at the bottom of the screen, click Browse, and then navigate to the location where the archive is stored. 3 Select the location, and then click OK.
182 McAfee Total Protection Managing archives You can view a summary of information about your full and quick archives at any time. For example, you can view information about the amount of data currently being watched, the amount of data that has been archived, and the amount of data that is currently being watched but has not yet been archived. You can also view information about your archive schedule, such as the date on which the last and next archives occur.
183 CHAPTER 37 McAfee QuickClean QuickClean improves your computer's performance by deleting files that can create clutter on your computer. It empties your Recycle Bin and deletes temporary files, shortcuts, lost file fragments, registry files, cached files, cookies, browser history files, sent and deleted e-mail, recently used files, Active-X files, and system restore point files.
184 McAfee Total Protection QuickClean features File Cleaner Delete unnecessary files safely and efficiently using various cleaners. By deleting these files, you increase the space on your computer's hard drive and improve its performance.
185 CHAPTER 38 Cleaning your computer QuickClean deletes files that can create clutter on your computer. It empties your Recycle Bin and deletes temporary files, shortcuts, lost file fragments, registry files, cached files, cookies, browser history files, sent and deleted email, recently-used files, Active-X files, and system restore point files. QuickClean deletes these items without affecting other essential information.
186 McAfee Total Protection Name Function Cookie Cleaner Deletes cookies. These files are usually stored as temporary files. A cookie is a small file containing information, usually including a user name and the current date and time, stored on the computer of a person browsing the web. Cookies are primarily used by websites to identify users who have previously registered on or visited the site; however, they can also be a source of information for hackers.
Chapter 38 McAfee Total Protection 187 In this chapter Clean your computer ..................................................187 Clean your computer You can use any of QuickClean's cleaners to delete unnecessary files from your computer. When finished, under QuickClean Summary, you can view the amount of disk space reclaimed after cleanup, the number of files that were deleted, and the date and time when the last QuickClean operation ran on your computer.
189 CHAPTER 39 Defragmenting your computer Disk Defragmenter arranges files and folders on your computer so that they do not become scattered (that is, fragmented) when saved on your computer's hard drive. By defragmenting your hard drive periodically, you ensure that these fragmented files and folders are consolidated for quick retrieval later. In this chapter Defragment your computer........................................
191 CHAPTER 40 Scheduling a task Task Scheduler automates the frequency with which QuickClean or Disk Defragmenter runs on your computer. For example, you can schedule a QuickClean task to empty your Recycle Bin every Sunday at 9:00 P.M. or a Disk Defragmenter task to defragment your computer's hard drive on the last day of every month. You can create, modify, or delete a task at any time. You must be logged in to your computer for a scheduled task to run.
192 McAfee Total Protection 5 Click Restore Defaults to restore the default cleaners, and then click Next. Do one of the following: Click Schedule to accept the default No, I want to delete files using standard Windows deletion. Click Yes, I want to securely erase my files using Shredder, specify the number of passes, up to 10, and then click Schedule. 6 In the Schedule dialog box, select the frequency with which you want the task to run, and then click OK.
Chapter 40 McAfee Total Protection 5 193 Do one of the following: Click Schedule to accept the default No, I want to delete files using standard Windows deletion. Click Yes, I want to securely erase my files using Shredder, and specify the number of passes, up to 10, and then click Schedule. 6 In the Schedule dialog box, select the frequency with which you want the task to run, and then click OK.
194 McAfee Total Protection 1. On the McAfee SecurityCenter, under Common Tasks, click Maintain Computer. 2. Under Task Scheduler, click Start. 2 In the Select operation to schedule list, click Disk Defragmenter. 3 Type a name for your task in the Task name box, and then click Create. 4 Do one of the following: Click Schedule to accept the default Perform defragmentation even if the free space is low option.
Chapter 40 McAfee Total Protection 195 Delete a Disk Defragmenter task You can delete a scheduled Disk Defragmenter task if you no longer want it to run automatically. 1 Open the Task Scheduler pane. How? 1. On the McAfee SecurityCenter, under Common Tasks, click Maintain Computer. 2. Under Task Scheduler, click Start. 2 In the Select operation to schedule list, click Disk Defragmenter. 3 Select the task in the Select an existing task list.
197 CHAPTER 41 McAfee Shredder McAfee Shredder deletes (or shreds) items permanently from your computer's hard drive. Even when you manually delete files and folders, empty your Recycle Bin, or delete your Temporary Internet Files folder, you can still recover this information using computer forensic tools. As well, a deleted file can be recovered because some programs make temporary, hidden copies of open files. Shredder protects your privacy by safely and permanently deleting these unwanted files.
198 McAfee Total Protection Shredder features Permanently delete files and folders Remove items from your computer's hard drive so that their associated information cannot be recovered. It protects your privacy by safely and permanently deleting files and folders, items in your Recycle Bin and Temporary Internet Files folder, and the entire contents of computer disks, such as rewritable CDs, external hard drives, and floppy disks.
Chapter 41 McAfee Total Protection 199 Shredding files, folders, and disks Shredder ensures that the information contained in deleted files and folders in your Recycle Bin and in your Temporary Internet Files folder cannot be recovered, even with special tools. With Shredder, you can specify how many times (up to 10) you want an item to be shredded. A higher number of shredding passes increases your level of secure file deletion.
200 McAfee Total Protection Shred an entire disk You can shred the entire contents of a disk at once. Only removable drives, such as external hard drives, writeable CDs, and floppy disks can be shredded. 1 Open Shredder. How? 1. On the McAfee SecurityCenter pane, under Common Tasks, click Advanced Menu. 2. On the left pane, click Tools. 3. Click Shredder. 2 On the Shred files and folders pane, under I want to, click Erase an entire disk.
201 CHAPTER 42 McAfee Network Manager Network Manager presents a graphical view of the computers and other devices that make up your home network. You can use Network Manager to remotely manage the protection status of each managed computer in your network, and remotely fix reported security vulnerabilities on those computers.
202 McAfee Total Protection Network Manager features Graphical network map View a graphical overview of the protection status of the computers and devices that make up your home network. When you make changes to your network (for example, add a computer), the network map recognizes those changes. You can refresh the network map, rename the network, and show or hide components of the network map to customize your view. You can also view the details for any of the devices on the network map.
Chapter 42 McAfee Total Protection Understanding Network Manager icons The following table describes the icons commonly used on the Network Manager network map.
205 CHAPTER 43 Setting up a managed network To set up a managed network, trust the network (if you haven't already) and add members (computers) to the network. Before a computer can be remotely managed, or granted permission to remotely manage other computers on the network, it must become a trusted member of the network. Network membership is granted to new computers by existing network members (computers) with administrative permissions.
206 McAfee Total Protection Working with the network map When you connect a computer to the network, Network Manager analyzes the network to determine if there are any managed or unmanaged members, what the router attributes are, and the Internet status. If no members are found, Network Manager assumes that the currently connected computer is the first computer on the network and makes the computer a managed member with administrative permissions.
Chapter 43 McAfee Total Protection 207 Rename the network By default, the name of the network includes the name of the first computer that connects to the network and has SecurityCenter installed. If you prefer to use a different name, you can change it. 1 On the Basic or Advanced Menu, click Manage Network. 2 Click Rename network under I want to. 3 Type the name of the network in the Network Name box. 4 Click OK.
208 McAfee Total Protection Joining the managed network Before a computer can be remotely managed or granted permission to remotely manage other computers on the network, it must become a trusted member of the network. Network membership is granted to new computers by existing network members (computers) with administrative permissions. To ensure that only trusted computers join the network, users at the granting and joining computers must authenticate each other.
Chapter 43 McAfee Total Protection 209 Invite a computer to join the managed network If a computer is added to the managed network, or another unmanaged computer exists on the network, you can invite that computer to join the managed network. Only computers with administrative permissions on the network can invite other computers to join. When you send the invitation, you also specify the permission level you want to assign to the joining computer. 1 Click an unmanaged computer's icon in the network map.
210 McAfee Total Protection Stop trusting computers on the network If you trusted other computers on the network by mistake, you can stop trusting them. Click Stop trusting computers on this network under I want to. Note: The Stop trusting computers on this network link is not available if you have administrative permissions and there are other managed computers on the network.
211 CHAPTER 44 Managing the network remotely After you set up your managed network, you can remotely manage the computers and devices that make up your network. You can manage the status and permission levels of the computers and devices and fix most security vulnerabilities remotely. In this chapter Managing status and permissions .............................212 Fixing security vulnerabilities ....................................
212 McAfee Total Protection Managing status and permissions A managed network has managed and unmanaged members. Managed members allow other computers on the network to manage their McAfee protection status; unmanaged members do not. Unmanaged members are usually guest computers that want to access other network features (for example, send files or share printers).
Chapter 44 McAfee Total Protection 213 Modify a managed computer's permissions You can change a managed computer's permissions at any time. This allows you to modify which computers can manage the protection status of other computers on the network. 1 Click a managed computer's icon on the network map. 2 Click Modify permissions for this computer under I want to.
214 McAfee Total Protection Fixing security vulnerabilities Managed computers with administrative permissions can manage the McAfee protection status of other managed computers on the network and fix reported security vulnerabilities remotely. For example, if a managed computer's McAfee protection status indicates that VirusScan is disabled, another managed computer with administrative permissions can enable VirusScan remotely.
Chapter 44 McAfee Total Protection 215 Install McAfee security software on remote computers If one or more computers on your network is not using a recent version of SecurityCenter, their protection status cannot be managed remotely. If you want to manage these computers remotely, you must go to each computer, and install a recent version of SecurityCenter. 1 Make sure that you are following these instructions on the computer that you want to manage remotely.
217 CHAPTER 45 Monitoring your networks If you have McAfee Total Protection installed, Network Manager also monitors your networks for intruders. Each time an unknown computer or device connects to your network, you'll be notified about it so you can decide whether that computer or device is a Friend or an Intruder. A Friend is a computer or device that you recognize and trust, and an Intruder is a computer or device that you don't recognize or trust.
218 McAfee Total Protection Mark as Friend Mark a computer or device on your network as a Friend only if you recognize and trust it. When you mark a computer or device as a Friend, you can also decide whether or not you want to be notified each time it connects to the network. 1 On the Basic or Advanced Menu, click Manage Network. 2 On the network map, click an item. 3 Under I want to, click Mark as Friend or Intruder. 4 In the dialog box, click A Friend.
Chapter 45 McAfee Total Protection 219 1. Under Common Tasks, click Home. 2. On the right pane, under SecurityCenter Information, click Configure. 3. Under Alerts, click Advanced. 2 On the SecurityCenter Configuration pane, click Informational Alerts.
221 CHAPTER 46 McAfee EasyNetwork EasyNetwork allows you to share files securely, simplify file transfers, and share printers among the computers in your home network. However, the computers in your network must have EasyNetwork installed to access its features. Before you use EasyNetwork, you can familiarize yourself with some of the features. Details about configuring and using these features are provided throughout the EasyNetwork help.
222 McAfee Total Protection EasyNetwork features File sharing Easily share files with other computers on your network. When you share files, you grant other computers read-only access to those files. Only computers that have full or administrative access to your managed network (members) can share or access files shared by other members. File transfer Send files to other computers that have full or administrative access to your managed network (members).
223 CHAPTER 47 Setting up EasyNetwork Before you can use EasyNetwork, you must open it and join a managed network. After you join a managed network, you can share, search for, and send files to other computers on the network. You can also share printers. If you decide to leave the network, you can do so at any time. In this chapter Open EasyNetwork .....................................................223 Joining a managed network........................................224 Leaving a managed network.......
224 McAfee Total Protection Joining a managed network If no computers on the network you are connected to have SecurityCenter, you are made a member of the network and are prompted to identify whether the network is trusted. As the first computer to join the network, your computer name is included in the network name; however, you can rename the network at any time. When a computer connects to the network, it sends a join request to the other computers on the network.
Chapter 47 McAfee Total Protection 225 Join the network When a computer connects to a trusted network for the first time after installing EasyNetwork, a message appears asking whether to join the managed network. If the computer agrees to join, a request is sent to all the other computers on the network that have administrative access. This request must be granted before the computer can share printers or files, or send and copy files on the network.
226 McAfee Total Protection Click Allow administrative access to managed network programs to allow the computer access to the network with administrative permissions. It also allows the computer to grant access to other computers that want to join the managed network. 3 Click OK. 4 Confirm that the computer is displaying the playing cards that appear in the security confirmation dialog box, and then click Grant Access.
Chapter 47 McAfee Total Protection 227 Rename the network By default, the network name includes the name of the first computer that joined; however, you can change the network name at any time. When you rename the network, you change the network description displayed in EasyNetwork. 1 On the Options menu, click Configure. 2 In the Configure dialog box, type the name of the network in the Network Name box. 3 Click OK.
228 McAfee Total Protection Leaving a managed network If you join a managed network but then decide that you do not want to be a member, you can leave the network. After you leave the managed network, you can always rejoin; however, you must be granted permission again. For more information about joining, see Joining a managed network (page 224). Leave a managed network You can leave a managed network that you previously joined. 1 Disconnect your computer from the network.
229 CHAPTER 48 Sharing and sending files EasyNetwork makes it easy to share and send files among other computers on the network. When you share files, you grant other computers read-only access to them. Only computers that are members of the managed network (full or administrative access) can share or access files shared by other member computers. Note: If you are sharing a large number of files, your computer resources may be affected. In this chapter Sharing files ......................................
230 McAfee Total Protection Sharing files Only computers that are members of the managed network (full or administrative access) can share or access files shared by other member computers. If you share a folder, all the files contained in that folder and its subfolders are shared; however, subsequent files added to the folder are not automatically shared. If a shared file or folder is deleted, it is removed from the Shared Files window. You can stop sharing a file at any time.
Chapter 48 McAfee Total Protection 231 Copy a shared file You copy a shared file so that you still have it when it's not shared any more. You can copy a shared file from any computer on your managed network. Drag a file from the Shared Files window in EasyNetwork to a location in Windows Explorer or to the Windows desktop. Tip: You can also copy a shared file if you select the file in EasyNetwork, and then click Copy To on the Tools menu.
232 McAfee Total Protection Type of file Type Description Any Search all shared file types. Document Search all shared documents. Image Search all shared image files. Video Search all shared video files. Audio Search all shared audio files. Compressed Search all compressed files (for example, .zip files).
Chapter 48 McAfee Total Protection 233 Sending files to other computers You can send files to other computers that are members of the managed network. Before sending a file, EasyNetwork confirms that the computer receiving the file has enough disk space available. When you receive a file, it appears in your EasyNetwork inbox. The inbox is a temporary storage location for the files that other computers on the network send you.
234 McAfee Total Protection Receive notification when a file is sent You can receive a notification message when another computer on the managed network sends you a file. If EasyNetwork is not running, the notification message appears in the notification area at the far right of your taskbar. 1 On the Options menu, click Configure. 2 In the Configure dialog box, select the Notify me when another computer sends me files check box. 3 Click OK.
235 CHAPTER 49 Sharing printers After you join a managed network, EasyNetwork shares the local printers attached to your computer and uses the printer's name as the shared printer name. EasyNetwork also detects printers shared by other computers on your network and allows you to configure and use them.
236 McAfee Total Protection Working with shared printers EasyNetwork detects the printers that are shared by the computers on the network. If EasyNetwork detects a remote printer that is not connected to your computer, the Available network printers link appears in the Shared Files window when you open EasyNetwork for the first time. You can then install available printers or uninstall printers that are already connected to your computer.
Chapter 49 McAfee Total Protection 237
238 McAfee Total Protection Reference The Glossary of Terms lists and defines the most commonly used security terminology found in McAfee products.
239 Glossary 8 802.11 A set of standards for transmitting data across a wireless network. 802.11 is commonly known as Wi-Fi. 802.11a An extension to 802.11 that transmits data at up to 54 Mbps in the 5GHz band. Although the transmission speed is faster than 802.11b, the distance covered is much less. 802.11b An extension to 802.11 that transmits data at up to 11 Mbps in the 2.4 GHz band. Although the transmission speed is slower than 802.11a, the distance covered is greater. 802.
240 McAfee Total Protection bandwidth The amount of data (throughput) that can be transmitted in a fixed period of time. blacklist In Anti-Spam, a list of email addresses you do not want to receive messages from because you believe the messages will be spam. In anti-phishing, a list of websites that are considered fraudulent. Compare to whitelist (page 250). browser A program used to view web pages on the Internet. Popular web browsers include Microsoft Internet Explorer and Mozilla Firefox.
Glossary 241 cookie A small text file used by many websites to store information about pages visited, stored on the computer of a person browsing the web. It might contain login or registration information, shopping cart information, or user preferences. Cookies are primarily used by websites to identify users who have previously registered on or visited the website; however, they can also be a source of information for hackers.
242 McAfee Total Protection encryption A method of encoding information so that unauthorized parties cannot access it. When the data is encoded, the process uses a “key” and mathematical algorithms. Encrypted information cannot be decrypted without the proper key. Viruses sometimes use encryption in an attempt to escape detection. ESS Extended service set. Two or more networks that form a single subnetwork.
Glossary 243 IP address Internet Protocol address. An address used to identify a computer or device on a TCP/IP network. The format of an IP address is a 32-bit numeric address written as four numbers separated by periods. Each number can be 0 to 255 (for example, 192.168.1.100). IP spoofing Forging the IP addresses in an IP packet. This is used in many types of attacks including session hijacking. It is also often used to fake the email headers of spam so they cannot be properly traced.
244 McAfee Total Protection N network A collection of IP-based systems (such as routers, switches, servers, and firewalls) that are grouped as a logical unit. For example, a “Finance Network” might include all of the servers, routers, and systems that service a finance department. See also home network (page 242). network drive A disk or tape drive that is connected to a server on a network that is shared by multiple users. Network drives are sometimes called “remote drives”.
Glossary 245 plain text Text that is not encrypted. See also encryption (page 241). plugin, plug-in A small software program that adds features to or enhances a larger piece of software. For example, plug-ins permit a web browser to access and execute files embedded in HTML documents that are in formats the browser normally would not recognize, such as animation, video, and audio files. POP3 Post Office Protocol 3. An interface between an email client program and the email server.
246 McAfee Total Protection proxy server A firewall component that manages Internet traffic to and from a local area network (LAN). A proxy server can improve performance by supplying frequently requested data, such as a popular web page, and can filter and discard requests that the owner does not consider appropriate, such as requests for unauthorized access to proprietary files. publish The process of making a backed-up file available publicly, on the Internet.
Glossary 247 rootkit A collection of tools (programs) that grant a user administrator-level access to a computer or computer network. Rootkits might include spyware and other potentially unwanted programs that can create additional security or privacy risks to your computer data and personal information. router A network device that forwards data packets from one network to another.
248 McAfee Total Protection SSL Secure Sockets Layer. A protocol developed by Netscape for transmitting private documents on the Internet. SSL works by using a public key to encrypt data that is transferred over the SSL connection. URLs that require an SSL connection start with HTTPS instead of HTTP. standard e-mail account See POP3 (page 245). synchronize Resolving inconsistencies between backed up files and those stored on your local computer.
Glossary 249 U U3 You: Simplified, Smarter, Mobile. A platform for running Windows 2000 or Windows XP programs directly from a USB drive. The U3 initiative was founded in 2004 by M-Systems and SanDisk and allows users to run U3 programs on a Windows computer without installing or storing data or settings on the computer. URL Uniform Resource Locator. The standard format for Internet addresses. USB Universal Serial Bus.
250 McAfee Total Protection web bugs Small graphics files that can embed themselves in your HTML pages and allow an unauthorized source to set cookies on your computer. These cookies can then transmit information to the unauthorized source. Web bugs are also called “web beacons,” “pixel tags,” “clear GIFs,” or “invisible GIFs.” webmail Web-based mail. Electronic mail service accessed primarily via a web browser rather than through a computer-based email client such as Microsoft Outlook.
Glossary 251 worm A virus that spreads by creating duplicates of itself on other drives, systems, or networks. A mass-mailing worm is one that requires a user’s intervention to spread, e.g., opening an attachment or executing a downloaded file. Most of today’s email viruses are worms. A self-propagating worm does not need user intervention to propagate. Examples of self-propagating worms include Blaster and Sasser. WPA Wi-Fi Protected Access.
253 About McAfee McAfee, Inc., headquartered in Santa Clara, California and the global leader in Intrusion Prevention and Security Risk Management, delivers proactive and proven solutions and services that secure systems and networks around the world. With its unmatched security expertise and commitment to innovation, McAfee empowers home users, businesses, the public sector, and service providers with the ability to block attacks, prevent disruptions, and continuously track and improve their security.
254 McAfee Total Protection Copyright Copyright © 2008 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means without the written permission of McAfee, Inc. McAfee and other trademarks contained herein are registered trademarks or trademarks of McAfee, Inc. and/or its affiliates in the US and/or other countries.
255 CHAPTER 50 Customer and Technical Support SecurityCenter reports critical and non-critical protection problems as soon as it detects them. Critical protection problems require immediate action and compromise your protection status (changing the color to red). Non-critical protection problems do not require immediate action and may or may not compromise your protection status (depending on the type of problem).
256 McAfee Total Protection Using McAfee Virtual Technician Like a personal, technical support representative, Virtual Technician collects information about your SecurityCenter programs so that it can help resolve your computer's protection problems. When you run Virtual Technician, it checks to make sure your SecurityCenter programs are working correctly. If it discovers problems, Virtual Technician offers to fix them for you or provides you with more detailed information about them.
Chapter 50 About McAfee 257 Czech Republic www.mcafeenapoveda.co cz.mcafee.com/root/do m wnloads.asp Denmark www.mcafeehjaelp.com dk.mcafee.com/root/do wnloads.asp Finland www.mcafeehelp.com fi.mcafee.com/root/do wnloads.asp France www.mcafeeaide.com fr.mcafee.com/root/do wnloads.asp Germany www.mcafeehilfe.com de.mcafee.com/root/do wnloads.asp Greece www.mcafeehelp.com el.mcafee.com/root/do wnloads.asp Hungary www.mcafeehelp.com hu.mcafee.com/root/do wnloads.asp Italy www.
258 McAfee Total Protection United States www.mcafeehelp.com us.mcafee.com/root/do wnloads.asp McAfee Total Protection User Guides Country/Regi on McAfee User Guides Australia download.mcafee.com/products/manuals/en-au/MTP_us erguide_2008.pdf Brazil download.mcafee.com/products/manuals/pt-br/MTP_us erguide_2008.pdf Canada (English) download.mcafee.com/products/manuals/en-ca/MTP_us erguide_2008.pdf Canada (French) download.mcafee.com/products/manuals/fr-ca/MTP_use rguide_2008.
Chapter 50 About McAfee 259 Norway download.mcafee.com/products/manuals/no/MTP_user guide_2008.pdf Poland download.mcafee.com/products/manuals/pl/MTP_userg uide_2008.pdf Portugal download.mcafee.com/products/manuals/pt/MTP_userg uide_2008.pdf Russia download.mcafee.com/products/manuals/ru/MTP_userg uide_2008.pdf Slovakia download.mcafee.com/products/manuals/sk/MTP_userg uide_2008.pdf Spain download.mcafee.com/products/manuals/es/MTP_userg uide_2008.pdf Sweden download.mcafee.
260 McAfee Total Protection Finland download.mcafee.com/products/manuals/fi/MIS_usergu ide_2008.pdf France download.mcafee.com/products/manuals/fr/MIS_usergu ide_2008.pdf Germany download.mcafee.com/products/manuals/de/MIS_userg uide_2008.pdf Greece download.mcafee.com/products/manuals/el/MIS_usergu ide_2008.pdf Hungary download.mcafee.com/products/manuals/hu/MIS_userg uide_2008.pdf Italy download.mcafee.com/products/manuals/it/MIS_usergu ide_2008.pdf Japan download.mcafee.
Chapter 50 About McAfee 261 McAfee VirusScan Plus User Guides Country/Regi on McAfee User Guides Australia download.mcafee.com/products/manuals/en-au/VSP_us erguide_2008.pdf Brazil download.mcafee.com/products/manuals/pt-br/VSP_use rguide_2008.pdf Canada (English) download.mcafee.com/products/manuals/en-ca/VSP_use rguide_2008.pdf Canada (French) download.mcafee.com/products/manuals/fr-ca/VSP_user guide_2008.pdf China (Simplified Chinese) download.mcafee.
262 McAfee Total Protection Poland download.mcafee.com/products/manuals/pl/VSP_usergu ide_2008.pdf Portugal download.mcafee.com/products/manuals/pt/VSP_userg uide_2008.pdf Russia download.mcafee.com/products/manuals/ru/VSP_userg uide_2008.pdf Slovakia download.mcafee.com/products/manuals/sk/VSP_userg uide_2008.pdf Spain download.mcafee.com/products/manuals/es/VSP_userg uide_2008.pdf Sweden download.mcafee.com/products/manuals/sv/VSP_usergu ide_2008.pdf Taiwan download.mcafee.
Chapter 50 About McAfee 263 France download.mcafee.com/products/manuals/fr/VS_usergui de_2008.pdf Germany download.mcafee.com/products/manuals/de/VS_usergui de_2008.pdf Greece download.mcafee.com/products/manuals/el/VS_usergui de.2008.pdf Hungary download.mcafee.com/products/manuals/hu/VS_usergu ide.2008.pdf Italy download.mcafee.com/products/manuals/it/VS_usergui de_2008.pdf Japan download.mcafee.com/products/manuals/ja/VS_usergui de_2008.pdf Korea download.mcafee.
264 McAfee Total Protection Consult the following table for the McAfee Threat Center and Virus Information sites in your country or region. Country/Regi on Security Headquarters Virus Information Australia www.mcafee.com/us/threat_ce nter au.mcafee.com/virusIn fo Brazil www.mcafee.com/us/threat_ce nter br.mcafee.com/virusIn fo Canada (English) www.mcafee.com/us/threat_cent ca.mcafee.com/virusIn er fo Canada (French) www.mcafee.com/us/threat_cent ca.mcafee.
Chapter 50 About McAfee 265 Norway www.mcafee.com/us/threat_cent no.mcafee.com/virusIn er fo Poland www.mcafee.com/us/threat_cent pl.mcafee.com/virusInf er o Portugal www.mcafee.com/us/threat_cent pt.mcafee.com/virusIn er fo Russia www.mcafee.com/us/threat_ce nter ru.mcafee.com/virusIn fo Slovakia www.mcafee.com/us/threat_ce nter sk.mcafee.com/virusInf o Spain www.mcafee.com/us/threat_cent es.mcafee.com/virusInf er o Sweden www.mcafee.com/us/threat_cent se.mcafee.
266 McAfee Total Protection Germany www.hackerwatch.org/?lang=de Greece www.hackerwatch.org/?lang=el Hungary www.hackerwatch.org/?lang=hu Italy www.hackerwatch.org/?lang=it Japan www.hackerwatch.org/?lang=jp Korea www.hackerwatch.org/?lang=ko Mexico www.hackerwatch.org/?lang=es-mx Netherlands www.hackerwatch.org/?lang=nl Norway www.hackerwatch.org/?lang=no Poland www.hackerwatch.org/?lang=pl Portugal www.hackerwatch.org/?lang=pt-pt Russia www.hackerwatch.org/?lang=ru Slovakia www.
267 Index 8 802.11 .....................................................239 802.11a....................................................239 802.11b ...................................................239 802.1x......................................................239 A About alerts ..............................................66 About computer connections.................90 About McAfee ........................................253 About SystemGuards types.....................
268 Index client .......................................................240 compression ..........................................240 Configure a new system service port ...100 Configure automatic updates .................14 Configure event log settings .................104 Configure Firewall Protection Status settings ..................................................77 Configure intrusion detection ................77 Configure ping request settings..............76 Configure SystemGuards options ........
Index I Ignore a protection problem ..................19 Ignoring protection problems ................19 Import an address book ........................129 Include a location in the archive ..........172 Install an available network printer .....236 Install McAfee security software on remote computers..............................215 integrated gateway ................................242 Interrupt an automatic archive ............176 intranet...................................................
270 Index password ................................................244 password vault .......................................244 PCI wireless adapter card......................244 Personal Firewall features.......................62 phishing..................................................244 plain text.................................................245 Play a sound with alerts...........................24 plugin, plug-in .......................................245 POP3 ...................................
Index Setting up virus protection ...............31, 45 Setting up your Webmail accounts ......133 Setting Web browsing time limits ........154 share .......................................................247 Share a file ..............................................230 shared secret ..........................................247 Sharing and sending files ......................229 Sharing files............................................230 Sharing printers .....................................
272 Index W wardriver ................................................249 watch file types ......................................249 watch locations......................................249 web bugs ................................................250 webmail..........................................241, 250 WEP ................................................243, 250 whitelist ..........................................240, 250 Wi-Fi .......................................................