User Guide
Table of Contents
xii McAfee Office
CreatingtheSmartLinksdatabase .............................145
CustomizationInterview .....................................146
UnInstallerwizards..........................................146
AboutPowerClean ..........................................148
AboutMcAfeeGuardian .....................................148
UsingQuickClean ...............................................150
HowdoIsetupQuickCleantorunautomatically?................150
HowdoIscheduleQuickCleantorunataspecifictime? ..........151
Using SpaceMaker ..............................................151
UsingRemove..................................................152
UsingTransport ................................................153
How do I rebuild a transported application on another computer? . .153
UsingArchive ..................................................154
UsingMove ....................................................155
UsingBackTrack................................................156
How do I set BackTrack Monitor to run in the background? ........156
HowdoImonitorinstallationofasingleapplication?.............157
HowdoIundoanapplicationinstallationthatImonitored?........157
UsingRestore ..................................................158
HowdoIrestoredeletedfiles? ................................159
UsingPowerClean ..............................................160
WhydoesthePowerCleanfeatureopeninread-onlymode? .......161
PowerCleanmenus .........................................165
Usingthetabpanes?........................................166
Whatdothecolorcodesmean? ..........................166
ChangingthedefaultsforthePowerCleanfeature................167
ViewingchangesdoneusingthePowerCleanfeature ........168
AboutReportsdialogbox ........................................168
Chapter7. McAfeeInternetGuardDog .........................171
HowInternetGuardDogworks ....................................171
UserSetup ................................................171
VirusScan .................................................171
ActivityLogs ..............................................172
SecurityCheck .............................................172