User guide
Table Of Contents
- Contents
- 1 Introducing McAfee Quarantine Manager
- 2 Pre-Installation Information and Tasks
- 3 Quick Setup
- 4 Installing the Software
- Accessing the software
- Installing MySQL for McAfee Quarantine Manager 6.0
- Installing McAfee Quarantine Manager version 6.0
- Configuring your MySQL database
- Configuring your Microsoft SQL Server database
- Installing McAfee Quarantine Manager 6.0 DB Suite utility
- Testing your installation
- Uninstalling McAfee Quarantine Manager
- 5 Integrating with ePolicy Orchestrator 4.0
- Before you begin
- ePolicy Orchestrator agent
- Installation
- Configuring policies for McAfee Quarantine Manager
- Introducing ePolicy Orchestrator 4.0 dashboard
- Reporting
- Systems
- Uninstalling the McAfee Quarantine Manager
- 6 Types of Interfaces
- 7 Getting Started with the Interface for administrators
- 8 Managing Quarantined Items
- 9 Managing Blacklists and Whitelists
- 10 Managing User Submissions
- 11 Managing Settings and Diagnostics
- 12 Managing administrators
- 13 Getting Started with the Interface for Users
- 14 About DB Suite Utility
- 15 Frequently Asked Questions
- Index

45
8
Managing Quarantined Items
Quarantined Items is used to view information about emails that contains spam, phish,
viruses, potentially unwanted programs, unwanted content, and all items. You can use
up to three search filters to narrow your search.
Topics covered are:
Searching a quarantined item
Viewing search results
Spam
Spam is an unwanted email message, specifically unsolicited bulk messages.
Phish
Phish is a method of fraudulently obtaining personal information (such as passwords,
social security numbers, and credit card details) by sending spoofed email messages
that look like they came from trusted sources such as legitimate companies or banks.
Typically, phishing email messages request that recipients click a link in the email to
verify or update the contact details or credit card information.
Viruses
A virus is a program or code that replicates itself, multiplies, and infects another useful
program, boot sector, partition sector or document that supports macros, by inserting
itself or attaching itself to that medium. Most viruses replicate and many do a large
amount of damage to the system.
Potentially unwanted programs
Potentially Unwanted Programs (PUPs) are software programs written by legitimate
companies which, if installed, may alter the security state or the privacy posture of a
computer.
Unwanted content
Any content that is filtered by the scanner is called unwanted content. You can use
Unwanted Content to view emails/attachments that contain unwanted content.