User Guide
Page 3
i Contents McAfee Total Protection 3 McAfee SecurityCenter...5 SecurityCenter features 6 Using SecurityCenter 7 Fixing or ignoring protection problems 16 Working with alerts 21 Viewing events...27 McAfee VirusScan ...29 VirusScan features 30 Scanning your computer 31 Working with scan results 35 Scan types ...38 Using additional protection 41 Setting up virus protection 45 McAfee Personal Firewall 61 Personal Firewall features 62 Starting Firewall ...63 Working with alerts 65 Managing informational alerts 67 Configuring Firewall protection 69 Managing programs and permissions...
i Contents McAfee Total Protection 3 McAfee SecurityCenter...5 SecurityCenter features 6 Using SecurityCenter 7 Fixing or ignoring protection problems 16 Working with alerts 21 Viewing events...27 McAfee VirusScan ...29 VirusScan features 30 Scanning your computer 31 Working with scan results 35 Scan types ...38 Using additional protection 41 Setting up virus protection 45 McAfee Personal Firewall 61 Personal Firewall features 62 Starting Firewall ...63 Working with alerts 65 Managing informational alerts 67 Configuring Firewall protection 69 Managing programs and permissions...
User Guide
Page 16
... checking for updates manually, see Working with alerts (page 21). 1 Open the SecurityCenter Configuration pane. How? For more information, see Check for updates regularly; If you want to change this default behavior, you may be downloaded or installed using alerts. When you update your programs from an alert, you can either download or install the updates, or postpone the updates. otherwise, your computer will not have the latest security protection...
... checking for updates manually, see Working with alerts (page 21). 1 Open the SecurityCenter Configuration pane. How? For more information, see Check for updates regularly; If you want to change this default behavior, you may be downloaded or installed using alerts. When you update your programs from an alert, you can either download or install the updates, or postpone the updates. otherwise, your computer will not have the latest security protection...
User Guide
Page 19
... the McAfee Web site or CD. however, some other protection categories. Note: Often, a single protection problem affects more information, see the VirusScan help . The configuration changes that you to take when fixing protection problems manually: Problem Action A full scan of -date. help . The following table describes some problems may require you might take action. A program is not installed. Your subscription has expired. Chapter 4 McAfee Total Protection 17 Fixing protection problems Most security problems can...
... the McAfee Web site or CD. however, some other protection categories. Note: Often, a single protection problem affects more information, see the VirusScan help . The configuration changes that you to take when fixing protection problems manually: Problem Action A full scan of -date. help . The following table describes some problems may require you might take action. A program is not installed. Your subscription has expired. Chapter 4 McAfee Total Protection 17 Fixing protection problems Most security problems can...
User Guide
Page 32
... use minimal computer resources, but if you want to the threat type. Pausing tasks in mind that occupies your entire computer screen, VirusScan pauses a number of entry-including e-mail, instant messages, and the Web. but keep the detected item, or remove the detected item). 30 McAfee Total Protection VirusScan features Comprehensive virus protection Defend yourself and your computer from different points of tasks, such as manual scans...
... use minimal computer resources, but if you want to the threat type. Pausing tasks in mind that occupies your entire computer screen, VirusScan pauses a number of entry-including e-mail, instant messages, and the Web. but keep the detected item, or remove the detected item). 30 McAfee Total Protection VirusScan features Comprehensive virus protection Defend yourself and your computer from different points of tasks, such as manual scans...
User Guide
Page 40
... your PC. Custom scan options include checking for threats in all files, in archive files, and in cookies in processes, critical Windows files, and other security threats that your PC for threat activity), manual scanning from Windows Explorer, and the ability to run a full, quick, custom scan from SecurityCenter, or customize when scheduled scans will occur. 38 McAfee Total Protection Scan types VirusScan provides a complete set of scanning options for virus protection, including real-time scanning (which...
... your PC. Custom scan options include checking for threats in all files, in archive files, and in cookies in processes, critical Windows files, and other security threats that your PC for threat activity), manual scanning from Windows Explorer, and the ability to run a full, quick, custom scan from SecurityCenter, or customize when scheduled scans will occur. 38 McAfee Total Protection Scan types VirusScan provides a complete set of scanning options for virus protection, including real-time scanning (which...
User Guide
Page 48
... & Files. 3. viruses 46 McAfee Total Protection Setting real-time scan options When you start real-time virus protection, VirusScan uses a default set real-time scan options to suit your needs. however, you can change real-time scanning options, you must also determine whether it's important for unknown viruses and tracking cookies as well as the locations and file types it scans network drives that is where most viruses are mapped to temporarily hold computer information. Set real-time scan options You set of...
... & Files. 3. viruses 46 McAfee Total Protection Setting real-time scan options When you start real-time virus protection, VirusScan uses a default set real-time scan options to suit your needs. however, you can change real-time scanning options, you must also determine whether it's important for unknown viruses and tracking cookies as well as the locations and file types it scans network drives that is where most viruses are mapped to temporarily hold computer information. Set real-time scan options You set of...
User Guide
Page 50
... initiating each time it scans. You can scan only critical PC files, items on your computer, or any activity that you scan files on demand. however, you start a custom scan, VirusScan checks your needs. Set custom scan options You set the custom scan location to track your entire computer screen, VirusScan pauses a number of scanning options. For example, you can also determine whether archive files (for example, .zip files) are experiencing slow scan speeds, consider disabling the option to use to...
... initiating each time it scans. You can scan only critical PC files, items on your computer, or any activity that you scan files on demand. however, you start a custom scan, VirusScan checks your needs. Set custom scan options You set the custom scan location to track your entire computer screen, VirusScan pauses a number of scanning options. For example, you can also determine whether archive files (for example, .zip files) are experiencing slow scan speeds, consider disabling the option to use to...
User Guide
Page 54
... for harm. Browser SystemGuards 52 McAfee Total Protection Using SystemGuards options SystemGuards monitor, log, report, and manage potentially unauthorized changes made to the Windows registry or critical system files on your computer. These important registry items and files include ActiveX installations, startup items, Windows shell execute hooks, and shell service object delay loads. These important registry items and files include context menu handlers, appInit DLLs, and the Windows hosts file. It also helps stop suspect programs that can bring...
... for harm. Browser SystemGuards 52 McAfee Total Protection Using SystemGuards options SystemGuards monitor, log, report, and manage potentially unauthorized changes made to the Windows registry or critical system files on your computer. These important registry items and files include ActiveX installations, startup items, Windows shell execute hooks, and shell service object delay loads. These important registry items and files include context menu handlers, appInit DLLs, and the Windows hosts file. It also helps stop suspect programs that can bring...
User Guide
Page 72
... making an outbound Internet connection only. Allowing access lets a program create outbound connections and listen for unknown programs that are displayed and which you to immediately reset your computer's presence on the Program Permissions pane. The following table describes Firewall's three security levels, starting from the Restore Firewall Defaults pane. 70 McAfee Total Protection Managing Firewall security levels Firewall's security levels control the degree to which , in turn...
... making an outbound Internet connection only. Allowing access lets a program create outbound connections and listen for unknown programs that are displayed and which you to immediately reset your computer's presence on the Program Permissions pane. The following table describes Firewall's three security levels, starting from the Restore Firewall Defaults pane. 70 McAfee Total Protection Managing Firewall security levels Firewall's security levels control the degree to which , in turn...
User Guide
Page 79
... following options: Firewall protection is disabled. Firewall service is not running. Firewall Protection is not installed on your computer. Your Windows Firewall is disabled. Outbound firewall is enabled, click Advanced. 3 On the Firewall pane, click Intrusion Detection. 4 Under Detect Intrusion Attempts, do one or more attacks or scans. 1 On the McAfee SecurityCenter pane, click Internet & Network, then click Configure...
... following options: Firewall protection is disabled. Firewall service is not running. Firewall Protection is not installed on your computer. Your Windows Firewall is disabled. Outbound firewall is enabled, click Advanced. 3 On the Firewall pane, click Intrusion Detection. 4 Under Detect Intrusion Attempts, do one or more attacks or scans. 1 On the McAfee SecurityCenter pane, click Internet & Network, then click Configure...
User Guide
Page 137
... this account. You can remove the account while you troubleshoot the issue. 1 Open the Spam Protection pane. Specify the name of e-mail account you are experiencing problems, you can type any more or you are adding. (for your e-mail address is username@hotmail.com, the user name is enabled, click Advanced. 2 On the Spam Protection pane, click Webmail Accounts. 3 Select the account you want...
... this account. You can remove the account while you troubleshoot the issue. 1 Open the Spam Protection pane. Specify the name of e-mail account you are experiencing problems, you can type any more or you are adding. (for your e-mail address is username@hotmail.com, the user name is enabled, click Advanced. 2 On the Spam Protection pane, click Webmail Accounts. 3 Select the account you want...
User Guide
Page 172
... the Advanced Menu, click Configure. 2 On the Configure pane, click Computer & Files. 3 On the Computer & Files Configuration pane, under Local Archive is enabled, click Off. 170 McAfee Total Protection Enabling and disabling local archive The first time you launch Backup and Restore, you decide whether to enable or disable local archive, depending on your computer to CD, DVD, USB drive, external hard drive, or network drive, you can enable or disable...
... the Advanced Menu, click Configure. 2 On the Configure pane, click Computer & Files. 3 On the Computer & Files Configuration pane, under Local Archive is enabled, click Off. 170 McAfee Total Protection Enabling and disabling local archive The first time you launch Backup and Restore, you decide whether to enable or disable local archive, depending on your computer to CD, DVD, USB drive, external hard drive, or network drive, you can enable or disable...
User Guide
Page 173
... Experts Group files (.jpg, .jpeg) Tagged Image Format files (.tif) MPEG Audio Stream III files (.mp3) Video files (.vdo) Note: You cannot archive the following file types are enabled by people who do not know how to make it unreadable by default for new files or file changes. Watch locations are compressed into a form that Backup and Restore monitors for your files, you must set up a top-level folders location, Backup...
... Experts Group files (.jpg, .jpeg) Tagged Image Format files (.tif) MPEG Audio Stream III files (.mp3) Video files (.vdo) Note: You cannot archive the following file types are enabled by people who do not know how to make it unreadable by default for new files or file changes. Watch locations are compressed into a form that Backup and Restore monitors for your files, you must set up a top-level folders location, Backup...
User Guide
Page 241
.... Compare to maintain connectivity. When wireless users roam with 802.11 wireless networking. Most ActiveX controls are harmless; See also authentication (page 239). 239 Glossary 8 802.11 A set of standards for transmitting data across a wireless network. 802.11 is commonly used by programs or web pages to 11 Mbps in the 5GHz band. archive To create a copy of important files on wired and...
.... Compare to maintain connectivity. When wireless users roam with 802.11 wireless networking. Most ActiveX controls are harmless; See also authentication (page 239). 239 Glossary 8 802.11 A set of standards for transmitting data across a wireless network. 802.11 is commonly used by programs or web pages to 11 Mbps in the 5GHz band. archive To create a copy of important files on wired and...
User Guide
Page 245
... and files. MSN Microsoft Network. IP spoofing Forging the IP addresses in many types of spam so they cannot be 0 to 255 (for example, a single building). K key A series of an IP address is also often used to work through a single client, such as a starting point for launching and managing U3 USB programs. M MAC address Media Access Control address. message authentication code (MAC) A security code used to authenticate their communication link has been breached. A Microsoft interface specification that allows different messaging...
... and files. MSN Microsoft Network. IP spoofing Forging the IP addresses in many types of spam so they cannot be 0 to 255 (for example, a single building). K key A series of an IP address is also often used to work through a single client, such as a starting point for launching and managing U3 USB programs. M MAC address Media Access Control address. message authentication code (MAC) A security code used to authenticate their communication link has been breached. A Microsoft interface specification that allows different messaging...
User Guide
Page 246
... computers and components that service a finance department. NIC Network Interface Card. Compare to a network. For example, a "Finance Network" might include all of letters and numbers) you to store your passwords with confidence that is connected to a server on -access scanning. P password A code (usually consisting of the servers, routers, and systems that make up a home network. PCI wireless adapter card Peripheral Component Interconnect. phishing A method of selected files, applications, or network devices to find...
... computers and components that service a finance department. NIC Network Interface Card. Compare to a network. For example, a "Finance Network" might include all of letters and numbers) you to store your passwords with confidence that is connected to a server on -access scanning. P password A code (usually consisting of the servers, routers, and systems that make up a home network. PCI wireless adapter card Peripheral Component Interconnect. phishing A method of selected files, applications, or network devices to find...
User Guide
Page 249
... the shared files. It is set up copy of RADIUS messages. shortcut A file that identifies a Wi-Fi (802.11) network. smart drive See USB drive (page 249). SSID Service Set Identifier. Routers read each time you send or receive email messages. server A computer or program that grant a user administrator-level access to another. The SSID is used on a network. Glossary 247 rootkit A collection of tools (programs) that accepts connections from other...
... the shared files. It is set up copy of RADIUS messages. shortcut A file that identifies a Wi-Fi (802.11) network. smart drive See USB drive (page 249). SSID Service Set Identifier. Routers read each time you send or receive email messages. server A computer or program that grant a user administrator-level access to another. The SSID is used on a network. Glossary 247 rootkit A collection of tools (programs) that accepts connections from other...
User Guide
Page 250
... the operating system or some other computers. synchronize Resolving inconsistencies between backed up files and those stored on disk by Netscape for wireless LANs. trusted list A list of significant system events, such as when a program or driver is used during a session and then discarded. You can also unknowingly download the Trojan horse from this list. 248 McAfee Total Protection SSL Secure Sockets Layer.
... the operating system or some other computers. synchronize Resolving inconsistencies between backed up files and those stored on disk by Netscape for wireless LANs. trusted list A list of significant system events, such as when a program or driver is used during a session and then discarded. You can also unknowingly download the Trojan horse from this list. 248 McAfee Total Protection SSL Secure Sockets Layer.
User Guide
Page 269
... About trusted lists types 59 Accept a file from another computer ...233 access point (AP 239 Access the network map 206 Access your McAfee account 11 Activate your product 11 ActiveX control 239 Add a banned computer connection .....94 Add a computer connection 90 Add a computer from the Inbound Events log 91 Add a domain 131 Add a friend from the Anti-Spam toolbar 130 Add a friend manually 130 Add a McAfee user 147 Add a password 164 Add a personal filter 123 Add a Web site...
... About trusted lists types 59 Accept a file from another computer ...233 access point (AP 239 Access the network map 206 Access your McAfee account 11 Activate your product 11 ActiveX control 239 Add a banned computer connection .....94 Add a computer connection 90 Add a computer from the Inbound Events log 91 Add a domain 131 Add a friend from the Anti-Spam toolbar 130 Add a friend manually 130 Add a McAfee user 147 Add a password 164 Add a personal filter 123 Add a Web site...
User Guide
Page 270
... 77 Configure ping request settings 76 Configure SystemGuards options ..........53 Configure UDP settings 76 Configuring alert options 24 Configuring Firewall protection 69 Configuring phishing protection..........139 Configuring Smart Recommendations for alerts 73 Configuring spam detection 119 Configuring system service ports ...........98 Configuring users 145 content-rating group 240 cookie 241 Copy a shared file 231 Copyright 254 Customer and Technical Support ........255 D DAT 241 Defragment your computer 189 Defragmenting your computer 189 Delete a Disk Defragmenter...
... 77 Configure ping request settings 76 Configure SystemGuards options ..........53 Configure UDP settings 76 Configuring alert options 24 Configuring Firewall protection 69 Configuring phishing protection..........139 Configuring Smart Recommendations for alerts 73 Configuring spam detection 119 Configuring system service ports ...........98 Configuring users 145 content-rating group 240 cookie 241 Copy a shared file 231 Copyright 254 Customer and Technical Support ........255 D DAT 241 Defragment your computer 189 Defragmenting your computer 189 Delete a Disk Defragmenter...