Processor Guide
Page 4
... SecurityCenter 43 Management of group administrators...44 Working with group administrators 45 Management of security policies...46 McAfee Default policy...47 Working with policies...51 Generation of security reports...51 Scheduling reports...53 Adding your logo to reports...54 Computer Profiles report...54 Duplicate Computers report...55 Managing your account...56 Configuring your account profile...56 Signing up for email notifications 57 Viewing and updating subscription information 57 Buying and renewing subscriptions and licenses 58 Locating or creating keys for...
... SecurityCenter 43 Management of group administrators...44 Working with group administrators 45 Management of security policies...46 McAfee Default policy...47 Working with policies...51 Generation of security reports...51 Scheduling reports...53 Adding your logo to reports...54 Computer Profiles report...54 Duplicate Computers report...55 Managing your account...56 Configuring your account profile...56 Signing up for email notifications 57 Viewing and updating subscription information 57 Buying and renewing subscriptions and licenses 58 Locating or creating keys for...
Processor Guide
Page 8
... a subscription to Total Protection Service, an account is a preconfigured website that address the specific needs of your account. When you become the account administrator (referred to -use management console for this release The role of the product and its features. Contents How Total Protection Service works Types of protection Core product strengths New features for monitoring the protection status of computers on computers, they are added to the client software Management with the SecurityCenter 8 McAfee Total Protection Service Product Guide
... a subscription to Total Protection Service, an account is a preconfigured website that address the specific needs of your account. When you become the account administrator (referred to -use management console for this release The role of the product and its features. Contents How Total Protection Service works Types of protection Core product strengths New features for monitoring the protection status of computers on computers, they are added to the client software Management with the SecurityCenter 8 McAfee Total Protection Service Product Guide
Processor Guide
Page 10
... suit your account. prompt users for program detections - Core product strengths Total Protection Service safeguards your account receives it promptly. 10 McAfee Total Protection Service Product Guide By default, Total Protection Service provides a high degree of McAfee. Total Protection Service checks for suspicious activity and takes appropriate action, such as they browse or search with : • Continuous protection - From the time a client computer is turned on removable media or brought in a quarantine folder and the original item is deleted. • Customized...
... suit your account. prompt users for program detections - Core product strengths Total Protection Service safeguards your account receives it promptly. 10 McAfee Total Protection Service Product Guide By default, Total Protection Service provides a high degree of McAfee. Total Protection Service checks for suspicious activity and takes appropriate action, such as they browse or search with : • Continuous protection - From the time a client computer is turned on removable media or brought in a quarantine folder and the original item is deleted. • Customized...
Processor Guide
Page 11
... Total Protection Service software installed on your company key, grant number, installation URL, and group IDs more account data on feature lets you to register IP addresses, then scan them about reported threats, customize messaging that displays for blocked sites, create lists of protection that extend coverage to security by: 1 Silently monitoring all file input and output, downloads, program executions, inbound and outbound communications, and other network assets. Scan websites for vulnerabilities Vulnerability scanning enables you open the email protection...
... Total Protection Service software installed on your company key, grant number, installation URL, and group IDs more account data on feature lets you to register IP addresses, then scan them about reported threats, customize messaging that displays for blocked sites, create lists of protection that extend coverage to security by: 1 Silently monitoring all file input and output, downloads, program executions, inbound and outbound communications, and other network assets. Scan websites for vulnerabilities Vulnerability scanning enables you open the email protection...
Processor Guide
Page 14
... file from the update site. 4 On the client computer, the catalog file is reduced. This catalog file contains information for updates and download them from the update website individually, the Internet traffic load on the network is extracted and new components are not connected to communicate with the update site. Updates through relay servers Internet Independent Updating (IIU) enables computers to update Total Protection Service client software when they are installed. See the installation guide for Total Protection Service. 3 If new components...
... file from the update site. 4 On the client computer, the catalog file is reduced. This catalog file contains information for updates and download them from the update website individually, the Internet traffic load on the network is extracted and new components are not connected to communicate with the update site. Updates through relay servers Internet Independent Updating (IIU) enables computers to update Total Protection Service client software when they are installed. See the installation guide for Total Protection Service. 3 If new components...
Processor Guide
Page 16
... the client software belongs to related portals - You can base groups on geographic location, department, computer type, user tasks, or anything meaningful to view and manage them as email protection and vulnerability scanning. You can easily check detections for managing computers because they let you to your own company's needs. 16 McAfee Total Protection Service Product Guide In large accounts, groups are an essential tool for these computers or customize their security settings. • User groups: Create groups...
... the client software belongs to related portals - You can base groups on geographic location, department, computer type, user tasks, or anything meaningful to view and manage them as email protection and vulnerability scanning. You can easily check detections for managing computers because they let you to your own company's needs. 16 McAfee Total Protection Service Product Guide In large accounts, groups are an essential tool for these computers or customize their security settings. • User groups: Create groups...
Processor Guide
Page 17
...or one policy to set up of protection to • Downloads (Web Filtering) • • Red - If you have computers check for updates every 12 hours Spyware Protection Mode Prompt Approved Programs None Firewall Protection Mode Protect Use Smart Recommendations to automatically approve common Internet applications Connection Type Enabled Trusted network Allowed Internet Applications AOL Instant Messenger Daily Enabled Enabled 4 hours Protect None Protect No Untrusted network None Access to Sites, Access to different users. McAfee Total Protection Service Product Guide 17...
...or one policy to set up of protection to • Downloads (Web Filtering) • • Red - If you have computers check for updates every 12 hours Spyware Protection Mode Prompt Approved Programs None Firewall Protection Mode Protect Use Smart Recommendations to automatically approve common Internet applications Connection Type Enabled Trusted network Allowed Internet Applications AOL Instant Messenger Daily Enabled Enabled 4 hours Protect None Protect No Untrusted network None Access to Sites, Access to different users. McAfee Total Protection Service Product Guide 17...
Processor Guide
Page 23
... versions of Total Protection Service need to update manually as part of the troubleshooting process. Manual updates At times, users might send an EXTRA.DAT file with other client computers on In most scenarios, Total Protection Service supports terminal servers and the Windows fast user switching feature. NOTE: In rare cases, McAfee might want to check for manually installing it to share the update immediately with instructions for updates manually. When the pseudo user cannot be activated before automatic updates occur. McAfee Total Protection Service Product Guide...
... versions of Total Protection Service need to update manually as part of the troubleshooting process. Manual updates At times, users might send an EXTRA.DAT file with other client computers on In most scenarios, Total Protection Service supports terminal servers and the Windows fast user switching feature. NOTE: In rare cases, McAfee might want to check for manually installing it to share the update immediately with instructions for updates manually. When the pseudo user cannot be activated before automatic updates occur. McAfee Total Protection Service Product Guide...
Processor Guide
Page 24
... spyware scans to detect all user sessions, the Total Protection Service icon is completed, the panel displays the date of the last update and a list of the update. • W hen the update is removed from the Check for updates every list. 4 Click Save. (For a new policy, click Next, select additional options for the policy, then click Save.) Updating client computers manually Use this task to detection definition (DAT) files and software components. Task • C lick the Total Protection Service icon...
... spyware scans to detect all user sessions, the Total Protection Service icon is completed, the panel displays the date of the last update and a list of the update. • W hen the update is removed from the Check for updates every list. 4 Click Save. (For a new policy, click Next, select additional options for the policy, then click Save.) Updating client computers manually Use this task to detection definition (DAT) files and software components. Task • C lick the Total Protection Service icon...
Processor Guide
Page 25
... the Total Protection Service client software. McAfee Total Protection Service Product Guide 25 Using the Client Software Performing setup and maintenance tasks Disabling updates for non-logged on users Use this task to prevent failed automatic updates from being reported as errors when requirements cannot be detected as a site administrator Configuring notifications Configuring what users see Uninstalling the client software Testing virus protection Use this case, use Windows Explorer to set up and monitor the general features of virus and spyware protection by downloading the...
... the Total Protection Service client software. McAfee Total Protection Service Product Guide 25 Using the Client Software Performing setup and maintenance tasks Disabling updates for non-logged on users Use this task to prevent failed automatic updates from being reported as errors when requirements cannot be detected as a site administrator Configuring notifications Configuring what users see Uninstalling the client software Testing virus protection Use this case, use Windows Explorer to set up and monitor the general features of virus and spyware protection by downloading the...
Processor Guide
Page 28
... stopped, such as a scheduled scan, is not supported. If you might fail if the Temp folder does not exist. Basic authentication is running in Internet Explorer. Updates might need to provide additional information for instructions.) • A djust your computer, click the message balloon to delete the Temp folder in help not display correctly? What does this message when starting your corporate firewall or proxy settings. 28 McAfee Total Protection Service Product Guide...
... stopped, such as a scheduled scan, is not supported. If you might fail if the Temp folder does not exist. Basic authentication is running in Internet Explorer. Updates might need to provide additional information for instructions.) • A djust your computer, click the message balloon to delete the Temp folder in help not display correctly? What does this message when starting your corporate firewall or proxy settings. 28 McAfee Total Protection Service Product Guide...
Processor Guide
Page 38
... Library. NOTE: Deleting a computer does not remove the Total Protection Service client software. Add one or more computers in the list, then select an existing policy from the listing, it automatically reappears the next time its report data is uploaded; This page displays information about their site administrator has assigned to Group list. Add user-approved applications to one or more computers in the list, then click the Email button. Send email to view detailed information...
... Library. NOTE: Deleting a computer does not remove the Total Protection Service client software. Add one or more computers in the list, then select an existing policy from the listing, it automatically reappears the next time its report data is uploaded; This page displays information about their site administrator has assigned to Group list. Add user-approved applications to one or more computers in the list, then click the Email button. Send email to view detailed information...
Processor Guide
Page 39
...address box, type a new email address, then click Save. Display instructions for the group separately from approving applications, configure policy options for Protect mode. NOTE: This feature is placed into a single group enables you manage large numbers of Total Protection Service that users have approved to view and manage security issues for resolving an action item Under Action Items, click the action item. Why use different security settings (defined in instead. McAfee Total Protection Service Product Guide 39 Move the computer to open a page that use groups? Add...
...address box, type a new email address, then click Save. Display instructions for the group separately from approving applications, configure policy options for Protect mode. NOTE: This feature is placed into a single group enables you manage large numbers of Total Protection Service that users have approved to view and manage security issues for resolving an action item Under Action Items, click the action item. Why use different security settings (defined in instead. McAfee Total Protection Service Product Guide 39 Move the computer to open a page that use groups? Add...
Processor Guide
Page 45
... to create policies, check reports, and maintain the SecurityCenter account. 2 The site administrator creates and manages group administrators. 3 Group administrators communicate directly with group administrators Use this ... 1 In the Group Administrators section, select Add. 45 2 On the Manage Group Administrators page, select Create New. Select from the the assigned groups are assigned to manage group administrators on the access level assigned to display a complete listing. Up to six group administrators can view, edit, create, or delete group administrators. Task For option...
... to create policies, check reports, and maintain the SecurityCenter account. 2 The site administrator creates and manages group administrators. 3 Group administrators communicate directly with group administrators Use this ... 1 In the Group Administrators section, select Add. 45 2 On the Manage Group Administrators page, select Create New. Select from the the assigned groups are assigned to manage group administrators on the access level assigned to display a complete listing. Up to six group administrators can view, edit, create, or delete group administrators. Task For option...
Processor Guide
Page 47
... splash screen Disabled: The McAfee Total Protection Service splash screen is displayed when a computer is scheduled. After you create one or more new policies, you want to change without having to configure only the settings you can access important websites and applications until you create a new policy, the McAfee Default policy settings appear as errors. NOTE: This section explains only the settings for updated detection definition (DAT) files and product components every 12 hours. Display support notifications on and the client software starts running. This enables...
... splash screen Disabled: The McAfee Total Protection Service splash screen is displayed when a computer is scheduled. After you create one or more new policies, you want to change without having to configure only the settings you can access important websites and applications until you create a new policy, the McAfee Default policy settings appear as errors. NOTE: This section explains only the settings for updated detection definition (DAT) files and product components every 12 hours. Display support notifications on and the client software starts running. This enables...
Processor Guide
Page 48
... time users run on client computers. This is because on-access scans do not look for threats in reserved memory and prevent that code from displaying, create a new policy with a different setting. Option Definitions - Enable script scanning Enabled: Detect harmful code embedded in web pages that are downloaded, opened, or run from data in email before delivering to McAfee Avert Labs for threats in all types of only default types, when they are accessed. Enable Artemis heuristic network check for suspicious files Enabled...
... time users run on client computers. This is because on-access scans do not look for threats in reserved memory and prevent that code from displaying, create a new policy with a different setting. Option Definitions - Enable script scanning Enabled: Detect harmful code embedded in web pages that are downloaded, opened, or run from data in email before delivering to McAfee Avert Labs for threats in all types of only default types, when they are accessed. Enable Artemis heuristic network check for suspicious files Enabled...
Processor Guide
Page 52
... vulnerability scanning, reports are assigned a policy where this report to track down obsolete computers and those types of protection. For versions of Total Protection Service that spyware protection or firewall protection detected on your network. Use this report to evaluate the effectiveness of your security strategy. Duplicate Computers Computer Profiles Computers that client computers attempted to install software patches for a specific browser or operating system, check the version of the client software, identify relay servers, and...
... vulnerability scanning, reports are assigned a policy where this report to track down obsolete computers and those types of protection. For versions of Total Protection Service that spyware protection or firewall protection detected on your network. Use this report to evaluate the effectiveness of your security strategy. Duplicate Computers Computer Profiles Computers that client computers attempted to install software patches for a specific browser or operating system, check the version of the client software, identify relay servers, and...
Processor Guide
Page 81
... open it , and then add approved programs as your connection to the McAfee Default policy? NOTE: To prevent this problem, force the computer to re-enable on-access scanning automatically whenever it checks for the new policy, save it . However, you clicked to using the Admin Login feature), then enable it is protected from the Total Protection Service console on the Policies page of the SecurityCenter, the new policy is currently disabled. Error messages This section includes error messages...
... open it , and then add approved programs as your connection to the McAfee Default policy? NOTE: To prevent this problem, force the computer to re-enable on-access scanning automatically whenever it checks for the new policy, save it . However, you clicked to using the Admin Login feature), then enable it is protected from the Total Protection Service console on the Policies page of the SecurityCenter, the new policy is currently disabled. Error messages This section includes error messages...
Processor Guide
Page 83
... addresses, addresses you can designate: McAfee Total Protection Service Product Guide 83 When the computer... Custom Should communicate only through specific Allows communications with the ports and IP ports or with other network communications. Additional information about where communications originate. When you set up connection, a DSL line, or a cable modem; Allows communications with a specific range of Internet applications running on the same subnet. services. For example, mobile users who connect to both secured...
... addresses, addresses you can designate: McAfee Total Protection Service Product Guide 83 When the computer... Custom Should communicate only through specific Allows communications with the ports and IP ports or with other network communications. Additional information about where communications originate. When you set up connection, a DSL line, or a cable modem; Allows communications with a specific range of Internet applications running on the same subnet. services. For example, mobile users who connect to both secured...
Processor Guide
Page 86
... mode to discover Internet applications Report mode can review detected applications in the report, change the policy setting to Prompt or Protect mode. Supports 32-bit IP addresses consisting of four groups of four hexadecimal characters. We recommend that you to configure a custom connection to accept only communications that originate from other system applications might attempt to open them before the computer can communicate through ports, which are appropriate for system services...
... mode to discover Internet applications Report mode can review detected applications in the report, change the policy setting to Prompt or Protect mode. Supports 32-bit IP addresses consisting of four groups of four hexadecimal characters. We recommend that you to configure a custom connection to accept only communications that originate from other system applications might attempt to open them before the computer can communicate through ports, which are appropriate for system services...