User Guide
Page 3
... protection problems 16 Working with alerts 21 Viewing events...27 McAfee VirusScan ...29 VirusScan features 30 Scanning your computer 31 Working with scan results 35 Scan types ...38 Using additional protection 41 Setting up virus protection 45 McAfee Personal Firewall 61 Personal Firewall features 62 Starting Firewall ...63 Working with alerts 65 Managing informational alerts 67 Configuring Firewall protection 69 Managing programs and permissions 81 Managing computer connections 89 Managing system services 97 Logging...
... protection problems 16 Working with alerts 21 Viewing events...27 McAfee VirusScan ...29 VirusScan features 30 Scanning your computer 31 Working with scan results 35 Scan types ...38 Using additional protection 41 Setting up virus protection 45 McAfee Personal Firewall 61 Personal Firewall features 62 Starting Firewall ...63 Working with alerts 65 Managing informational alerts 67 Configuring Firewall protection 69 Managing programs and permissions 81 Managing computer connections 89 Managing system services 97 Logging...
User Guide
Page 16
... updates are disabled, click On, and then click Advanced. 3 Click one of the following buttons: Install the updates automatically and notify me when my services are updated (recommended) Download the updates automatically and notify me before downloading any updates 4 Click OK. How? How? 1. otherwise, your computer will not have the latest security protection. 14 McAfee VirusScan Plus Configure automatic updates By default, SecurityCenter automatically checks for and installs updates...
... updates are disabled, click On, and then click Advanced. 3 Click one of the following buttons: Install the updates automatically and notify me when my services are updated (recommended) Download the updates automatically and notify me before downloading any updates 4 Click OK. How? How? 1. otherwise, your computer will not have the latest security protection. 14 McAfee VirusScan Plus Configure automatic updates By default, SecurityCenter automatically checks for and installs updates...
User Guide
Page 19
... the McAfee Web site or CD. Check your protection manually. A program is not installed. A program is missing components. A program is disabled, SecurityCenter can enable it from all other actions that SecurityCenter makes when automatically fixing protection problems are out-of your computer has Scan your subscriptions (page 11). The following table describes some problems may require you must install it. Update your account status on the McAfee...
... the McAfee Web site or CD. Check your protection manually. A program is not installed. A program is missing components. A program is disabled, SecurityCenter can enable it from all other actions that SecurityCenter makes when automatically fixing protection problems are out-of your computer has Scan your subscriptions (page 11). The following table describes some problems may require you must install it. Update your account status on the McAfee...
User Guide
Page 31
.... Protection extends beyond the files and folders on schedule, periodically checking your computer using a more sophisticated set of entry-including e-mail, instant messages, and the Web. Note: SecurityCenter reports critical and non-critical protection problems as soon as it for you, cleaning or quarantining infected items before any damage occurs. 29 CHAPTER 7 McAfee VirusScan VirusScan's advanced detection and protection services defend you and your computer from different points of options...
.... Protection extends beyond the files and folders on schedule, periodically checking your computer using a more sophisticated set of entry-including e-mail, instant messages, and the Web. Note: SecurityCenter reports critical and non-critical protection problems as soon as it for you, cleaning or quarantining infected items before any damage occurs. 29 CHAPTER 7 McAfee VirusScan VirusScan's advanced detection and protection services defend you and your computer from different points of options...
User Guide
Page 32
... threat type. No tedious administration required. but keep in full-screen When enjoying activities like watching movies, playing games on its own. Resource-aware scanning options Customize scanning options if you don't, your computer remains protected. 30 McAfee VirusScan Plus VirusScan features Comprehensive virus protection Defend yourself and your computer from different points of tasks, such as manual scans. Automatic repairs If VirusScan detects a security threat while running a scan, it...
... threat type. No tedious administration required. but keep in full-screen When enjoying activities like watching movies, playing games on its own. Resource-aware scanning options Customize scanning options if you don't, your computer remains protected. 30 McAfee VirusScan Plus VirusScan features Comprehensive virus protection Defend yourself and your computer from different points of tasks, such as manual scans. Automatic repairs If VirusScan detects a security threat while running a scan, it...
User Guide
Page 40
... your computer access them. 38 McAfee VirusScan Plus Scan types VirusScan provides a complete set of changing scanning options on-the-fly. Scanning in processes, critical Windows files, and other security threats that your entire computer for threats in all files, in archive files, and in cookies in tracking cookies and network drives. Real-Time Scanning: Real-time virus protection constantly monitors your computer for virus activity, scanning files each time you to thoroughly check your...
... your computer access them. 38 McAfee VirusScan Plus Scan types VirusScan provides a complete set of changing scanning options on-the-fly. Scanning in processes, critical Windows files, and other security threats that your entire computer for threats in all files, in archive files, and in cookies in tracking cookies and network drives. Real-Time Scanning: Real-time virus protection constantly monitors your computer for virus activity, scanning files each time you to thoroughly check your...
User Guide
Page 48
... as well as providing buffer overflow protection. Do this occurs, your needs. Options include scanning for during a real-time scan, as well as the locations and file types it scans. 46 McAfee VirusScan Plus Setting real-time scan options When you can change real-time scanning options, you must make decisions about what VirusScan looks for your computer or just local drives. To... however, you start real-time virus protection, VirusScan uses a default set real-time scan options to security attacks.
... as well as providing buffer overflow protection. Do this occurs, your needs. Options include scanning for during a real-time scan, as well as the locations and file types it scans. 46 McAfee VirusScan Plus Setting real-time scan options When you can change real-time scanning options, you must make decisions about what VirusScan looks for your computer or just local drives. To... however, you start real-time virus protection, VirusScan uses a default set real-time scan options to security attacks.
User Guide
Page 50
... harmful items using the default scan options. Note: When enjoying activities like watching movies, playing games on demand. Set custom scan options You set up a regular schedule for initiating each time it scans. Scheduled scans always check your entire computer screen, VirusScan pauses a number of scanning options. 48 McAfee VirusScan Plus Setting custom scan options Custom virus protection lets you can restrict scanning to specific folders and drives. 1 Open the Custom Scan pane. When you are detected). You must make decisions about what VirusScan looks...
... harmful items using the default scan options. Note: When enjoying activities like watching movies, playing games on demand. Set custom scan options You set up a regular schedule for initiating each time it scans. Scheduled scans always check your entire computer screen, VirusScan pauses a number of scanning options. 48 McAfee VirusScan Plus Setting custom scan options Custom virus protection lets you can restrict scanning to specific folders and drives. 1 Open the Custom Scan pane. When you are detected). You must make decisions about what VirusScan looks...
User Guide
Page 54
...-risk changes is immediately reported and logged. Browser SystemGuards By monitoring these , Windows SystemGuards technology helps prevent your computer from the Internet) in addition to spyware and potentially unwanted programs that are important to you like. These important registry items and files include ActiveX installations, startup items, Windows shell execute hooks, and shell service object delay loads. 52 McAfee VirusScan Plus Using SystemGuards options SystemGuards monitor, log, report, and manage potentially unauthorized changes made...
...-risk changes is immediately reported and logged. Browser SystemGuards By monitoring these , Windows SystemGuards technology helps prevent your computer from the Internet) in addition to spyware and potentially unwanted programs that are important to you like. These important registry items and files include ActiveX installations, startup items, Windows shell execute hooks, and shell service object delay loads. 52 McAfee VirusScan Plus Using SystemGuards options SystemGuards monitor, log, report, and manage potentially unauthorized changes made...
User Guide
Page 72
... default, Firewall's security level is allowed full access, then Firewall automatically trusts it and adds it detects unwanted network traffic and inbound and outbound Internet connections. If a program is set and Smart Recommendations is enabled, yellow alerts provide the option to alerts. If a program is not automatically trusted. Blocked and added programs appear on the Program Permissions pane. 70 McAfee VirusScan Plus Managing Firewall security...
... default, Firewall's security level is allowed full access, then Firewall automatically trusts it and adds it detects unwanted network traffic and inbound and outbound Internet connections. If a program is set and Smart Recommendations is enabled, yellow alerts provide the option to alerts. If a program is not automatically trusted. Blocked and added programs appear on the Program Permissions pane. 70 McAfee VirusScan Plus Managing Firewall security...
User Guide
Page 79
... computer are not reported to the SecurityCenter. 1 On the McAfee SecurityCenter pane, under SecurityCenter Information, click Configure. 2 On the SecurityCenter Configuration pane, under Protection Status, click Advanced. 3 On the Ignored Problems pane, select one or more attacks or scans. 1 On the McAfee SecurityCenter pane, click Internet & Network, then click Configure. 2 On the Internet & Network Configuration pane, under Firewall protection is enabled, click Advanced. 3 On the Firewall...
... computer are not reported to the SecurityCenter. 1 On the McAfee SecurityCenter pane, under SecurityCenter Information, click Configure. 2 On the SecurityCenter Configuration pane, under Protection Status, click Advanced. 3 On the Ignored Problems pane, select one or more attacks or scans. 1 On the McAfee SecurityCenter pane, click Internet & Network, then click Configure. 2 On the Internet & Network Configuration pane, under Firewall protection is enabled, click Advanced. 3 On the Firewall...
User Guide
Page 81
... to confirm. 4 Click OK. This resets your security level to Automatic and allows outgoing-only network access, enables Smart Recommendations, restores the list of default programs and their permissions in the Program Permissions pane, removes trusted and banned IP addresses, and restores system services, event log settings, and intrusion detection. 1 On the McAfee SecurityCenter pane, click Restore Firewall Defaults. 2 On the Restore Firewall Protection...
... to confirm. 4 Click OK. This resets your security level to Automatic and allows outgoing-only network access, enables Smart Recommendations, restores the list of default programs and their permissions in the Program Permissions pane, removes trusted and banned IP addresses, and restores system services, event log settings, and intrusion detection. 1 On the McAfee SecurityCenter pane, click Restore Firewall Defaults. 2 On the Restore Firewall Protection...
User Guide
Page 142
... you to access other network features (for example, EasyNetwork), the computer is assigned to a computer in Network Manager applies to all McAfee networking programs. For more information about what guest, full, or administrative permissions mean in the Managed Network dialog box. Note: After you join, if you have other McAfee networking programs installed (for example, send files or share printers). Network membership is granted to manage security settings check box is...
... you to access other network features (for example, EasyNetwork), the computer is assigned to a computer in Network Manager applies to all McAfee networking programs. For more information about what guest, full, or administrative permissions mean in the Managed Network dialog box. Note: After you join, if you have other McAfee networking programs installed (for example, send files or share printers). Network membership is granted to manage security settings check box is...
User Guide
Page 148
... open SecurityCenter on the network map. 2 View the item's protection status, under Details. 3 Click Fix security vulnerabilities under I want to fix most reported issues. For example, if VirusScan is to SecurityCenter on the local computer. Fix security vulnerabilities You can use Network Manager to . 4 When the security issues have been fixed, click OK. 146 McAfee VirusScan Plus Fixing security vulnerabilities Managed computers with administrative permissions can enable VirusScan remotely. In some repairs may require manual...
... open SecurityCenter on the network map. 2 View the item's protection status, under Details. 3 Click Fix security vulnerabilities under I want to fix most reported issues. For example, if VirusScan is to SecurityCenter on the local computer. Fix security vulnerabilities You can use Network Manager to . 4 When the security issues have been fixed, click OK. 146 McAfee VirusScan Plus Fixing security vulnerabilities Managed computers with administrative permissions can enable VirusScan remotely. In some repairs may require manual...
User Guide
Page 173
... transmits data at up to maintain connectivity. ActiveX control A software component used with their mobile devices, transmission passes from your computer. however, some might capture information from one access point to another to 11 Mbps in the 5GHz band. archive To create a copy of important files on a secure online server. Compare to archive (page 171). Compare to back up To create a copy of important files, typically on CD, DVD, USB...
... transmits data at up to maintain connectivity. ActiveX control A software component used with their mobile devices, transmission passes from your computer. however, some might capture information from one access point to another to 11 Mbps in the 5GHz band. archive To create a copy of important files on a secure online server. Compare to archive (page 171). Compare to back up To create a copy of important files, typically on CD, DVD, USB...
User Guide
Page 177
... Network. K key A series of web-based services offered by Microsoft Corporation, including a search engine, email, instant messaging, and portal. message authentication code (MAC) A security code used by periods. IP spoofing Forging the IP addresses in -the-middle attack A method of an IP address is accepted if the computer recognizes the decrypted code as four numbers separated by two devices to a physical device (NIC, network interface card) accessing the network. A group of letters and numbers used...
... Network. K key A series of web-based services offered by Microsoft Corporation, including a search engine, email, instant messaging, and portal. message authentication code (MAC) A security code used by periods. IP spoofing Forging the IP addresses in -the-middle attack A method of an IP address is accepted if the computer recognizes the decrypted code as four numbers separated by two devices to a physical device (NIC, network interface card) accessing the network. A group of letters and numbers used...
User Guide
Page 178
... connected to a server on -demand scanning A scheduled examination of selected files, applications, or network devices to verify or update contact details or credit card information. Typically, phishing emails request that make up a home network. 176 McAfee VirusScan Plus N network A collection of IP-based systems (such as routers, switches, servers, and firewalls) that service a finance department. password vault A secure storage area for your passwords with confidence that plugs into a laptop or other user...
... connected to a server on -demand scanning A scheduled examination of selected files, applications, or network devices to verify or update contact details or credit card information. Typically, phishing emails request that make up a home network. 176 McAfee VirusScan Plus N network A collection of IP-based systems (such as routers, switches, servers, and firewalls) that service a finance department. password vault A secure storage area for your passwords with confidence that plugs into a laptop or other user...
User Guide
Page 181
... email messages. It is used on your email program connects to initiating communication. S script A list of another file on the Internet to your computer data and personal information. For example, your computer. The email also contains a link to another . shortcut A file that contains only the location of commands that is set up by the network administrator and must be supplied by users who want to forward it based on a network. SSID Service Set...
... email messages. It is used on your email program connects to initiating communication. S script A list of another file on the Internet to your computer data and personal information. For example, your computer. The email also contains a link to another . shortcut A file that contains only the location of commands that is set up by the network administrator and must be supplied by users who want to forward it based on a network. SSID Service Set...
User Guide
Page 182
.... URLs that is installed. system restore point A snapshot (image) of the contents of WEP. TKIP Temporal Key Integrity Protocol (pronounced tee-kip). synchronize Resolving inconsistencies between backed up files and those stored on disk by using a public key to encrypt data that require an SSL connection start with HTTPS instead of significant system events, such as when a program or driver is transferred over...
.... URLs that is installed. system restore point A snapshot (image) of the contents of WEP. TKIP Temporal Key Integrity Protocol (pronounced tee-kip). synchronize Resolving inconsistencies between backed up files and those stored on disk by using a public key to encrypt data that require an SSL connection start with HTTPS instead of significant system events, such as when a program or driver is transferred over...
User Guide
Page 204
... Shredding files, folders, and disks ........131 smart drive 179 SMTP 179 SSID 179 SSL 180 standard e-mail account 180 Start e-mail protection 42 Start firewall protection 63 Start instant messaging protection ........43 Start script scanning protection 42 Start spyware protection 42 Starting Firewall 63 Stop detecting new Friends 149 Stop firewall protection 64 Stop managing a computer's protection status 144 Stop monitoring networks 151 Stop real-time virus protection 47 Stop sharing a file 162 Stop sharing...
... Shredding files, folders, and disks ........131 smart drive 179 SMTP 179 SSID 179 SSL 180 standard e-mail account 180 Start e-mail protection 42 Start firewall protection 63 Start instant messaging protection ........43 Start script scanning protection 42 Start spyware protection 42 Starting Firewall 63 Stop detecting new Friends 149 Stop firewall protection 64 Stop managing a computer's protection status 144 Stop monitoring networks 151 Stop real-time virus protection 47 Stop sharing a file 162 Stop sharing...