background image

 

 

Chapter 20    Introduction 

111 

 
 

Analyze inbound and outbound traffic 

The Traffic Analysis graph is a numerical and graphical 
representation of inbound and outbound Internet traffic. Also, 
the Traffic Monitor displays programs that use the most network 
connections on your computer and the IP addresses that the 
programs access. 

Ensure that the Advanced Menu is enabled, and then click 

Tools

On the Tools pane, click 

Traffic Monitor

Under 

Traffic Monitor

, click 

Traffic Analysis

Tip

: To view the most up-to-date statistics, click 

Refresh

 under 

Traffic Analysis

 

Monitor program bandwidth 

You can view the pie chart, which displays the approximate 
percentage of bandwidth used by the most active programs on 
your computer during the past twenty-four hour period. The pie 
chart provides visual representation of the relative amounts of 
bandwidth used by the programs. 

Ensure that the Advanced Menu is enabled, and then click 

Tools

On the Tools pane, click 

Traffic Monitor

Under 

Traffic Monitor

, click 

Traffic Usage

Tip

: To view the most up-to-date statistics, click 

Refresh

 under 

Traffic Usage

 

Monitor program activity 

You can view inbound and outbound program activity, which 
displays remote computer connections and ports. 

Ensure that the Advanced Menu is enabled, and then click 

Tools

On the Tools pane, click 

Traffic Monitor

Under 

Traffic Monitor

, click 

Active Programs

You can view the following information: 

ƒ

 

Program Activity graph: Select a program to display a 
graph of its activity. 

ƒ

 

Listening connection: Select a Listening item under the 
program name. 

ƒ

 

Computer connection: Select an IP address under the 
program name, system process, or service. 

Summary of Contents for VirusScan Plus

Page 1: ...User Guide ...

Page 2: ......

Page 3: ...l protection 69 Managing programs and permissions 81 Managing computer connections 89 Managing system services 97 Logging monitoring and analysis 103 Learning about Internet security 113 McAfee QuickClean 115 QuickClean features 116 Cleaning your computer 117 Defragmenting your computer 121 Scheduling a task 123 McAfee Shredder 129 Shredder features 130 Shredding files folders and disks 131 McAfee...

Page 4: ...ii Contents Reference 170 Glossary 171 About McAfee 185 License 185 Copyright 186 Customer and Technical Support 187 Using McAfee Virtual Technician 188 Index 199 ...

Page 5: ...nternet traffic for suspicious activity and block spyware from jeopardizing the integrity of your personal information In this chapter McAfee SecurityCenter 5 McAfee VirusScan 29 McAfee Personal Firewall 61 McAfee QuickClean 115 McAfee Shredder 129 McAfee Network Manager 133 McAfee EasyNetwork 153 Reference 170 About McAfee 185 Customer and Technical Support 187 C H A P T E R 1 Introduction ...

Page 6: ......

Page 7: ...n update SecurityCenter to ensure that you have the latest protection available from McAfee After your initial configuration tasks are complete you use SecurityCenter to monitor your computer s protection status If SecurityCenter detects a protection problem it alerts you so that you can either fix or ignore the problem depending on its severity You can also review SecurityCenter events such as vi...

Page 8: ... updates and upgrades SecurityCenter automatically downloads and installs updates for your programs When a new version of a McAfee program is available it is automatically delivered to your computer as long as your subscription is valid ensuring that you always have up to date protection Real time alerts Security alerts notify you of emergency virus outbreaks and security threats ...

Page 9: ... used in this image see Understanding protection status page 8 and Understanding protection categories page 9 Then you can review your McAfee account information and verifying the validity of your subscription In this chapter Understanding protection status 8 Understanding protection categories 9 Understanding protection services 10 Managing your subscriptions 11 Updating SecurityCenter 13 C H A P...

Page 10: ...in each protection category the problem category s status is set to Action Required also in red For information about how to fix protection problems see Fixing protection problems page 17 Yellow Your computer is partially protected The protection status area on the SecurityCenter Home pane is yellow and states that you are not protected SecurityCenter reports at least one non critical security pro...

Page 11: ...m within the category For more information about protection status see Understanding protection status page 8 Protection Category Description Computer Files The Computer Files category lets you configure the following protection services Virus Protection Spyware Protection SystemGuards Windows Protection PC Health Internet Network The Internet Network category lets you configure the following prot...

Page 12: ... and Script Scanning For detailed information about these particular protection services see the VirusScan help By default all protection services associated with a program are enabled when you install the program however you can disable a protection service at any time For example if you install Parental Controls Content Blocking and Identity Protection are both enabled If you do not intend to us...

Page 13: ...ription is about to expire That way you can avoid interruptions in your protection by renewing it early or by setting up auto renewal on our Web site If you see a link in SecurityCenter prompting you to activate then your subscription has not been activated To see your subscription s expiration date you can check your Account page Access your McAfee account You can easily access your McAfee accoun...

Page 14: ...er prompting you to renew We ll also notify you periodically about pending expiration with alerts On the SecurityCenter Home pane under SecurityCenter Information click Renew Tip You can also renew your product from the notification message that periodically appears Or go to your Account page where you can renew or set up auto renewal ...

Page 15: ...y you before downloading or installing updates You can also disable automatic updating Note If you installed your McAfee product from a CD you must activate within 15 days or your products will not receive critical updates or perform scans In this chapter Check for updates 13 Configure automatic updates 14 Disable automatic updates 14 Check for updates By default SecurityCenter automatically check...

Page 16: ... and installing For more information see Working with alerts page 21 1 Open the SecurityCenter Configuration pane How 1 Under Common Tasks click Home 2 On the right pane under SecurityCenter Information click Configure 2 On the SecurityCenter Configuration pane under Automatic updates are disabled click On and then click Advanced 3 Click one of the following buttons Install the updates automatical...

Page 17: ...click Configure 2 On the SecurityCenter Configuration pane under Automatic updates are enabled click Off 3 In the confirmation dialog box click Yes Tip You enable automatic updates by clicking the On button or by clearing Disable automatic updating and let me manually check for updates on the Update Options pane ...

Page 18: ...blems do not require immediate action and may or may not compromise your protection status depending on the type of problem To achieve a green protection status you must fix all critical problems and either fix or ignore all non critical problems If you need help diagnosing your protection problems you can run McAfee Virtual Technician For more information about McAfee Virtual Technician see the M...

Page 19: ...the program from the McAfee Web site or CD A program is missing components Reinstall the program from the McAfee Web site or CD A program is not activated and cannot receive full protection Activate the program on the McAfee Web site Your subscription has expired Check your account status on the McAfee Web site For more information see Managing your subscriptions page 11 Note Often a single protec...

Page 20: ...roblems persist after you try to fix them automatically you can fix the problems manually 1 Under Common Tasks click Home 2 On the SecurityCenter Home pane click the protection category in which SecurityCenter reports the problem 3 Click the link following the description of the problem ...

Page 21: ...cts a non critical problem that you do not intend to fix you can ignore it Ignoring it removes the problem from the protection category information area in SecurityCenter 1 Under Common Tasks click Home 2 On the SecurityCenter Home pane click the protection category in which the problem is reported 3 Click the Ignore link beside the protection problem Show or hide ignored problems Depending on its...

Page 22: ...20 McAfee VirusScan Plus 4 Click OK Tip You can also ignore a problem by clicking the Ignore link beside the reported problem in the protection category information area ...

Page 23: ...quires a response from you Red alerts occur when SecurityCenter cannot determine how to fix a protection problem automatically Yellow A yellow alert is a non critical notification that usually requires a response from you Green A green alert is a non critical notification that does not require a response from you Green alerts provide basic information about an event Because alerts play such an imp...

Page 24: ...ow it again at any time By default SecurityCenter shows all informational alerts Show or hide informational alerts You can configure SecurityCenter to show some informational alerts and hide others or to hide all informational alerts 1 Open the Alert Options pane How 1 Under Common Tasks click Home 2 On the right pane under SecurityCenter Information click Configure 3 Under Alerts click Advanced 2...

Page 25: ...sh the game and exit full screen mode SecurityCenter starts displaying informational alerts again 1 Open the Alert Options pane How 1 Under Common Tasks click Home 2 On the right pane under SecurityCenter Information click Configure 3 Under Alerts click Advanced 2 On the Alert Options pane select or clear the Show informational alerts when gaming mode is detected check box 3 Click OK ...

Page 26: ...right pane under SecurityCenter Information click Configure 3 Under Alerts click Advanced 2 On the Alert Options pane under Sound select the Play a sound when an alert occurs check box Hide the splash screen at startup By default the McAfee splash screen appears briefly when Windows starts notifying you that SecurityCenter is protecting your computer However you can hide the splash screen if you d...

Page 27: ...urity threat occurs check box Hide security messages You can hide security notifications about protecting more computers on your home network These messages provide information about your subscription the number of computers you can protect with your subscription and how to extend your subscription to protect even more computers 1 Open the Alert Options pane How 1 Under Common Tasks click Home 2 O...

Page 28: ......

Page 29: ...nts use the event log to monitor their children s behavior on the Internet You view recent events if you want to examine only the last 30 events that occurred You view all events if you want to examine a comprehensive list of all events that occurred When you view all events SecurityCenter launches the event log which sorts events according to the protection category in which they occurred In this...

Page 30: ......

Page 31: ... VirusScan offers you the flexibility to customize this behavior if you want to but if you don t your computer remains protected With normal computer use viruses worms and other potential threats may infiltrate your computer If this occurs VirusScan notifies you about the threat but usually handles it for you cleaning or quarantining infected items before any damage occurs Although rare further ac...

Page 32: ...le the option to use minimal computer resources but keep in mind that higher priority will be given to virus protection than to other tasks Automatic repairs If VirusScan detects a security threat while running a scan it tries to handle the threat automatically according to the threat type This way most threats can be detected and neutralized without your interaction Although rare VirusScan may no...

Page 33: ...er You can also run manual scans in Windows Explorer while you work Scanning in SecurityCenter offers the advantage of changing scanning options on the fly However scanning from Windows Explorer offers a convenient approach to computer security Whether you run a scan from SecurityCenter or Windows Explorer you can view the scan results when it finishes You view the results of a scan to determine w...

Page 34: ...the Basic menu 2 On the Scan Options pane under Quick Scan click Start Start a Full Scan to thoroughly check your computer for threats 1 Click Scan on the Basic menu 2 On the Scan Options pane under Full Scan click Start Start a Custom Scan based on your own settings 1 Click Scan on the Basic menu 2 On the Scan Options pane under Let Me Choose click Start 3 Customize a scan by clearing or selectin...

Page 35: ...inimal computer resources 4 Select one or more days 5 Specify a start time 6 Click OK The scan results appear in the Scan completed alert Results include the number of items scanned detected repaired quarantined and removed Click View scan details to learn more about the scan results or to work with infected items Note To learn more about scan options see Scan Types page 38 View scan results When ...

Page 36: ...tics Double click the Scan completed icon in the notification area on your taskbar View details about detected items infection status and type 1 Double click the Scan completed icon in the notification area on your taskbar 2 Click Details on either the Full Scan Quick Scan Custom Scan or Manual Scan pane View details about your most recent scan Double click the Scan completed icon in the notificat...

Page 37: ... decide whether to remove or trust the them If potentially unwanted programs are detected VirusScan does not take any automatic action instead it lets you decide whether to quarantine or trust the program When VirusScan quarantines items it encrypts and then isolates them in a folder to prevent the files programs or cookies from harming your computer You can restore or remove the quarantined items...

Page 38: ...revent it from causing damage to your computer or files 1 Open the Scan Results pane How 1 Double click the Scan completed icon in the notification area at the far right of your taskbar 2 On the Scan pane click Details 2 In the scan results list click Potentially Unwanted Programs 3 Select a potentially unwanted program 4 Under I want to click either Remove or Trust 5 Confirm your selected option ...

Page 39: ... computer You can then restore or remove the quarantined items In most cases you can delete a quarantined without impacting your system 1 Open the Quarantined Programs and Tracking Cookies pane How 1 On the left pane click Advanced Menu 2 Click Restore 3 Click Programs and Cookies 2 Select a quarantined program or cookie 3 Do one of the following To repair the infected file and return it to its or...

Page 40: ... tracking cookies and network drives You can also take advantage of buffer overflow protection which is enabled by default except if you are using a Windows Vista 64 bit operating system To learn more see Setting real time scan options page 46 Quick Scan Quick Scan allows you to check for threat activity in processes critical Windows files and other susceptible areas on your computer Full Scan Ful...

Page 41: ...d scans always check your entire computer using your default scan options By default VirusScan performs a scheduled scan once a week If you find that you are experiencing slow scan speeds consider disabling the option to use minimal computer resources but keep in mind that higher priority will be given to virus protection than to other tasks To learn more see Scheduling a scan page 51 Note To lear...

Page 42: ......

Page 43: ...amage occurs Spyware protection Spyware protection detects spyware adware and other potentially unwanted programs Spyware is software that can be secretly installed on your computer to monitor your behavior collect personal information and even interfere with your control of the computer by installing additional software or redirecting browser activity E mail protection E mail protection detects s...

Page 44: ... any time doing so leaves your computer vulnerable to harmful scripts Start spyware protection Turn on spyware protection to detect and remove spyware adware and other potentially unwanted programs that gather and transmit information without your knowledge or permission 1 Open the Computer Files Configuration pane How 1 On the left pane click Advanced Menu 2 Click Configure 3 On the Configure pan...

Page 45: ...stant messaging protection Turn on instant messaging protection to detect security threats that can be included in inbound instant message attachments 1 Open the E mail IM Configuration pane How 1 On the left pane click Advanced Menu 2 Click Configure 3 On the Configure pane click E mail IM 2 Under Instant Messaging protection click On Note Although you can turn off instant messaging protection at...

Page 46: ......

Page 47: ...authorized changes made to the Windows registry or critical system files on your computer Unauthorized registry and file changes can harm your computer compromise its security and damage valuable system files You can use Trusted Lists to decide whether you want to trust or remove rules that detect file or registry changes SystemGuard program or buffer overflows If you trust the item and indicate t...

Page 48: ...on of memory used to temporarily hold computer information Buffer overflows can occur when the amount of information suspect programs or processes store in a buffer exceeds the buffer s capacity When this occurs your computer becomes more vulnerable to security attacks Set real time scan options You set real time scan options to customize what VirusScan looks for during a real time scan as well as...

Page 49: ...some scanning options or troubleshoot a performance issue When real time virus protection is disabled your computer is not protected and your SecurityCenter protection status is red For more information about protection status see Understanding protection status in the SecurityCenter help You can turn off real time virus protection temporarily and then specify when it resumes You can automatically...

Page 50: ...n only critical PC files items on your desktop or items in your Program Files folder Unless you want to be responsible for initiating each custom scan yourself you can set up a regular schedule for scans Scheduled scans always check your entire computer using the default scan options By default VirusScan performs a scheduled scan once a week If you find that you are experiencing slow scan speeds c...

Page 51: ...can for spyware and potential threats Detect cookies Select Scan and remove tracking cookies Detect rootkits and stealth programs that can alter and exploit existing Windows system files Select Scan for stealth programs Use less processor power for scans while giving higher priority to other tasks such as Web browsing or opening documents Select Scan using minimal computer resources Specify which ...

Page 52: ...50 McAfee VirusScan Plus To Do this Scan critical system files Clear the My Computer check box and then select the Critical System Files check box ...

Page 53: ...your entire computer for viruses and other threats using your default scan options By default VirusScan performs a scheduled scan once a week 1 Open the Scheduled Scan pane How 1 Under Common Tasks click Home 2 On the SecurityCenter Home pane click Computer Files 3 In the Computer Files information area click Configure 4 On the Computer Files Configuration pane ensure that virus protection is enab...

Page 54: ...ystemGuards Program SystemGuards Windows SystemGuards and Browser SystemGuards Program SystemGuards Program SystemGuards detect potentially unauthorized changes to your computer s registry and other critical files that are essential to Windows These important registry items and files include ActiveX installations startup items Windows shell execute hooks and shell service object delay loads By mon...

Page 55: ...can harm your computer compromise its security and damage valuable system files 1 Open the Computer Files Configuration pane How 1 On the left pane click Advanced Menu 2 Click Configure 3 On the Configure pane click Computer Files 2 Under SystemGuard protection click On Note You can disable SystemGuard protection by clicking Off Configure SystemGuards options Use the SystemGuards pane to configure...

Page 56: ...SystemGuards and Browser SystemGuards Program SystemGuards Program SystemGuards technology stops suspect ActiveX programs downloaded from the Internet in addition to spyware and potentially unwanted programs that can automatically launch when Windows starts SystemGuard Detects ActiveX Installations Unauthorized registry changes to ActiveX installations that can harm your computer compromise its se...

Page 57: ...ell Spyware adware and other potentially unwanted programs that can make registry changes to the Winlogon shell allowing other programs to replace Windows Explorer Winlogon User Init Spyware adware and other potentially unwanted programs that can make registry changes to Winlogon user init allowing suspect programs to run when you log on to Windows Windows Protocols Spyware adware and other potent...

Page 58: ...net Explorer Bars Unauthorized registry changes to Internet Explorer Bar programs such as Search and Favorites that can affect the appearance and behavior of Internet Explorer Internet Explorer Add ons Spyware adware and other potentially unwanted programs that can install Internet Explorer add ons to track Web browsing and show unsolicited ads Internet Explorer ShellBrowser Unauthorized registry ...

Page 59: ... can make registry changes to Internet Explorer security zones allowing potentially harmful files to run when you start your computer Internet Explorer Trusted Sites Spyware adware and other potentially unwanted programs that can make registry changes to Internet Explorer trusted sites allowing your browser to trust suspect Web sites Internet Explorer Policy Spyware adware and other potentially un...

Page 60: ... have been previously detected and trusted You can also remove an item from a trusted list so that VirusScan detects it again 1 Open the Trusted Lists pane 1 Under Common Tasks click Home 2 On the SecurityCenter Home pane click Computer Files 3 In the Computer Files information area click Configure 4 On the Computer Files Configuration pane ensure that virus protection is enabled and click Advance...

Page 61: ... pane Program SystemGuards detect unauthorized registry and file changes associated with ActiveX installations startup items Windows shell execute hooks and shell service object delay load activity These types of unauthorized registry and file changes can harm your computer compromise its security and damage valuable system files Windows SystemGuards Windows SystemGuards on the Trusted Lists pane ...

Page 62: ...hanges can result in unwanted browser activity such as redirection to suspect Web sites changes to browser settings and options and trusting of suspect Web sites Trusted Programs Trusted programs are potentially unwanted programs that VirusScan has previously detected but which you have chosen to trust from an alert or from the Scan Results pane Trusted Buffer Overflows Trusted buffer overflows re...

Page 63: ... non critical protection problems as soon as it detects them If you need help diagnosing your protection problems you can run McAfee Virtual Technician In this chapter Personal Firewall features 62 Starting Firewall 63 Working with alerts 65 Managing informational alerts 67 Configuring Firewall protection 69 Managing programs and permissions 81 Managing computer connections 89 Managing system serv...

Page 64: ...Web site which also provides current security information about programs on your computer as well as global security events and Internet port statistics Lockdown Firewall Block all inbound and outbound traffic instantly between your computer and the Internet Restore Firewall Restore Firewall s original protection settings instantly Advanced Trojan detection Detect and block potentially malicious a...

Page 65: ... inbound and outbound Internet connections If you must disable firewall protection do so temporarily and only when necessary You can also enable Firewall from the Internet Network Configuration panel Firewall automatically disables Windows Firewall and sets itself as your default firewall Note To configure Firewall open the Internet Network Configuration pane In this chapter Start firewall protect...

Page 66: ...omputer from intrusion and unwanted network traffic When Firewall is disabled you cannot manage inbound or outbound Internet connections 1 On the McAfee SecurityCenter pane click Internet Network and then click Configure 2 On the Internet Network Configuration pane under Firewall protection is enabled click Off ...

Page 67: ...ur security These alerts can be grouped into three basic types Red alert Yellow alert Green alert Alerts can also contain information to help you decide how to handle alerts or get information about programs running on your computer In this chapter About alerts 66 C H A P T E R 1 4 ...

Page 68: ...rk Connection alert appears when a computer with Firewall installed is connected to a new network You can specify the level of trust that you want to assign to this new network and it then appears in your Networks list If Smart Recommendations is enabled known programs are automatically added to the Program Permissions pane Green alert In most cases a green alert provides basic information about a...

Page 69: ...onfigure 3 On the SecurityCenter Configuration pane under Alerts click Advanced 4 On the Alert Options pane select Show informational alerts when gaming mode is detected 5 Click OK Hide informational alerts You can prevent Firewall informational alerts from being displayed when it detects intrusion attempts or suspicious activity 1 On the McAfee SecurityCenter pane click Advanced Menu 2 Click Conf...

Page 70: ......

Page 71: ...t to Automatic and your programs are allowed outgoing only Internet access However Firewall provides other levels ranging from highly restrictive to highly permissive Firewall also offers you the opportunity to receive recommendations on alerts and Internet access for programs In this chapter Managing Firewall security levels 70 Configuring Smart Recommendations for alerts 73 Optimizing Firewall s...

Page 72: ...om the most restrictive to the least Level Description Stealth Blocks all inbound Internet connections except open ports hiding your computer s presence on the Internet The firewall alerts you when new programs attempt outbound Internet connections or receive inbound connection requests Blocked and added programs appear on the Program Permissions pane Standard Monitors inbound and outbound connect...

Page 73: ...d connections and alert you when new programs attempt Internet access 1 On the McAfee SecurityCenter pane click Internet Network then click Configure 2 On the Internet Network Configuration pane under Firewall protection is enabled click Advanced 3 On the Security Level pane move the slider so that Standard displays as the current level 4 Click OK Set security level to Automatic You can set Firewa...

Page 74: ...72 McAfee VirusScan Plus 5 Click OK Note The Allow Outgoing Only Access is the default option ...

Page 75: ...pplied Firewall neither allows or blocks Internet access nor provides a recommendation in the alert When Smart Recommendations is set to Show an alert prompts you to allow or block access and Firewall provides a recommendation in the alert Enable Smart Recommendations You can enable Smart Recommendations for Firewall to automatically allow or block programs and alert you about unrecognized and pot...

Page 76: ...ck Configure 2 On the Internet Network Configuration pane under Firewall protection is enabled click Advanced 3 On the Security Level pane under Smart Recommendations select Don t apply Smart Recommendations 4 Click OK Display Smart Recommendations You can display Smart Recommendations to display only a recommendation in the alerts so that you decide whether to allow or block unrecognized and pote...

Page 77: ...llation settings include automatic detection for the most common intrusion attempts such as Denial of Service attacks or exploits Using the standard installation settings ensures that you are protected against these attacks and scans however you can disable automatic detection for one or more attacks or scans on the Intrusion Detection pane Protect your computer during startup You can protect your...

Page 78: ...puter on the network using ping requests 4 Click OK Configure UDP settings You can allow other network computer users to send message units datagrams to your computer using the UDP protocol However you can do this only if you also have closed a system service port to block this protocol 1 On the McAfee SecurityCenter pane click Internet Network then click Configure 2 On the Internet Network Config...

Page 79: ...er Detect Intrusion Attempts do one of the following Select a name to automatically detect the attack or scan Clear a name to disable automatic detection of the attack or scan 5 Click OK Configure Firewall Protection Status settings You can configure Firewall to ignore that specific problems on your computer are not reported to the SecurityCenter 1 On the McAfee SecurityCenter pane under SecurityC...

Page 80: ...mputer and any network including the Internet 1 On the McAfee SecurityCenter pane under Common Tasks click Lockdown Firewall 2 On the Lockdown Firewall pane click Enable Firewall Lockdown 3 Click Yes to confirm Tip You can also lockdown Firewall by right clicking the SecurityCenter icon in the notification area at the far right of your taskbar clicking Quick Links and then clicking Lockdown Firewa...

Page 81: ...enables Smart Recommendations restores the list of default programs and their permissions in the Program Permissions pane removes trusted and banned IP addresses and restores system services event log settings and intrusion detection 1 On the McAfee SecurityCenter pane click Restore Firewall Defaults 2 On the Restore Firewall Protection Defaults pane click Restore Defaults 3 Click Yes to confirm 4...

Page 82: ......

Page 83: ...und Internet access Firewall lets you control full or outbound only access for programs You can also block access for programs In this chapter Allowing Internet access for programs 82 Allowing outbound only access for programs 84 Blocking Internet access for programs 85 Removing access permissions for programs 87 Learning about programs 88 C H A P T E R 1 7 ...

Page 84: ...on is enabled click Advanced 3 On the Firewall pane click Program Permissions 4 Under Program Permissions select a program with Blocked or Outbound Only Access 5 Under Action click Allow Access 6 Click OK Allow full access for a new program You can allow a new program on your computer to have full inbound and outbound Internet access 1 On the McAfee SecurityCenter pane click Internet Network then ...

Page 85: ...n the Program Permissions dialog click Yes to confirm Related topics View outbound events page 105 Allow full access from the Outbound Events log You can allow an existing blocked program that appears in the Outbound Events log to have full inbound and outbound Internet access 1 On the McAfee SecurityCenter pane click Advanced Menu 2 Click Reports Logs 3 Under Recent Events click View Log 4 Click ...

Page 86: ... OK Allow outbound only access from the Recent Events log You can allow an existing blocked program that appears in the Recent Events log to have outbound only Internet access 1 On the McAfee SecurityCenter pane click Advanced Menu 2 Click Reports Logs 3 Under Recent Events select the event description and then click Allow Outbound Only Access 4 In the Program Permissions dialog click Yes to confi...

Page 87: ...gram Permissions 4 Under Program Permissions select a program with Full Access or Outbound Only Access 5 Under Action click Block Access 6 Click OK Block access for a new program You can block a new program from having inbound and outbound Internet access 1 On the McAfee SecurityCenter pane click Internet Network then click Configure 2 On the Internet Network Configuration pane under Firewall prot...

Page 88: ... appears in the Recent Events log from having inbound and outbound Internet access 1 On the McAfee SecurityCenter pane click Advanced Menu 2 Click Reports Logs 3 Under Recent Events select the event description and then click Block Access 4 In the Program Permissions dialog click Yes to confirm ...

Page 89: ...g any inbound or outbound Internet access 1 On the McAfee SecurityCenter pane click Internet Network then click Configure 2 On the Internet Network Configuration pane under Firewall protection is enabled click Advanced 3 On the Firewall pane click Program Permissions 4 Under Program Permissions select a program 5 Under Action click Remove Program Permission 6 Click OK Note Firewall prevents you fr...

Page 90: ...on pane under Firewall protection is enabled click Advanced 3 On the Firewall pane click Program Permissions 4 Under Program Permissions select a program 5 Under Action click Learn More Get program information from the Outbound Events log From the Outbound Events log you can get program information from McAfee s HackerWatch Web site to decide which programs to allow or block inbound and outbound I...

Page 91: ...ter can be vulnerable to infection Also McAfee recommends that the computer you trust is protected by a firewall and an up to date antivirus program Firewall does not log traffic or generate event alerts from trusted IP addresses in the Networks list You can ban computers that are associated with unknown suspicious or distrusted IP addresses from connecting to your computer Since Firewall blocks a...

Page 92: ...ist Firewall logs traffic and generates event alerts from Standard IP addresses An example of a Standard network is a computer or computers in a corporate network Public Firewall controls traffic from a public network according to the rules in the System Services list An example of Public is an Internet network in a cafe hotel or airport When allowing a connection make sure that the computer that ...

Page 93: ...ection Sharing ICS you can add the following IP address range 192 168 0 1 to 192 168 0 255 9 Optionally select Rule expires in and enter the number of days to enforce the rule 10 Optionally type a description for the rule 11 Click OK Note For more information about Internet Connection Sharing ICS see Configure a new system service Add a computer from the Inbound Events log You can add a trusted or...

Page 94: ...he From IP Address and To IP Address boxes If your computer connection is on an IPv6 network enter the starting IP address and the prefix length in the From IP Address and Prefix Length boxes 7 Under Type do one of the following Select Trusted to specify that this computer connection is trusted for example a computer in a home network Select Standard to specify that this computer connection and no...

Page 95: ...s associated IP address 1 On the McAfee SecurityCenter pane click Internet Network then click Configure 2 On the Internet Network Configuration pane under Firewall protection is enabled click Advanced 3 On the Firewall pane click Networks 4 On the Networks pane select an IP address and then click Remove 5 Click Yes to confirm ...

Page 96: ... as your DNS or DHCP server or other ISP related servers 1 On the McAfee SecurityCenter pane click Internet Network then click Configure 2 On the Internet Network Configuration pane under Firewall protection is enabled click Advanced 3 On the Firewall pane click Banned IPs 4 On the Banned IPs pane click Add 5 If the computer connection is on an IPv6 network select the IPv6 check box 6 Under Add Ru...

Page 97: ...nter the starting and ending IP addresses in the From IP Address and To IP Address boxes If your computer connection is on an IPv6 network enter the starting IP address and the prefix length in the From IP Address and Prefix Length boxes 7 Optionally select Rule expires in and enter the number of days to enforce the rule 8 Optionally type a description for the rule 9 Click OK Remove a banned compu...

Page 98: ... the McAfee SecurityCenter pane under Common Tasks click Advanced Menu 2 Click Reports Logs 3 Under Recent Events click View Log 4 Click Internet Network and then click Inbound Events 5 Select a source IP address and under I want to click Ban this IP 6 Click Yes to confirm Ban a computer from the Intrusion Detection Events log You can ban a computer connection and its associated IP address from th...

Page 99: ...s from other computers through designated system service ports Typically Firewall closes these system service ports because they represent the most likely source of insecurities in your system To accept connections from remote computers however the system service ports must be open In this chapter Configuring system service ports 98 C H A P T E R 1 9 ...

Page 100: ... Port 123 Remote Desktop Remote Assistance Terminal Server RDP Port 3389 Remote Procedure Calls RPC Port 135 Secure Web Server HTTPS Port 443 Universal Plug and Play UPNP Port 5000 Web Server HTTP Port 80 Windows File Sharing NETBIOS Ports 137 139 System service ports can also be configured to allow a computer to share its Internet connection with other computers connected to it through the same n...

Page 101: ... Do one of the following To open the port to any computer on a trusted standard or public network for example a home network a corporate network or an Internet network select Trusted Standard and Public To open the port to any computer on a standard network for example a corporate network select Standard includes Trusted 7 Click OK Block access to an existing system service port You can close an e...

Page 102: ... a home network a corporate network or an Internet network select Trusted Standard and Public To open the port to any computer on a standard network for example a corporate network select Standard includes Trusted 7 If you want to send this port s activity information to another Windows network computer that shares your Internet connection select Forward this port s network activity to network com...

Page 103: ...m Services pane under Add System Service Rule modify the following System service name Local TCP IP ports Local UDP ports 6 Do one of the following To open the port to any computer on a trusted standard or public network for example a home network a corporate network or an Internet network select Trusted Standard and Public To open the port to any computer on a standard network for example a corpo...

Page 104: ...o longer access the network service on your computer 1 On the McAfee SecurityCenter pane click Internet Network then click Configure 2 On the Internet Network Configuration pane under Firewall protection is enabled click Advanced 3 On the Firewall pane click System Services 4 Select a system service and then click Remove 5 At the prompt click Yes to confirm ...

Page 105: ...ging monitoring and analysis for Internet events and traffic Understanding Internet traffic and events helps you manage your Internet connections In this chapter Event Logging 104 Working with Statistics 106 Tracing Internet traffic 107 Monitoring Internet traffic 110 C H A P T E R 2 0 ...

Page 106: ...types that you want or do not want to log Event types include the following Blocked Programs ICMP Pings Traffic from Banned IP Addresses Events on System Service Ports Events on Unknown Ports Intrusion Detection IDS events 5 To prevent logging on specific ports select Do not log events on the following port s and then enter single port numbers separated by commas or port ranges with dashes For exa...

Page 107: ... and time of the event and the location of the program on your computer 1 On the Common Tasks pane click Reports Logs 2 Under Recent Events click View Log 3 Click Internet Network and then click Outbound Events Note You can allow full and outbound only access for a program from the Outbound Events log You can also locate additional information about the program View intrusion detection events If l...

Page 108: ...and 30 days 1 Ensure that the Advanced Menu is enabled and then click Tools 2 On the Tools pane click HackerWatch 3 Under Event Tracking view security event statistics View global Internet port activity HackerWatch tracks worldwide Internet security events which you can view from SecurityCenter Information displayed includes the top event ports reported to HackerWatch during the past seven days Ty...

Page 109: ...er 3 Type the computer s IP address and click Trace 4 Under Visual Tracer select Map View Note You cannot trace looped private or invalid IP address events Obtain computer registration information You can obtain a computer s registration information from SecurityCenter using Visual Trace Information includes the domain name the registrant s name and address and the administrative contact 1 Ensure ...

Page 110: ...selected IP address Network View Locate network information using the selected IP address 6 Click Done Trace a computer from the Intrusion Detection Events log From the Intrusion Detection Events pane you can trace an IP address that appears in the Intrusion Detection Events log 1 On the Common Tasks pane click Reports Logs 2 Under Recent Events click View Log 3 Click Internet Network and then cli...

Page 111: ...is enabled and click Tools 2 On the Tools pane click Traffic Monitor 3 Under Traffic Monitor click Active Programs 4 Select a program and then the IP address that appears below the program name 5 Under Program Activity click Trace this IP 6 Under Visual Tracer you can view a map which shows the most probable route of data taken from the source computer to yours In addition you can obtain registrat...

Page 112: ...tes You can also view traffic volume including the amount of traffic since you started Firewall and the total traffic for the current and previous months The Traffic Analysis pane displays real time Internet activity on your computer including the volume and rate of recent inbound and outbound Internet traffic on your computer connection speed and total bytes transferred across the Internet The so...

Page 113: ...g the past twenty four hour period The pie chart provides visual representation of the relative amounts of bandwidth used by the programs 1 Ensure that the Advanced Menu is enabled and then click Tools 2 On the Tools pane click Traffic Monitor 3 Under Traffic Monitor click Traffic Usage Tip To view the most up to date statistics click Refresh under Traffic Usage Monitor program activity You can vi...

Page 114: ...112 McAfee VirusScan Plus Note To view the most up to date statistics click Refresh under Active Programs ...

Page 115: ...erages McAfee s security Web site HackerWatch to provide up to date information about programs and global Internet activity HackerWatch also provides an HTML tutorial about Firewall In this chapter Launch the HackerWatch tutorial 114 C H A P T E R 2 1 ...

Page 116: ...ch tutorial To learn about Firewall you can access the HackerWatch tutorial from SecurityCenter 1 Ensure that the Advanced Menu is enabled and then click Tools 2 On the Tools pane click HackerWatch 3 Under HackerWatch Resources click View Tutorial ...

Page 117: ...redder Disk Defragmenter arranges files and folders on your computer to ensure that they do not become scattered that is fragmented when saved on your computer s hard drive By defragmenting your hard drive periodically you ensure that these fragmented files and folders are consolidated for quick retrieval later If you do not want to maintain your computer manually you can schedule both QuickClean ...

Page 118: ...Scan Plus QuickClean features File Cleaner Delete unnecessary files safely and efficiently using various cleaners By deleting these files you increase the space on your computer s hard drive and improve its performance ...

Page 119: ...rtcuts and shortcuts that do not have a program associated with them Lost File Fragment Cleaner Deletes lost file fragments on your computer Registry Cleaner Deletes Windows registry information for programs that no longer exist on your computer The registry is a database in which Windows stores its configuration information The registry contains profiles for each computer user and information abo...

Page 120: ...utlook and Outlook Express Recently Used Cleaner Deletes recently used files that have been created with any of these programs Adobe Acrobat Corel WordPerfect Office Corel Office Jasc Lotus Microsoft Office RealPlayer Windows History Windows Media Player WinRAR WinZip ActiveX Cleaner Deletes ActiveX controls ActiveX is a software component used by programs or web pages to add functionality that bl...

Page 121: ...Cleaner you can click Properties to select or clear the files that have been recently created with the programs in the list and then click OK Click Restore Defaults to restore the default cleaners and then click Next 4 After the analysis is performed click Next 5 Click Next to confirm the file deletion 6 Do one of the following Click Next to accept the default No I want to delete files using stand...

Page 122: ......

Page 123: ...gmented files and folders are consolidated for quick retrieval later In this chapter Defragment your computer 121 Defragment your computer You can defragment your computer to improve file and folder access and retrieval 1 On the McAfee SecurityCenter pane under Common Tasks click Maintain Computer 2 Under Disk Defragmenter click Analyze 3 Follow the on screen instructions Note For more information...

Page 124: ......

Page 125: ...fragmenter task 126 Delete a Disk Defragmenter task 127 Schedule a QuickClean task You can schedule a QuickClean task to automatically clean your computer using one or more cleaners When finished under QuickClean Summary you can view the date and time when your task is scheduled to run again 1 Open the Task Scheduler pane How 1 On the McAfee SecurityCenter under Common Tasks click Maintain Compute...

Page 126: ...sk You can modify a scheduled QuickClean task to change the cleaners it uses or the frequency with which it automatically runs on your computer When finished under QuickClean Summary you can view the date and time when your task is scheduled to run again 1 Open the Task Scheduler pane How 1 On the McAfee SecurityCenter under Common Tasks click Maintain Computer 2 Under Task Scheduler click Start 2...

Page 127: ...t shredding files see McAfee Shredder Delete a QuickClean task You can delete a scheduled QuickClean task if you no longer want it to run automatically 1 Open the Task Scheduler pane How 1 On the McAfee SecurityCenter under Common Tasks click Maintain Computer 2 Under Task Scheduler click Start 2 In the Select operation to schedule list click McAfee QuickClean 3 Select the task in the Select an ex...

Page 128: ... modify a scheduled Disk Defragmenter task to change the frequency with which it automatically runs on your computer When finished under Disk Defragmenter you can view the date and time when your task is scheduled to run again 1 Open the Task Scheduler pane How 1 On the McAfee SecurityCenter under Common Tasks click Maintain Computer 2 Under Task Scheduler click Start 2 In the Select operation to ...

Page 129: ...matically 1 Open the Task Scheduler pane How 1 On the McAfee SecurityCenter under Common Tasks click Maintain Computer 2 Under Task Scheduler click Start 2 In the Select operation to schedule list click Disk Defragmenter 3 Select the task in the Select an existing task list 4 Click Delete and then click Yes to confirm the deletion 5 Click Finish ...

Page 130: ......

Page 131: ...n be recovered because some programs make temporary hidden copies of open files Shredder protects your privacy by safely and permanently deleting these unwanted files It s important to remember that shredded files cannot be restored Note SecurityCenter reports critical and non critical protection problems as soon as it detects them If you need help diagnosing your protection problems you can run M...

Page 132: ... s hard drive so that their associated information cannot be recovered It protects your privacy by safely and permanently deleting files and folders items in your Recycle Bin and Temporary Internet Files folder and the entire contents of computer disks such as rewritable CDs external hard drives and floppy disks ...

Page 133: ... Open Shredder How 1 On the McAfee SecurityCenter pane under Common Tasks click Advanced Menu 2 On the left pane click Tools 3 Click Shredder 2 On the Shred files and folders pane under I want to click Erase files and folders 3 Under Shredding Level click one of the following shredding levels Quick Shreds the selected item s once Comprehensive Shreds the selected item s 7 times Custom Shreds the s...

Page 134: ...hredder 2 On the Shred files and folders pane under I want to click Erase an entire disk 3 Under Shredding Level click one of the following shredding levels Quick Shreds the selected drive once Comprehensive Shreds the selected drive 7 times Custom Shreds the selected drive up to 10 times 4 Click Next 5 In the Select the disk list click the drive that you want to shred 6 Click Next and then click ...

Page 135: ...es that you don t recognize or trust that try to connect to it Before you use Network Manager you can familiarize yourself with some of the features Details about configuring and using these features are provided throughout the Network Manager help Note SecurityCenter reports critical and non critical protection problems as soon as it detects them If you need help diagnosing your protection proble...

Page 136: ...k map to customize your view You can also view the details for any of the devices on the network map Remote management Manage the protection status of the computers that make up your home network You can invite a computer to join the managed network monitor the managed computer s protection status and fix known security vulnerabilities for a remote computer on the network Network monitoring If it ...

Page 137: ...esents an online computer that does not have SecurityCenter installed or an unknown network device Represents an offline computer that does not have SecurityCenter installed or an offline unknown network device Signifies that the corresponding item is protected and connected Signifies that the corresponding item may require your attention Signifies that the corresponding item requires your immedia...

Page 138: ......

Page 139: ... on the network it must become a trusted member of the network Network membership is granted to new computers by existing network members computers with administrative permissions You can view the details associated with any of the items that appear on the network map even after you make changes to your network for example you add a computer In this chapter Working with the network map 138 Joining...

Page 140: ...resh the network map rename the network and show or hide items on the network map to customize your view You can also view the details associated with any of the items that appear on the network map Access the network map The network map provides a graphical representation of the computers and devices that make up your home network On the Basic or Advanced Menu click Manage Network Note If you hav...

Page 141: ...the computers and devices in your home network appear on the network map However if you have hidden items you can show them again at any time Only unmanaged items can be hidden managed computers cannot be hidden To On the Basic or Advanced Menu click Manage Network and then do this Hide an item on the network map Click an item on the network map and then click Hide this item under I want to In the...

Page 142: ...er is also recognized as a managed computer in those programs The permission level that is assigned to a computer in Network Manager applies to all McAfee networking programs For more information about what guest full or administrative permissions mean in other McAfee networking programs see the documentation provided for that program Join a managed network When you receive an invitation to join a...

Page 143: ...lick Allow full access to managed network programs to allow the computer access to the network Click Allow administrative access to managed network programs to allow the computer access to the network with administrative permissions It also allows the computer to grant access to other computers that want to join the managed network 4 Click OK An invitation to join the managed network is sent to th...

Page 144: ...computers on the network by mistake you can stop trusting them Click Stop trusting computers on this network under I want to Note The Stop trusting computers on this network link is not available if you have administrative permissions and there are other managed computers on the network ...

Page 145: ... manage the computers and devices that make up your network You can manage the status and permission levels of the computers and devices and fix most security vulnerabilities remotely In this chapter Managing status and permissions 144 Fixing security vulnerabilities 146 C H A P T E R 2 9 ...

Page 146: ...rant other computers membership to the network Full and guest permissions allow a computer to access the network only You can modify a computer s permission level at any time Since a managed network can also have devices for example routers you can use Network Manager to manage them You can also configure and modify a device s display properties on the network map Manage a computer s protection st...

Page 147: ...work map 2 Click Manage this device under I want to A Web browser opens and displays the device s administration Web page 3 In your Web browser provide your login information and configure the device s security settings Note If the device is a Wireless Network Security protected wireless router or access point you must use McAfee Wireless Network Security to configure the device s security setting...

Page 148: ... and then prompts you to fix the remaining issues by logging in to SecurityCenter on the vulnerable computer and following the recommendations provided In some cases the suggested resolution is to install the latest version of SecurityCenter on the remote computer or computers on your network Fix security vulnerabilities You can use Network Manager to fix most security vulnerabilities on remote ma...

Page 149: ...hat you are following these instructions on the computer that you want to manage remotely 2 Have your McAfee login information handy this is the e mail address and password used the first time the McAfee software was activated 3 In a browser go to the McAfee Web site log in and click My Account 4 Find the product you want to install click its Download button and then follow the on screen instructi...

Page 150: ......

Page 151: ...ter or device as a Friend and we won t notify you when they connect to the network in the future After three days we ll start notifying you about each unknown computer or device that connects so that you can mark them yourself Note Network monitoring is a feature of Network Manager that is only available with McAfee Total Protection For more information about Total Protection visit our Web site In...

Page 152: ...ox Mark as Intruder Mark a computer or device on your network as an Intruder if you don t recognize or trust it We ll automatically alert you each time it connects to your network 1 On the Basic or Advanced Menu click Manage Network 2 On the network map click an item 3 Under I want to click Mark as Friend or Intruder 4 In the dialog box click An Intruder Re enabling network monitoring notification...

Page 153: ...the network Don t show alerts for Friends that I usually want to be notified about Don t remind me when unknown PCs or devices are detected Don t alert me when McAfee has finished detecting new Friends 4 Click OK Stop monitoring networks If you disable network monitoring we can no longer alert you if intruders connect to your home network or any other network that you connect to 1 Open the Interne...

Page 154: ......

Page 155: ...u can familiarize yourself with some of the features Details about configuring and using these features are provided throughout the EasyNetwork help Note SecurityCenter reports critical and non critical protection problems as soon as it detects them If you need help diagnosing your protection problems you can run McAfee Virtual Technician In this chapter EasyNetwork features 154 Setting up EasyNet...

Page 156: ...er computers that have full or administrative access to your managed network members When you receive a file it appears in your EasyNetwork inbox The inbox is a temporary storage location for all the files other computers on the network send to you Automated printer sharing Join a managed network so you can share any local printers attached to your computer with other members using the printer s c...

Page 157: ...de to leave the network you can do so at any time In this chapter Open EasyNetwork 155 Joining a managed network 156 Leaving a managed network 160 Open EasyNetwork You can open EasyNetwork from your Windows Start menu or by clicking its desktop icon On the Start menu point to Programs point to McAfee and then click McAfee EasyNetwork Tip You can also open EasyNetwork by double clicking the McAfee ...

Page 158: ...sion level for the computer that joins the network for example guest file transfer only or full administrative file transfer and file sharing In EasyNetwork computers with administrative access can grant access to other computers and manage permissions promote or demote computers computers with full access cannot perform these administrative tasks Note After you join if you have other McAfee netwo...

Page 159: ...ys the playing cards that appear in the security confirmation dialog box and then click OK Note If the computer that invited you to join the managed network does not display the same playing cards that appear in the security confirmation dialog box there has been a security breach on the managed network Joining the network can place your computer at risk therefore click Cancel in the security conf...

Page 160: ...3 Click OK 4 Confirm that the computer is displaying the playing cards that appear in the security confirmation dialog box and then click Grant Access Note If the computer does not display the same playing cards that appear in the security confirmation dialog box there has been a security breach on the managed network Granting this computer access to the network can place your computer at risk the...

Page 161: ...e first computer that joined however you can change the network name at any time When you rename the network you change the network description displayed in EasyNetwork 1 On the Options menu click Configure 2 In the Configure dialog box type the name of the network in the Network Name box 3 Click OK ...

Page 162: ...join however you must be granted permission again For more information about joining see Joining a managed network page 156 Leave a managed network You can leave a managed network that you previously joined 1 Disconnect your computer from the network 2 In EasyNetwork on the Tools menu click Leave Network 3 In the Leave Network dialog box select the name of the network that you want to leave 4 Clic...

Page 163: ...computers read only access to them Only computers that are members of the managed network full or administrative access can share or access files shared by other member computers Note If you are sharing a large number of files your computer resources may be affected In this chapter Sharing files 162 Sending files to other computers 165 C H A P T E R 3 3 ...

Page 164: ...annot be accessed from other computers using Windows Explorer because EasyNetwork file sharing must be performed over secure connections Share a file When you share a file it is available to all members with full or administrative access to the managed network 1 In Windows Explorer locate the file you want to share 2 Drag the file from its location in Windows Explorer to the Shared Files window in...

Page 165: ...esults in the Shared Files window 1 In the Shared Files window click Search 2 Click the appropriate option page 163 in the Contains list 3 Type part or all of the file name or path in the File or Path Name list 4 Click the appropriate file type page 163 in the Type list 5 In the From and To lists click the dates that represent the range of dates when the file was created Search criteria The follow...

Page 166: ...scription Any Search all shared file types Document Search all shared documents Image Search all shared image files Video Search all shared video files Audio Search all shared audio files Compressed Search all compressed files for example zip files ...

Page 167: ...r on the recipient computer can view the file it must be saved to a local location For more information see Accept a file from another computer page 165 1 In Windows Explorer locate the file you want to send 2 Drag the file from its location in Windows Explorer to an active computer icon in EasyNetwork Tip To send multiple files to a computer press CTRL when selecting the files You can also send f...

Page 168: ...r computer on the managed network sends you a file If EasyNetwork is not running the notification message appears in the notification area at the far right of your taskbar 1 On the Options menu click Configure 2 In the Configure dialog box select the Notify me when another computer sends me files check box 3 Click OK ...

Page 169: ...rs shared by other computers on your network and allows you to configure and use them If you have configured a printer driver to print through a network print server for example a wireless USB print server EasyNetwork considers the printer to be a local printer and shares it on the network You can also stop sharing a printer at any time In this chapter Working with shared printers 168 C H A P T E ...

Page 170: ...ot joined the managed network but are connected to it you can access the shared printers from the Windows printer control panel Stop sharing a printer When you stop sharing a printer members cannot use it 1 On the Tools menu click Printers 2 In the Manage Network Printers dialog box click the name of the printer that you no longer want to share 3 Click Do Not Share Install an available network pri...

Page 171: ...Chapter 34 Introduction 169 ...

Page 172: ...170 McAfee VirusScan Plus Reference The Glossary of Terms lists and defines the most commonly used security terminology found in McAfee products ...

Page 173: ...commonly called a wireless router that plugs into an Ethernet hub or switch to extend the physical range of service for a wireless user When wireless users roam with their mobile devices transmission passes from one access point to another to maintain connectivity ActiveX control A software component used by programs or web pages to add functionality that appears as a normal part of the program or...

Page 174: ...ow corrupts memory or overwrites data in adjacent buffers C cache A temporary storage area on your computer for frequently or recently accessed data For example to increase web browsing speed and efficiency your browser can retrieve a web page from its cache rather than from a remote server the next time you want to view it cipher text Encrypted text Cipher text is unreadable until it has been con...

Page 175: ... service attack overwhelms its target with false connection requests so that the target ignores legitimate requests dialers Software that redirects Internet connections to a party other than the user s default ISP Internet service provider to run up additional connection charges for a content provider vendor or other third party dictionary attack A type of brute force attack that uses common words...

Page 176: ...esigned to prevent unauthorized access to or from a private network Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet especially an intranet All messages entering or leaving the intranet pass through the firewall which examines each message and blocks those that do not meet the specified security criteria H home network T...

Page 177: ...r and share resources such as printers and files launchpad A U3 interface component that acts as a starting point for launching and managing U3 USB programs M MAC address Media Access Control address A unique serial number assigned to a physical device NIC network interface card accessing the network man in the middle attack A method of intercepting and possibly modifying messages between two part...

Page 178: ...at vulnerability or other potentially unwanted code It can take place immediately at a scheduled time in the future or at regularly scheduled intervals Compare to on access scanning See also vulnerability P password A code usually consisting of letters and numbers you use to gain access to your computer a program or a website password vault A secure storage area for your personal passwords It allo...

Page 179: ...s potentially unwanted program PUP A software program that might be unwanted despite the possibility that users consented to download it It can alter the security or the privacy settings of the computer on which it is installed PUPs can but does not necessarily include spyware adware and dialers and might be downloaded with a program that the user wants PPPoE Point to Point Protocol Over Ethernet ...

Page 180: ...s including 802 1x authentication of a WLAN user s shared secret See also A string or key usually a password that has been shared between two communicating parties prior to initiating communication It is used to protect sensitive portions of RADIUS messages See also RADIUS page 178 real time scanning The process of scanning files and folders for viruses and other activity when they are accessed by...

Page 181: ...our email program connects to an email server each time you send or receive email messages share Allowing email recipients access to selected backed up files for a limited period of time When you share a file you send the backed up copy of the file to the email recipients that you specify Recipients receive an email message from Backup and Restore indicating that files have been shared with them T...

Page 182: ... McAfee alerts that detect unauthorized changes to your computer and notify you when they occur T temporary file A file created in memory or on disk by the operating system or some other program to be used during a session and then discarded TKIP Temporal Key Integrity Protocol pronounced tee kip Part of the 802 11i encryption standard for wireless LANs TKIP is the next generation of WEP which is ...

Page 183: ...mall disk drive making it easy to transfer files from one computer to another USB wireless adapter card A wireless adapter card that plugs into a USB port in the computer V virus A computer program that can copy itself and infect a computer without permission or knowledge of the user VPN Virtual Private Network A private communications network that is configured through a host network such as the ...

Page 184: ...es whose messages you want to receive Compare to blacklist page 172 Wi Fi Wireless Fidelity A term used by the Wi Fi Alliance when referring to any type of 802 11 network Wi Fi Alliance An organization comprised of leading wireless hardware and software providers The Wi Fi Alliance strives to certify all 802 11 based products for interoperability and promote the term Wi Fi as the global brand name...

Page 185: ...s with a high level of assurance that their data remains protected and that only authorized network users can access the network WPA PSK A special WPA mode designed for home users who do not require strong enterprise class security and do not have access to authentication servers In this mode the home user manually enters the starting password to activate Wi Fi Protected Access in Pre Shared Key m...

Page 186: ......

Page 187: ...APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED WHICH SETS FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE IF YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU HAVE ACQUIRED PLEASE CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT ACCOMPANIES YOUR SOFTWARE PACKAGING OR THAT YOU HAVE RECEIVED SEPARATELY AS PART OF THE PURCH...

Page 188: ...r other countries McAfee Red in connection with security is distinctive of McAfee brand products All other registered and unregistered trademarks and copyrighted material herein are the sole property of their respective owners TRADEMARK ATTRIBUTIONS AVERT EPO EPOLICY ORCHESTRATOR FLASHBOX FOUNDSTONE GROUPSHIELD HERCULES INTRUSHIELD INTRUSION INTELLIGENCE LINUXSHIELD MANAGED MAIL PROTECTION MAX MCA...

Page 189: ...chnician For more information about McAfee Virtual Technician see the McAfee Virtual Technician help If you purchased your security software from a partner or provider other than McAfee open a Web browser and go to www mcafeehelp com Then under Partner Links select your partner or provider to access McAfee Virtual Technician Note To install and run Virtual Technician you must log in to your comput...

Page 190: ...mation about Virtual Technician click the Help icon in Virtual Technician Launch Virtual Technician Virtual Technician collects information about your SecurityCenter programs so that it can help resolve your protection problems To safeguard your privacy this information does not include personal identifiable information 1 Under Common Tasks click McAfee Virtual Technician 2 Follow the on screen in...

Page 191: ...ee com root do wnloads asp Korea www mcafeehelp com kr mcafee com root do wnloads asp Mexico www mcafeehelp com mx mcafee com root d ownloads asp Norway www mcafeehjelp com no mcafee com root do wnloads asp Poland www mcafeepomoc com pl mcafee com root do wnloads asp Portugal www mcafeeajuda com pt mcafee com root do wnloads asp Russia www mcafeehelp com ru mcafee com root do wnloads asp Slovakia ...

Page 192: ... cz MTP_userg uide_2008 pdf Denmark download mcafee com products manuals dk MTP_userg uide_2008 pdf Finland download mcafee com products manuals fi MTP_userg uide_2008 pdf France download mcafee com products manuals fr MTP_userg uide_2008 pdf Germany download mcafee com products manuals de MTP_userg uide_2008 pdf Greece download mcafee com products manuals el MTP_userg uide_2008 pdf Hungary http d...

Page 193: ...oducts manuals tr MTP_userg uide_2008 pdf United Kingdom download mcafee com products manuals en uk MTP_us erguide_2008 pdf United States download mcafee com products manuals en us MTP_us erguide_2008 pdf McAfee Internet Security User Guides Country Regi on McAfee User Guides Australia download mcafee com products manuals en au MIS_us erguide_2008 pdf Brazil download mcafee com products manuals pt...

Page 194: ...ands download mcafee com products manuals nl MIS_usergu ide_2008 pdf Norway download mcafee com products manuals no MIS_userg uide_2008 pdf Poland download mcafee com products manuals pl MIS_usergu ide_2008 pdf Portugal download mcafee com products manuals pt MIS_userg uide_2008 pdf Russia download mcafee com products manuals ru MIS_userg uide_2008 pdf Slovakia download mcafee com products manuals...

Page 195: ...anuals dk VSP_userg uide_2008 pdf Finland download mcafee com products manuals fi VSP_usergu ide_2008 pdf France download mcafee com products manuals fr VSP_usergu ide_2008 pdf Germany download mcafee com products manuals de VSP_userg uide_2008 pdf Greece download mcafee com products manuals el VSP_usergu ide_2008 pdf Hungary download mcafee com products manuals hu VSP_userg uide_2008 pdf Italy do...

Page 196: ... mcafee com products manuals en uk VSP_us erguide_2008 pdf United States download mcafee com products manuals en us VSP_use rguide_2008 pdf McAfee VirusScan User Guides Country Regi on McAfee User Guides Australia download mcafee com products manuals en au VS_user guide_2008 pdf Brazil download mcafee com products manuals pt br VS_user guide_2008 pdf Canada English download mcafee com products man...

Page 197: ... manuals nl VS_usergui de_2008 pdf Norway download mcafee com products manuals no VS_usergu ide_2008 pdf Poland download mcafee com products manuals pl VS_usergui de_2008 pdf Portugal download mcafee com products manuals pt VS_usergui de_2008 pdf Russia download mcafee com products manuals ru VS_usergui de_2008 pdf Slovakia download mcafee com products manuals sk VS_usergui de_2008 pdf Spain downl...

Page 198: ...reat_cent er cz mcafee com virusInf o Denmark www mcafee com us threat_cent er dk mcafee com virusIn fo Finland www mcafee com us threat_cent er fi mcafee com virusInf o France www mcafee com us threat_cent er fr mcafee com virusInf o Germany www mcafee com us threat_cent er de mcafee com virusIn fo Greece www mcafee com us threat_ce nter gr mcafee com virusIn fo Hungary www mcafee com us threat_c...

Page 199: ... threat_cent er tw mcafee com virusIn fo Turkey www mcafee com us threat_cent er tr mcafee com virusInf o United Kingdom www mcafee com us threat_cent er uk mcafee com virusIn fo United States www mcafee com us threat_cent er us mcafee com virusIn fo Consult the following table for the HackerWatch sites in your country or region Country Regi on HackerWatch Australia www hackerwatch org Brazil www ...

Page 200: ...watch org lang es mx Netherlands www hackerwatch org lang nl Norway www hackerwatch org lang no Poland www hackerwatch org lang pl Portugal www hackerwatch org lang pt pt Russia www hackerwatch org lang ru Slovakia www hackerwatch org lang sk Spain www hackerwatch org lang es Sweden www hackerwatch org lang sv Taiwan www hackerwatch org lang zh tw Turkey www hackerwatch org lang tr United Kingdom ...

Page 201: ...und and outbound traffic111 archive 171 authentication 171 B back up 171 Ban a computer from the Inbound Events log 96 Ban a computer from the Intrusion Detection Events log 96 bandwidth 172 Banning computer connections 94 blacklist 172 182 Block access for a new program 85 Block access for a program 85 Block access from the Recent Events log 86 Block access to an existing system service port 99 B...

Page 202: ... H Hide informational alerts 67 Hide security messages 25 Hide the splash screen at startup 24 Hide virus outbreak alerts 25 home network 174 176 hotspot 174 I Ignore a protection problem 19 Ignoring protection problems 19 Install an available network printer 168 Install McAfee security software on remote computers 147 integrated gateway 174 intranet 174 Introduction 3 Invite a computer to join th...

Page 203: ... text 177 Play a sound with alerts 24 plugin plug in 177 POP3 177 180 popups 177 port 177 potentially unwanted program PUP 177 PPPoE 177 Protect your computer during startup 75 protocol 177 proxy 177 proxy server 177 178 publish 178 Q quarantine 178 QuickClean features 116 R RADIUS 178 179 real time scanning 178 Receive notification when a file is sent 166 Recycle Bin 178 Re enabling network monit...

Page 204: ...ime virus protection 47 Stop sharing a file 162 Stop sharing a printer 168 Stop trusting computers on the network 142 synchronize 180 system restore point 180 SystemGuard 180 T temporary file 180 TKIP 180 183 Trace a computer from the Inbound Events log 108 Trace a computer from the Intrusion Detection Events log 108 Trace a monitored IP address 109 Tracing Internet traffic 107 Trojan Trojan horse...

Page 205: ...36 Work with quarantined files 36 Work with quarantined programs and cookies 37 Work with viruses and Trojans 35 Working with alerts 14 21 65 Working with scan results 35 Working with shared printers 168 Working with Statistics 106 Working with the network map 138 worm 183 WPA 175 183 WPA2 175 183 WPA2 PSK 175 183 WPA PSK 175 183 ...

Reviews: