Table of Contents

Advertisement

Quick Links

McAfee Guard Dog
User's Guide

Advertisement

Table of Contents
loading

Summary of Contents for McAfee GUARD DOG 2

  • Page 1 McAfee Guard Dog User’s Guide...
  • Page 2 1. License Grant. Subject to the payment of the applicable license fees, and subject to the terms and conditions of this Agreement, McAfee hereby grants to you a non-exclusive, non-transferable right to use one copy of the specified version of the Software and the accompanying documentation (the "Documentation").
  • Page 3 Software, you are entitled to download one (1) revision or upgrade to the Software when and as McAfee publishes it via its electronic bulletin board system, website or through other online services. After the specified time period, you have no further rights to receive any revisions or upgrades without purchase of a new license or annual upgrade plan to the Software.
  • Page 4 Software is contained. You must return the defective media to McAfee at your expense with a copy of your receipt. This limited warranty is void if the defect has resulted from accident, abuse, or misapplication. Any replacement media will be warranted for the remainder of the original warranty period.
  • Page 5 CHARACTER INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF GOODWILL, WORK STOPPAGE, COMPUTER FAILURE OR MALFUNCTION, OR FOR ANY AND ALL OTHER DAMAGES OR LOSSES. IN NO EVENT WILL MCAFEE BE LIABLE FOR ANY DAMAGES IN EXCESS OF THE LIST PRICE MCAFEE CHARGES FOR A LICENSE TO THE SOFTWARE, EVEN IF MCAFEE SHALL HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
  • Page 6 12. McAfee Customer Contact. If you have any questions concerning these terms and conditions, or if you would like to contact McAfee for any other reason, please call (408) 988-3832, fax (408) 970-9727, or write: McAfee Software, 3965 Freedom Circle, Santa Clara, California 95054.
  • Page 7: Table Of Contents

    Table of Contents Chapter 1. Welcome to Guard Dog™ ......1 Guard Dog and the Internet .........1 How Guard Dog works .
  • Page 8 What Virus Sentry does ......... . .54 viii McAfee Guard Dog...
  • Page 9 How to Contact McAfee ........
  • Page 10 McAfee training ........
  • Page 11: Chapter 1. Welcome To Guard Dog

    Welcome to Guard Dog ™ Guard Dog and the Internet In the last few years the Internet has changed from a communications network used almost exclusively by governments and universities to an information treasure house used by people of all ages and occupations. With an Internet account you can send electronic mail (e-mail) around the world in seconds, do research without leaving home, meet new friends in an online chat room, or shop without getting out of your bathrobe.
  • Page 12: What Internet Problems Guard Dog Solves

    • Web Trail Cleaner cleans up your Web browsing trails—cached files, list of URLs (Uniform Resource Locator, also known as Web address) visited, history file—when you close your browser. Others can track your online movements by viewing the files and URLs left over from your Internet browsing. McAfee Guard Dog...
  • Page 13: What's New In Guard Dog

    Welcome to Guard Dog™ • Search Filter prevents search information that you request at one Web site from being passed along to the next site you visit. Without Search Filter, your browser can transfer your search request information from one Web site to another without your knowledge.
  • Page 14: About Guard Dog Documentation

    Store and manage your Web site passwords in one convenient, secure location. About Guard Dog documentation This manual provides the basic information you need to install, set up, and use Guard Dog. More detailed information about Guard Dog is provided by Help. McAfee Guard Dog...
  • Page 15: How This Book Is Organized

    AntiVirus Features What privacy, security, and virus issues exist Appendix A. About Internet on the Internet. Security and Privacy How to contact McAfee Software sales, Appendix B. Contacting customer service and support departments. McAfee Software Using Guard Dog help To view Guard Dog 1.
  • Page 16 To get help for settings in a dialog box • Whenever you see the button in the upper-right corner of a dialog box, click the button, then click on the setting for which you want information. McAfee Guard Dog...
  • Page 17: Chapter 2. Installing Guard Dog

    • Windows 95 Web browser (also called a 32-bit browser). Some Help features—McAfee Software on the Web, Guard Dog on the Web, FAQs, and Report a problem—require you to connect to the McAfee Software Web site with a Web browser (software that allows you to view documents and download files from the World Wide Web).
  • Page 18: Installing Guard Dog

    7. After the Guard Dog files are copied to your PC, you are asked if you want to register Guard Dog over the Internet. To register, click Yes. The McAfee Software Online Registration wizard steps you through the registration process. Online registration is optional. If you do not register Guard Dog during installation, you can do so later from the Start menu by choosing Register Guard Dog from the Guard Dog menu.
  • Page 19: Troubleshooting Installation Problems

    Installing Guard Dog™ 8. After registration, you are asked if you want to install a limited subscription version of McAfee Software Oil Change™. To use Guard Dog’s Update feature, you must have Oil Change installed. Do one of the following: •...
  • Page 20: Step 2: Remove Temporary Files

    4. In the menu, click Edit, then click Select All. All of the items in your Temp folder are now selected. 5. Press the Delete key on your keyboard to delete the files. If Windows asks about deleting files, click Yes. 6. In the Windows taskbar, click Start, then click Shut Down. McAfee Guard Dog...
  • Page 21: Step 3: Close Other Software

    You are now ready to install your new software. Installing other software from the Guard Dog CD The Guard Dog CD may contain additional Internet programs or trial copies of other McAfee Software products. To install optional software 1. Insert the Guard Dog CD in the CD-ROM drive.
  • Page 22 Installing Guard Dog™ McAfee Guard Dog...
  • Page 23: Chapter 3. Quick Tour Of Guard Dog

    Quick Tour of Guard Dog ™ Guard Dog is a simple program to use. In fact, this one chapter covers the main things you need to know about using Guard Dog. You begin by watching the Guard Dog video, after which you must answer a few questions so that Guard Dog can effectively protect the sensitive data on your PC.
  • Page 24: What Information Does Guard Dog Ask Me To Enter

    The Guard Dog interview asks you to enter the personal and financial information that you want to protect. All the information you enter into Guard Dog is stored in encrypted form on your hard disk—it is never sent to McAfee Software.
  • Page 25: Why Should I Create An Emergency Disk

    ™ Quick Tour of Guard Dog • Social Security number • Telephone number • E-mail address • Other financial numbers such as bank account, brokerage account, credit card, phone card, and so on. • Any Web site login names and passwords that you want to store in Password Manager.
  • Page 26: How Password Protection Effects Using Guard Dog

    3. Click the icon for your floppy drive and click OK. Ó TIP: Use Interview when you want to change your Guard Dog password, then update your Emergency Disk set (you can reuse the same disks) to store your changed password information. McAfee Guard Dog...
  • Page 27: Using The Guard Dog Home Screen

    Adjust the Guard Dog general or alert settings. Options, then click Protection Settings Display a list of Guard Dog actions. Display the McAfee Software Home screen in Help, then McAfee Software on your Web browser. the Web Display the McAfee Software Support page in Help, then Guard Dog on the your Web browser.
  • Page 28: Opening And Closing The Guard Dog Home Screen

    Guard Dog Home screen. Part of Guard Dog remains active to monitor your PC for potential danger. For more information, see “What Guard Dog does while your PC is running” on page 21. McAfee Guard Dog...
  • Page 29: Performing A Checkup

    ™ Quick Tour of Guard Dog Performing a CheckUp After completing the interview, you’ll want to find out how your PC may be at risk. CheckUp examines your PC for privacy, security, and virus problems and then guides you through fixing any problem it finds. If you are using the settings suggested by Guard Dog in the interview, you need only run CheckUp right after you install Guard Dog and then every month or so.
  • Page 30: Updating Guard Dog

    Updating Guard Dog Guard Dog can keep up with new viruses and Internet threats when you update its program files and virus patterns over the Internet. Using McAfee Software Oil Change technology, you select the updates you want and they are downloaded to your PC and installed automatically.
  • Page 31: What Guard Dog Does While Your Pc Is Running

    ™ Quick Tour of Guard Dog • Save the Log as a text file. • Clear the entries in the Log.  NOTE: For step-by-step directions on working with the Log, see Guard Dog Help. What Guard Dog does while your PC is running While you use your PC, Guard Dog is on the lookout for potential privacy, security, and virus problems and takes action when it finds a problem.
  • Page 32: Responding To Guard Dog Alert Messages

    Ó TIP: If you decide you no longer want to see an alert message, use the question mark (?) button in the alert message to find out what setting to change. All of the settings that control the alert messages are located under Protection Settings in the Options menu. McAfee Guard Dog...
  • Page 33: Using Browser Buddy To Retrieve Or Store Your Web Site Passwords

    ™ Quick Tour of Guard Dog Using Browser Buddy to retrieve or store your Web site passwords You can depend on Guard Dog to help you as you navigate the intricacies of the Web. When you connect to Web sites that require a name and password, you can use Browser Buddy to: •...
  • Page 34 The text appears in the field. (If the site that you are logging into displays your password text as a series of asterisks (*), Guard Dog will display one asterisk for each character in your password.) Figure 3-8. 3. Continue logging in as usual to the Web site. McAfee Guard Dog...
  • Page 35: Using File Encryption

    ™ Quick Tour of Guard Dog Using file encryption File encryption translates a file into a “secret” code that makes the file unreadable. You must decode or decrypt the file before you can use it. The file encryption in Guard Dog is designed so that you can easily encrypt or decrypt all of the files that you designate for encryption in File Guardian.
  • Page 36 ™ Quick Tour of Guard Dog McAfee Guard Dog...
  • Page 37: Chapter 4. Customizing Guard Dog

    Customizing Guard Dog ™ Restarting the Interview Using the Interview is the easiest way to change the settings for Guard Dog. If you want direct control over the settings, see “Changing Protection Settings”in the next section. To start the Interview 1.
  • Page 38 Preferences settings are described in the next section of this chapter. Privacy settings are described in Chapter 4, Security settings are described in Chapter 5, and AntiVirus settings are described in Chapter 6. McAfee Guard Dog...
  • Page 39: Preferences Settings

    ™ Customizing Guard Dog Preferences settings The Preferences settings affect all of Guard Dog. Table 4-1. Load Guard Dog Start Guard Dog monitoring your PC for potential problems when Windows starts. Show Splash Briefly display the Guard Dog logo when Screen Windows starts.
  • Page 40 Recycle Bin. (The data from a file that has been deleted from your Recycle Bin, remain on your hard disk until overwritten. A sophisticated disk editor could be used to retrieve the data and recreate the file.) McAfee Guard Dog...
  • Page 41 ™ Customizing Guard Dog Table 4-1. List of events that can be scheduled Remind to create an Emergency Display a reminder message. When Disk you install Guard Dog, this event will be scheduled to occur every four months. Remind to check for Guard Dog Display a reminder message.
  • Page 42: Changing Checkup Settings

    Internet access. File Guardian Searches for sensitive files (such as e-mail messages or financial files) that contain information that you want to keep private and lets you protect them. McAfee Guard Dog...
  • Page 43 ™ Customizing Guard Dog Table 4-2. CheckUp Settings (Continued) Category Name of Check Description Password Looks to see if you have any shared files/folders on your PC and guides you through password protecting them. Virus Check Virus Check Looks on all selected drives or folders for virus-infected files that match the selection setting for What to scan at CheckUp in Virus Sentry.
  • Page 44 ™ Customizing Guard Dog McAfee Guard Dog...
  • Page 45: Chapter 5. Privacy Features

    Privacy Features Guard Dog’s Privacy features protect browsing and personal information that you don’t want to go out on the Internet. What Cookie Blocker does Cookies are small files that your Web browser stores on your PC at the request of a Web server.
  • Page 46: Responding To A Cookie Blocker Alert Message

    Ó TIP: You can run CheckUp so that it only looks for cookies. On the Guard Dog Home screen, click Options, click CheckUp Settings, then clear all options except Cookie Check. After you are finished with the CheckUp, don’t forget to change back your settings. McAfee Guard Dog...
  • Page 47: Why Should I Change My Cookie Blocker Settings

    Privacy Features Why should I change my Cookie Blocker settings? If you want a good level of privacy protection without having to see any Cookie Blocker alert messages, use the recommended settings—always accept cookies from sites that you visit directly and decide on a case-by-case basis whether to accept cookies coming from sites that you haven’t visited directly.
  • Page 48: Responding To An Identity Protector Alert Message

    You can respond to the alert message in the following ways: Table 5-3. If you choose Guard Dog does this This time only Let the information go out just this time. Not this time Prevents the information from going out this time. McAfee Guard Dog...
  • Page 49: Why Should I Change My Identity Protector Settings

    Privacy Features Why should I change my Identity Protector settings? You may want to change your settings under the following circumstances: Table 5-4. If you Use this option Are the only person using Enter all of the information that you want to your PC and you don’t prevent from going out and select Allow Always.
  • Page 50: Responding To The Web Trail Cleaner Alert Message

    If you don’t return to a site, the cached files for the site are never used again—they just sit and take up disk space until they are ultimately deleted by your browser. If you later want to delete the files that you’ve left behind, run the Guard Dog CheckUp. McAfee Guard Dog...
  • Page 51: Why Should I Change My Web Trail Cleaner Settings

    Privacy Features Why should I change my Web Trail Cleaner settings? You may want to change your settings under the following circumstances: Table 5-7. If you Use this option Want to see exactly what files Prompt to Clean Up after closing Web browser. are being deleted.
  • Page 52 Privacy Features McAfee Guard Dog...
  • Page 53: Chapter 6. Security Features

    Security Features Guard Dog’s security features safeguard your Internet connection and protect the files on your PC from prying eyes and destructive programs. What Gatekeeper does Gatekeeper lets you control what programs have access to your Internet connection. Gatekeeper also can warn you about any of these potentially harmful actions: •...
  • Page 54 Program starts up another program message When another program starts to run another program, Guard Dog checks to see if you’ve authorized this action. If you haven’t allowed the program to always open the other program, Guard Dog displays an alert message. McAfee Guard Dog...
  • Page 55: Why Should I Change My Gatekeeper Settings

    Security Features You can respond to the alert message in the following ways: Table 6-2. If you choose Guard Dog does this Allow always Lets the program start the other program. Not this time Prevents the program from starting the other program just this time.
  • Page 56: What File Guardian Does

    • An ActiveX control attempts to scan files on your hard drive. • A program attempts to access your system password files. When Guard Dog displays an alert message, you can decide if the program should be allowed to continue the operation or not. McAfee Guard Dog...
  • Page 57: Responding To A File Guardian Alert Messages

    Security Features Responding to a File Guardian alert messages Guard Dog can display five different File Guardian-related alert messages. If you are using the default setting suggested by the Interview, you will see only the guarded file, ActiveX scan, ActiveX delete, and drive format messages. Guarded file alert message You tell File Guardian which files to guard on your hard drive and what programs can be used to open the files.
  • Page 58 You know that this activity is legitimate when you start the formatting command or if you know that a program you are using needs to format a hard disk (or a Zip or Jaz disk). McAfee Guard Dog...
  • Page 59: Why Should I Change My File Guardian Settings

    Security Features When Guard Dog detects a format command, it displays an alert message that tells you which program started the format command. If you don’t know why your disk is being formatted, note the name of the program in the alert message and then turn off your computer using its power switch.
  • Page 60: What Password Manager Does

    • Add a record. • Edit a record. • Remove a record. You can also add a record in Browser Buddy. For more information, see “Using Browser Buddy to retrieve or store your Web site passwords” on page 23. McAfee Guard Dog...
  • Page 61 Security Features To add a password record 1. In the Guard Dog Home screen, click Options, then click Protection Settings. 2. Click Password Manager. (If the check box next to Password Manager is not selected, you won’t be able to add, edit, or remove records.) 3.
  • Page 62 Security Features McAfee Guard Dog...
  • Page 63: Chapter 7. Using Antivirus Features

    Using AntiVirus Features Guard Dog’s AntiVirus features can fix most existing virus problems and prevent them from recurring. For general information on viruses, see Appendix B. Looking for viruses with CheckUp Guard Dog comes set up to perform a virus check as part of CheckUp. It uses the settings in CheckUp Settings to determine which drives and folders to check (by default, your local drives—hard disks, floppy disks, and other removable media).
  • Page 64: What Virus Sentry Does

    Why should I change my Virus Sentry settings? By default, Guard Dog is set up to provide the best protection, in the fastest manner. You can increase your protection level, but it will take longer to perform a scan. McAfee Guard Dog...
  • Page 65 Using AntiVirus Features You may want to change your settings under the following circumstances: Table 7-1. If you want to Use this option Check for virus infection before a program Program execution. starts up. Check an e-mail attachment before it is E-mail file access.
  • Page 66 Reduce the number of files checked by Guard Do not check these files and Dog. This setting affects not only file-related folders. checks but also the scheduled virus checks. (By default, Guard Dog doesn’t check files that are in your Recycle Bin.) McAfee Guard Dog...
  • Page 67: Keeping Virus Protection Up-To-Date

    PC for a virus, but new viruses are always being created and old viruses are always being modified. The McAfee Software virus research team is constantly watching for these new and changed viruses. As new virus information is discovered, it is added to the pattern file.
  • Page 68 Using AntiVirus Features McAfee Guard Dog...
  • Page 69: Appendix A. Internet Security And Privacy

    Internet Security and Privacy Whom do you trust? On the Internet, this question is difficult to answer—you cannot not see people face-to-face, and cannot be certain exactly who you are dealing with. This chapter provides some background information that will help you understand Internet security and privacy threats, and discusses strategies for using Guard Dog to protect yourself and your computer.
  • Page 70: Why Packets

    The Internet is a network of linked computers that uses TCP/IP as its underlying messaging system. The World Wide Web (WWW, or just “Web” for short) is hosted by the Internet, and is an ever-expanding collection of documents employing a special coding scheme named Hypertext Markup Language (HTML). McAfee Guard Dog...
  • Page 71: Privacy And Security On The Web

    Internet Security and Privacy  NOTE: HTML is a set of commands designed to be interpreted by Web browsers. An HTML document consists of content (prose, graphics, video, etc.) and a series of commands that tell a Web browser how to display the content.
  • Page 72: Privacy On The Web

    One form of security technology called a “firewall” can close the door, but firewalls are often maintained poorly, and even in the best environment, cannot safeguard certain services. McAfee Guard Dog...
  • Page 73: What Can I Do To Keep My Stuff Safe

    Internet Security and Privacy What can I do to keep my stuff safe? With sniffer in place, a hacker can intercept credit card numbers and other private information by capturing data transmissions, and then using pattern-matching algorithms to filter out the valuable information. Intercepted credit card info can be sold to criminals, intent on committing fraud.
  • Page 74: How Does Encryption Work

    Computer encryption hides messages by making the original data unintelligible. The intent is to garble the data for anyone for whom it is not intended: Having access to the encrypted data itself is useless. McAfee Guard Dog...
  • Page 75: Security On The Web

    Internet Security and Privacy The simplest encryption systems use letter shifting, in which a message is encrypted by shifting every letter n letters later in the alphabet. For example, say A is changed to B, and B to C, etc. As long as the recipient knows how you shifted the letters, they can easily decrypt the message by reversing the process.
  • Page 76: Nasty Applets

    PC viruses are similar to biological viruses in that they: • Are spread from host to host—the “host,” in this instance, is your PC. • Are very good at reproducing themselves. • Can wreak havoc in an infected host system. McAfee Guard Dog...
  • Page 77: Are Viruses Really That Dangerous

    Internet Security and Privacy Biological viruses have proven to be tenacious: modern medicine’s success in fighting viral infection has, so far, been rather limited. Fortunately, PC viruses differ from biological viruses in that they are easier to combat, once they are identified.
  • Page 78: How Can My Pc Become Infected With A Virus

    Dog’s default settings allow it to monitor all Java and ActiveX activity on your PC, and warn you before something potentially dangerous occurs. Frequently asked questions about Internet privacy What information do Web sites collect about me? Web sites collect information about you in two major ways. McAfee Guard Dog...
  • Page 79 Internet Security and Privacy • First, you can provide the information yourself when you register software or respond to Internet questionnaires. • Second, when you ask to be allowed access to the electronic version of a newspaper, or use a “shopping cart” to buy products on the Web, a cookie, described in “What are cookies and how are they used?”...
  • Page 80: Sources For Internet Privacy And Security Information

    Yahoo!’s virus page contains links to anti-virus software companies, Usenet virus newsgroups, and links to specific virus information. Usenet virus FAQ Contains a nicely organized compendium of information about viruses collected from Usenet virus newsgroups. http://www.cis.ohio-state.edu/hypertext/faq/bngusenet/comp/virus/top. html McAfee Guard Dog...
  • Page 81: More Information About Security

    Internet Security and Privacy More information about security Two good starting places for information about Web security is the on-line help for Netscape Communicator and Microsoft Internet Explorer. National Institute of Health’s Computer Security Information site Good links to many security information sites. http://www.alw.nih.gov/Security/security.html Microsoft’s Security site White papers and descriptions of Microsoft’s security efforts...
  • Page 82 Internet Security and Privacy McAfee Guard Dog...
  • Page 83: Appendix B. Product Support

    Product Support BEFORE YOU CONTACT McAfee Software for technical support, locate yourself near the computer with McAfee Guard Dog installed and verify the information listed below: • Have you sent in your product registration card? • Version of McAfee Guard Dog •...
  • Page 84 (http://www.mcafee.com) a valuable resource for answers to technical support issues. We encourage you to make this your first stop for answers to frequently asked questions, for updates to McAfee software, and for access to McAfee news and virus information. Support forums and telephone contact If you do not find what you need or do not have web access, try one of our automated services.
  • Page 85 Index browser history ActiveX controls deleting files protection against damage by cached files scanning hard drives CheckUp viruses and changing settings alert messages using Cookie Blocker Cookie Blocker File Guardian alert message ActiveX alert message Browser Buddy and ActiveX delete alert message described drive format alert message settings...
  • Page 86 Home screen described items on harmful site alert message using Internet access alert message program starts up another program alert message settings icon for Guard Dog Getting Started manual Identity Protector described alert message described settings McAfee Guard Dog...
  • Page 87 Index indirect sites Internet connection, protecting Password Manager Internet privacy and security adding a new record using Browser Buddy Guard Dog solutions adding record to Interview deleting record creating an Emergency Disk described editing record passwords Java and viruses activating and deactivating adding record to Password Manager adding with Browser Buddy kids See multiple users and passwords...
  • Page 88 Guard Dog events Search Filter unsecure site Browser Buddy and Update button, using described updates, scheduling reminder settings updating Guard Dog and virus patterns using Scheduler using Update URLs username adding with Browser Buddy dragging from Browser Buddy McAfee Guard Dog...
  • Page 89 Index Virus Sentry alert message described settings viruses ActiveX and e-mail attachments and e-mail messages and file and program hoax how dangerous? how spread Java and macro scheduling scans threats types of updating list of updating patterns with Scheduler who creates them warnings See alert messages Web password management Web sites...

This manual is also suitable for:

Guard dog

Table of Contents