Table of Contents

Advertisement

Quick Links

Internet Guard Dog
User's Guide
Version 3.0

Advertisement

Table of Contents
loading

Summary of Contents for McAfee INTERNET GUARD DOG 3.0

  • Page 1 Internet Guard Dog User’s Guide Version 3.0...
  • Page 2 1. License Grant. Subject to the payment of the applicable license fees, and subject to the terms and conditions of this Agreement, McAfee hereby grants to you a non-exclusive, non-transferable right to use one copy of the specified version of the Software and the accompanying documentation (the "Documentation").
  • Page 3 4. Ownership Rights. The Software is protected by United States copyright laws and international treaty provisions. McAfee and its suppliers own and retain all right, title and interest in and to the Software, including all copyrights, patents, trade secret rights, trademarks and other intellectual property rights therein.
  • Page 4 Agreement. 6. Warranty and Disclaimer a. Limited Warranty. McAfee warrants that for sixty (60) days from the date of original purchase the media (e.g., diskettes) on which the Software is contained will be free from defects in materials and workmanship.
  • Page 5 WITHOUT LIMITATION, DAMAGES FOR LOSS OF GOODWILL, WORK STOPPAGE, COMPUTER FAILURE OR MALFUNCTION, OR FOR ANY AND ALL OTHER DAMAGES OR LOSSES. IN NO EVENT WILL MCAFEE BE LIABLE FOR ANY DAMAGES IN EXCESS OF THE LIST PRICE MCAFEE CHARGES FOR A LICENSE TO THE SOFTWARE, EVEN IF MCAFEE SHALL HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
  • Page 6 12. McAfee Customer Contact. If you have any questions concerning these terms and conditions, or if you would like to contact McAfee for any other reason, please call (408) 988-3832, fax (408) 970-9727, or write: McAfee Software, 3965 Freedom Circle, Santa Clara, California 95054.
  • Page 7: Table Of Contents

    Step 3: Close other software ........14 Installing McAfee VirusScan from the Internet Guard Dog CD ...14 Chapter 3.
  • Page 8 Using McAfee VirusScan ........23...
  • Page 9 How to Contact McAfee ........
  • Page 10 McAfee training ........
  • Page 11: Chapter 1. Welcome To Internet Guard Dog

    Figure 1-1. Internet Guard Dog Home screen McAfee’s Internet Guard Dog addresses any of these potential risks with its comprehensive features designed to protect your privacy and security when surfing the Internet.
  • Page 12: How Internet Guard Dog Works

    Chapter 5, “Security Features.” VirusScan Internet Guard Dog now uses the McAfee VirusScan to address virus-related problems you may encounter through the Internet. This feature allows you to set how to perform a virus scan operation on your computer; what to do if a virus is found;...
  • Page 13: Security Check

    Welcome to Internet Guard Dog™ Security Check You can run a complete check of your computer for any privacy or security problems via this feature. After Internet Guard Dog performs the check, it displays any problem found, provides additional information about the problem, and guides you through on how to solve the problem.
  • Page 14 Welcome to Internet Guard Dog™ Protection from privacy threats • Identity Protector monitors your Internet connection and warns you before private information is sent to an unsecure Internet site. It stops programs and other people that use your computer (like your kids) from sending your name and credit card numbers over the Internet without your approval.
  • Page 15: What's New In Internet Guard Dog

    • Scheduler to launch the McAfee VirusScan Scheduler. This utility enables you to configure and run unattended virus scan operations. • Virus info to display virus information via the McAfee Web site. What’s new in Internet Guard Dog Internet Guard Dog version 3.0 includes these new features.
  • Page 16: Other Features And Enhancements

    • Single Update button At the single click of a button, user can update both Internet Guard Dog and McAfee VirusScan via the Web. About Internet Guard Dog documentation This manual provides the basic information you need to install, set up, and use Internet Guard Dog.
  • Page 17: How This Book Is Organized

    Chapters 3, 4, 5, and 6 if you want further information on customizing Internet Guard Dog or using specific features. Read Chapter 7 for further information on McAfee VirusScan. If you are new to the Internet or just want to find out more about Internet privacy and security issues, read Appendix A.
  • Page 18 Welcome to Internet Guard Dog™ 2. You can search for a help topic via the Contents, Index or Find tabs. • Contents tab 1. Double-click a book icon to display its table of contents of related topics. 2. Locate the topic you want; then point and double-click to open the Help topic.
  • Page 19 Welcome to Internet Guard Dog™ To get help for settings in a dialog box • Whenever you see the button in the upper-right corner of a dialog box, click the button, then click on the setting for which you want information.
  • Page 20 Welcome to Internet Guard Dog™ Internet Guard Dog...
  • Page 21: Chapter 2. Installing Internet Guard Dog

    • IBM PC or compatible computer running Windows 95 or Windows 98. • 16 megabytes (MB) minimum of RAM. • 20 MB free hard disk space to install Internet Guard Dog and McAfee VirusScan. Additional disk space is required to install any optional Internet software that may be included on the compact disc (CD) version.
  • Page 22: Installing Internet Guard Dog

    Installing Internet Guard Dog™ Installing Internet Guard Dog After closing all open programs, you are ready to install Internet Guard Dog on your PC. Installation should go smoothly, however, if you do have difficulties, see “Troubleshooting installation problems” on page To install Internet Guard Dog 1.
  • Page 23: Step 1: Clean Up Your Hard Drive

    Installing Internet Guard Dog™ Step 1: Clean up your hard drive Run the Windows 95 hard drive utilities, ScanDisk and Disk Defragmenter to identify and fix any errors on your hard drive: 1. Click Start on the Windows taskbar, point to Programs, then Accessories, then System Tools, and click ScanDisk.
  • Page 24: Step 3: Close Other Software

    The Internet Guard Dog CD contains a copy of McAfee VirusScan. To install McAfee VirusScan 1. Insert the Internet Guard Dog CD in the CD-ROM drive. 2. In the Internet Guard Dog Setup screen, click Install McAfee VirusScan. 3. Follow the instructions on your screen. Internet Guard Dog...
  • Page 25: Chapter 3. Quick Tour Of Internet Guard Dog

    Quick Tour of Internet Guard Dog ™ Internet Guard Dog is a simple program to use. In fact, this one chapter covers the main things you need to know about using Internet Guard Dog. You begin with answering a few questions via the Interview so that Internet Guard Dog can effectively use its feature to protect you from Internet threats.
  • Page 26: What Information Does Internet Guard Dog Ask Me To Enter

    All the information you enter into Internet Guard Dog is stored in encrypted form on your hard disk—it is never sent to McAfee Software. You may want to gather your personal information before you start the interview.
  • Page 27: How Internet Guard Dog Administrator Works

    Quick Tour of Internet Guard Dog™ NOTE: You can fine-tune the configuration of Internet Guard Dog’s privacy and security features in the Protection Settings. Click Options on the Internet Guard Dog Home screen, then click Protection Settings. How Internet Guard Dog Administrator works Since Internet Guard Dog now offers multi-user logon capabilities, this feature allows one user to act as the administrator of personal information, protection and security settings entered via the Internet Guard Dog features.
  • Page 28: How Password Protection Works In Guard Dog

    Quick Tour of Internet Guard Dog™ How password protection works in Guard Dog Whenever you start Windows, Internet Guard Dog prompts you to enter the password you set during the Interview. When you enter an incorrect password, it displays the hint that you provided when you created your password.
  • Page 29 Perform a security check to find any privacy or Security Check security problem on your computer. Display user activity logs Activity Logs Display the McAfee Software Home screen in Help, then select McAfee your Web browser. Software on the Web Display the McAfee Software Support page in Help, then select Internet your Web browser.
  • Page 30: How User Setup Works

    Quick Tour of Internet Guard Dog™ How User Setup works The Internet Guard Dog Administrator can add, edit and delete profiles of other users who browse the Internet through the same computer. After profiling users, the Administrator can customize their individual protection settings, including Internet filtering options and can even monitor their browsing habits.
  • Page 31: How Internet Filtering Works

    Quick Tour of Internet Guard Dog™ How Internet Filtering works As a new feature of Internet Guard Dog, you can further customize the protection settings of a profiled user via the Internet Filtering options. From the User Setup screen, select a user; click Edit User Options; then click the Internet Filtering button.
  • Page 32: How Privacy And Security Options Work

    Quick Tour of Internet Guard Dog™ Figure 3-4. Internet Filtering screen (URL List) How Privacy and Security options work Internet Guard Dog allows you to determine levels of privacy and security using a series of configurable options called Protection Settings. A part of Internet Guard Dog is always on duty in the background to protect your computer’s data and your privacy based on the choices you make.
  • Page 33: Options

    Using McAfee VirusScan Internet Guard Dog now uses the McAfee VirusScan to address virus-related problems you may encounter through the Internet. This feature allows you to set how to perform a virus scan operation on your computer; what to do if a virus is found;...
  • Page 34: Updating Internet Guard Dog And Virusscan

    To update the Internet Guard Dog program or virus pattern files McAfee Software programs now include a central location for launching the product’s components. For Internet Guard Dog, you can also initiate their updates from the Home screen. Click the Update button in the Home screen.
  • Page 35: Performing A Security Check

    Quick Tour of Internet Guard Dog™ Performing a Security Check After completing the interview, you’ll want to find out how your PC may be at risk. Security Check examines your PC for privacy and security problems and then guides you through fixing any problem it finds. If you are using the settings suggested by Internet Guard Dog in the interview, you only need to run Security Check right after installation and then every month or so.
  • Page 36: What Internet Guard Dog Does While Your Pc Is Running

    Quick Tour of Internet Guard Dog™ 4. Repeat steps 2 and 3 for each problem that you want to fix. 5. When you have finished, click the Back or the Home button to return to the Internet Guard Dog Home screen. What Internet Guard Dog does while your PC is running While you use your PC, Internet Guard Dog is on the lookout for potential...
  • Page 37: Responding To Internet Guard Dog Alert Messages

    Quick Tour of Internet Guard Dog™ Responding to Internet Guard Dog alert messages Internet Guard Dog works as you work to protect your privacy and security. When Internet Guard Dog detects a potential problem, it either handles the problem automatically or warns you with an alert message based on your Internet Guard Dog settings.
  • Page 38 Quick Tour of Internet Guard Dog™ To open Browser Buddy 1. Right-click the Internet Guard Dog icon on the Windows taskbar, then click Browser Buddy. The dialog box is displayed. Figure 3-7. Browser Buddy To add a new username and password 1.
  • Page 39: Using File Encryption

    Quick Tour of Internet Guard Dog™ The text appears in the field. (If the site that you are logging into displays your password text as a series of asterisks (*), Internet Guard Dog will display one asterisk for each character in your password.) 3.
  • Page 40 Quick Tour of Internet Guard Dog™ Internet Guard Dog...
  • Page 41: Chapter 4. Privacy Features

    Privacy Features Internet Guard Dog’s Privacy features protect browsing and personal information that you don’t want anybody to access as a result of your surfing through the Internet. What Cookie Blocker does Cookies are small files that your Web browser stores on your PC at the request of a Web server.
  • Page 42: Responding To A Cookie Blocker Alert Message

    Privacy Features Responding to a Cookie Blocker alert message If during the Interview, you set Internet Guard Dog to prompt you for action then it will display the Cookie Blocker alert message the first time a site tries to set a cookie. You can respond to the alert message in the following ways: Table 4-1.
  • Page 43: Why Should I Change My Cookie Blocker Settings

    Privacy Features Why should I change my Cookie Blocker settings? If you want a good level of privacy protection without having to see any Cookie Blocker alert messages, use the recommended settings—always accept cookies from sites that you visit directly and decide on a case-by-case basis whether to accept cookies coming from sites that you haven’t visited directly.
  • Page 44: Responding To An Identity Protector Alert Message

    Privacy Features If more than one person is using your computer, make sure that you create an Internet Guard Dog password. If the person using your computer doesn’t enter the Internet Guard Dog password, it automatically replaces any protected personal information sent to an unsecure site with the text, “xxxx.” For example, if your child tries to order the latest CD without entering your Internet Guard Dog password, it replaces your credit card number with “xxxx xxxx xxxx xxxx.”...
  • Page 45: Why Should I Change My Identity Protector Settings

    Privacy Features Why should I change my Identity Protector settings? You may want to change your settings under the following circumstances: Table 4-4. If you Use this option Are the only person using Enter all of the information that you want to your PC and you don’t prevent from going out and select Allow Always.
  • Page 46: What Web Trail Cleaner Does

    Privacy Features What Web Trail Cleaner does As you surf the Internet, your browser stores information that makes your browsing experience more satisfying. It uses the information as follows: Table 4-5. Your browser uses Cached files Speed up the display of Web page elements such as graphics.
  • Page 47: Why Should I Change My Web Trail Cleaner Settings

    Privacy Features Why should I change my Web Trail Cleaner settings? You may want to change your settings under the following circumstances: Table 4-7. If you Use this option Want to see exactly what files Prompt to Clean Up after closing Web browser. are being deleted.
  • Page 48 Privacy Features Internet Guard Dog...
  • Page 49: Chapter 5. Security Features

    Security Features Internet Guard Dog’s security features safeguard your Internet connection and protect the files on your PC from prying eyes and destructive programs. What Gatekeeper does Gatekeeper lets you control what programs on your PC can have access to your Internet connection.
  • Page 50 Security Features You can respond to the Internet access alert message in the following ways: Table 5-1. If you choose Internet Guard Dog This time only Allows the program to access the Internet this time only and warns you the next time it tries to access the Internet.
  • Page 51 Security Features You can respond to the alert message in the following ways: Table 5-2. If you choose Internet Guard Dog does this Allow always Allows the program to start the other program. Not this time Prevents the program from starting the other program just this time.
  • Page 52: Why Should I Change My Gatekeeper Settings

    Security Features Why should I change my Gatekeeper settings? The Gatekeeper settings suggested by the Interview will display the fewest number of alert messages. If you are using an older browser version or just want a higher level of security, you may want to change your settings under the following circumstances: Table 5-4.
  • Page 53: What File Guardian Does

    Security Features What File Guardian does File Guardian can protect files that contain your sensitive data from being opened, renamed, copied, moved, or deleted. For added protection, you can even encrypt files protected by File Guardian. Internet Guard Dog can also alert you if a program attempts one of the following potentially harmful activities: •...
  • Page 54 Security Features ActiveX scan alert message There are legitimate reasons for allowing an ActiveX control to read through, or scan, all of your files. For example, you can go to one site on the Web that uses an ActiveX control to look for viruses on your PC. However, if a site begins to scan your files without warning you, Internet Guard Dog gives you a chance to think about how much you trust the site.
  • Page 55 Security Features You can respond to the alert message in the following ways: Table 5-7. If you choose Internet Guard Dog Not this time Stops the ActiveX control from running this time. If you change your mind, reload the page in your browser and click Allow this time the next time Internet Guard Dog displays its ActiveX delete message.
  • Page 56: Why Should I Change My File Guardian Settings

    Security Features Why should I change my File Guardian settings? You may want to change your settings under the following circumstances: Table 5-8. If you Use this option • Want to be warned when an ActiveX control ActiveX scans my drive looks through the files on your PC.
  • Page 57: What Password Manager Does

    Security Features What Password Manager does Password Manager lets you store your various Web site login names and passwords in one secure location. When you are visiting a Web site that requires this information, you can drag it from the Browser Buddy to the form displayed in your browser.
  • Page 58 Security Features To remove a password record • In the Password Manager list, click a record to select it, then click Remove. Internet Guard Dog...
  • Page 59: Chapter 6. Mcafee Virusscan

    To start VirusScan, either • Click VirusScan from the Internet Guard Dog Home screen; or • Click Start in the Windows taskbar, point to Programs, then to McAfee VirusScan. Next, choose McAfee VirusScan Central from the list that appears.
  • Page 60: Virusscan Central Window

    • Click Scan to start the default scan task immediately, or configure a scan task that suits your needs (see Configuring VirusScan). • Click Scheduler to launch the McAfee VirusScan Scheduler. This utility enables you to configure and run unattended scan operations.
  • Page 61: Configuring Virusscan

    • Activate password protection. • Start VirusScan Scheduler. • Open the online help file. • NOTE: See the McAfee VirusScan online Help for more information and step-by-step instructions on how to use any of the features of the Classic window. Configuring VirusScan...
  • Page 62 McAfee VirusScan • Choose a volume or folder on your system or on your network that you want VirusScan to examine for viruses. Click to expand the listing for an item shown in the dialog box. Click to collapse an item. You can select hard disks, folders or files as scan targets, whether they reside on your system or on other computers on your network.
  • Page 63 McAfee VirusScan • Delete infected files automatically. Use this option to have VirusScan delete every infected file it finds immediately. Be sure to enable its reporting feature so that you have a record of which files VirusScan deleted. You will need to restore deleted files from backup copies.
  • Page 64 McAfee VirusScan You can also select the Log to file option. By default, VirusScan writes log information to the file VSCLOG.TXT in the VirusScan program directory. You can enter a different name and path in the text box provided, or click Browse to locate a suitable file elsewhere on your hard disk or on your network.
  • Page 65: Appendix A. Internet Security And Privacy

    Internet Security and Privacy This chapter provides some background information that will help you understand Internet security and privacy threats, and discusses strategies for using Guard Dog to protect yourself and your computer. Networks and the Internet A computer network links individual computers together so they can share data and resources.
  • Page 66: Why Packets

    Internet Security and Privacy Why packets? Why go through all this trouble, breaking data down into packets? The answer lies in the origins of TCP/IP. Like the Internet itself, it is a product of the Cold War. The United States Department of Defense originally developed the Internet.
  • Page 67: Privacy And Security On The Web

    Internet Security and Privacy NOTE: HTML is a set of commands designed to be interpreted by Web browsers. An HTML document consists of content (prose, graphics, video, etc.) and a series of commands that tell a Web browser how to display the content.
  • Page 68: Privacy On The Web

    Internet Security and Privacy Privacy on the Web Who is snooping? Hackers are a breed of human being that thrive on gaining illegal access to computers in order to access, steal, and sometimes corrupt data. Many hackers are quite benign—breaking into a secure system is a challenge and a thrill. But some computer hackers think that if they don’t care for someone or some organization, it is OK to break in to their computers and wreak havoc.
  • Page 69: What Can I Do To Keep My Stuff Safe

    Internet Security and Privacy What can I do to keep my stuff safe? With sniffer in place, a hacker can intercept credit card numbers and other private information by capturing data transmissions, and then using pattern-matching algorithms to filter out the valuable information. Intercepted credit card info can be sold to criminals, intent on committing fraud.
  • Page 70: How Does Encryption Work

    Internet Security and Privacy If SSL is so great, what is the problem? SSL is affected by a couple of problems. One problem is that not everyone has an SSL-enabled server or browser. Some Web administrators don’t want to use SSL because they have to pay for it, and it can also slow down server transactions.
  • Page 71: Security On The Web

    Internet Security and Privacy The simplest encryption systems use letter shifting, in which a message is encrypted by shifting every letter n letters later in the alphabet. For example, say A is changed to B, and B to C, etc. As long as the recipient knows how you shifted the letters, they can easily decrypt the message by reversing the process.
  • Page 72: Nasty Applets

    Internet Security and Privacy Java contains an internal security system that addresses security risks. ActiveX uses a different model, based on certificate authentication. Certificates contain information about who developed the ActiveX code. The idea here is that if you know who developed the code, it is safe to run it. Both security schemes offer a level of safety, but no one can yet promise that executable content is entirely safe.
  • Page 73: Are Viruses Really That Dangerous

    Internet Security and Privacy Biological viruses have proven to be tenacious— modern medicine’s success in fighting viral infection has, so far, been rather limited. Fortunately, PC viruses differ from biological viruses in that they are easier to combat, once they are identified. Are viruses really that dangerous? Bear in mind that your chances of contracting a PC virus are slim, and even more so, your chances of contracting a truly vicious virus.
  • Page 74: How Can My Pc Become Infected With A Virus

    Internet is an everyday occurrence. NOTE: Internt Guard Dog offers comes with McAfee VirusScan which is easy to use. It automatically scans your PC for signs of virus infection,...
  • Page 75 Internet Security and Privacy • First, you can provide the information yourself when you register software or respond to Internet questionnaires. • Second, when you ask to be allowed access to the electronic version of a newspaper, or use a “shopping cart” to buy products on the Web, a cookie, described in “What are cookies and how are they used?”...
  • Page 76: Sources For Internet Privacy And Security Information

    Internet Security and Privacy Some stores may use the cookie information to record each time you connect to the site, what pages you use, and whether you click any of advertiser banners. Reputable sites provide privacy information to tell you how the information that is gathered is used.
  • Page 77: More Information About Security

    Internet Security and Privacy More information about security Two good starting places for information about Web security is the on-line help for Netscape Communicator and Microsoft Internet Explorer. National Institute of Health’s Computer Security Information site Good links to many security information sites. http://www.alw.nih.gov/Security/security.html Microsoft’s Security site White papers and descriptions of Microsoft’s security efforts...
  • Page 78 Internet Security and Privacy Internet Guard Dog...
  • Page 79: Appendix B. Product Support

    Product Support BEFORE YOU CONTACT McAfee Software for technical support, locate yourself near the computer with McAfee Guard Dog installed and verify the information listed below: • Have you sent in your product registration card? • Version of Internet Guard Dog •...
  • Page 80: Technical Support

    We encourage you to make this your first stop for answers to frequently asked questions, for updates to McAfee software, and for access to McAfee news and virus information. Take advantage of the McAfee Product KnowledgeCenter—your free online product support center - 24 hours a day, 7 days a week (http://support.mcafee.com/tech_supp/pkc.asp).
  • Page 81 If the automated services do not have the answers you need, please contact McAfee at the following numbers Monday through Friday between 9:00 AM and 6:00 PM Pacific time for 30-day free support, and 24 hours a day - 7 days a week for Per Minute or Per Incident support.
  • Page 82 Product Support Internet Guard Dog...
  • Page 83 Index browser history action options, choosing in VirusScan Classic cached files ActiveX controls deleting files CheckUp protection against damage by using scanning hard drives configuration viruses and of VirusScan Classic alert messages Cookie Blocker audible, sounding alert message Cookie Blocker Browser Buddy and File Guardian described...
  • Page 84 Index e-mail Gatekeeper attachments and viruses alert messages messages and viruses any credit card number goes out alert message encrypting files described File Guardian and harmful site alert message using shortcut menu Internet access alert message extensions, use of to identify scan targets program starts up another program alert message settings...
  • Page 85 Index history files login names hoax viruses Home screen items on macro viruses using managing Web passwords Master Boot Record viruses menu, shortcut icon for Guard Dog messages See alert messages Identity Protector modem alert message multiple users and passwords described settings indirect sites...
  • Page 86 Index passwords activating and deactivating quarantine folder, use of to isolate infected adding record to Password Manager files adding with Browser Buddy question mark button Browser Buddy and deleting Password Manager record dragging from Browser Buddy report file editing Password Manager record VSCLOG.TXT as forgotten protecting Web site...
  • Page 87 Index shareware and viruses shortcut menu viruses Start menu ActiveX and using to start VirusScan Classic e-mail attachments and e-mail messages and file and program hoax targets for scanning how dangerous? adding how spread task Java and action options, configuring macro adding scan targets to threats...
  • Page 88 Index Windows protecting password file taskbar using help Windows Start menu, using to start VirusScan Classic. Internet Guard Dog...

This manual is also suitable for:

Internet guard dog v3.0

Table of Contents