Table of Contents

Advertisement

Quick Links

P R O D U C T G U I D E
McAfee Inter net Secur ity 5.0
V E R S I O N 5 . 0

Advertisement

Table of Contents
loading

Summary of Contents for McAfee INTERNET SECURITY 5.0

  • Page 1 P R O D U C T G U I D E McAfee Inter net Secur ity 5.0 V E R S I O N 5 . 0...
  • Page 2 KATAKANA), M AND DESIGN, MAGIC SOLUTIONS, MAGIC SOLUTIONS (IN KATAKANA), MAGIC UNIVERSITY, MAGICSPY, MAGICTREE, MCAFEE, MCAFEE (IN KATAKANA), MCAFEE AND DESIGN, MULTIMEDIA CLOAKING, NET TOOLS, NET TOOLS (IN KATAKANA), NETCRYPTO, NETOCTUPUS, NETSCAN, NETSHIELD, NETSTALKER, NETWORK ASSOCIATES, NETXRAY, NOTESGUARD, NUTS & BOLTS, OIL CHANGE, PC...
  • Page 3 License Grant. Subject to the payment of the applicable license fees, and subject to the terms and conditions of this Agreement, McAfee hereby grants to you a non-exclusive, non-transferable right to use one copy of the specified version of the Software and the accompanying documentation (the "Documentation"). You may install one copy of the Software on one computer, workstation, personal digital assistant, pager, "smart phone"...
  • Page 4 Ownership Rights. The Software is protected by United States copyright laws and international treaty provisions. McAfee and its suppliers own and retain all right, title and interest in and to the Software, including all copyrights, patents, trade secret rights, trademarks and other intellectual property rights therein. Your possession, installation, or use of the Software does not transfer to you any title to the intellectual property in the Software, and you will not acquire any rights to the Software except as expressly set forth in this Agreement.
  • Page 5 McAfee has no further responsibility after the initial sale to you within the original country of sale. Product Guide...
  • Page 6 McAfee. No provision hereof shall be deemed waived unless such waiver shall be in writing and signed by McAfee or a duly authorized representative of McAfee. If any provision of this Agreement is held invalid, the remainder of this Agreement shall continue in full force and effect. The parties confirm that it is their wish that this Agreement has been written in the English language only.
  • Page 7 License Grant. Subject to the payment of the applicable license fees, and subject to the terms and conditions of this Agreement, McAfee hereby grants to you a non-exclusive, non-transferable right to use one copy of the specified version of the Software and the accompanying documentation (the "Documentation"). You may install one copy of the Software on one computer, workstation, personal digital assistant, pager, "smart phone"...
  • Page 8 Ownership Rights. The Software is protected by United States copyright laws and international treaty provisions. McAfee and its suppliers own and retain all right, title and interest in and to the Software, including all copyrights, patents, trade secret rights, trademarks and other intellectual property rights therein. Your possession, installation, or use of the Software does not transfer to you any title to the intellectual property in the Software, and you will not acquire any rights to the Software except as expressly set forth in this Agreement.
  • Page 9 Customer Remedies. McAfee's and its suppliers' entire liability and your exclusive remedy for any breach of the foregoing warranty shall be, at McAfee's option, either (i) return of the purchase price paid for the license, if any, or (ii) replacement of the defective media in which the Software is contained.
  • Page 10 McAfee has no further responsibility after the initial sale to you within the original country of sale.
  • Page 11: Table Of Contents

    Introduction ............15 What’s included with McAfee Internet Security? ....... . 16 What’s new in this release? .
  • Page 12 5 McAfee Firewall ........
  • Page 13 McAfee Firewall’s Intrusion Detection System ........93...
  • Page 14 Index ..........123 McAfee Internet Security 5.0...
  • Page 15: Welcome To Mcafee Internet Security 5.0

    PC. McAfee Internet Security provides powerful protection for today's Internet users. Introduction...
  • Page 16: What's Included With Mcafee Internet Security

    Activity Logs: Activity Logs allow you to view a list of all the interactions that you and other profiled users of your computer had with McAfee Internet Security, including the date and time of the activity. You can print, save or clear this list.
  • Page 17: What's New In This Release

    Welcome to McAfee Internet Security 5.0 What’s new in this release? This release of McAfee Internet Security includes the following new features and functional enhancements. Includes VirusScan Home Edition 7 - Includes the latest version of the award winning VirusScan anti-virus software to protect your system from viruses, Trojans, Internet worms, harmful scripts, and other malware.
  • Page 18: About This Manual

    This manual provides the basic information you need to install, set up and get started with McAfee Internet Security 5.0. More detailed information about how to perform tasks within McAfee Internet Security is provided via online Help. You can get Help while working with the different windows and dialog boxes.
  • Page 19: Mcafee Internet Security Features

    Welcome to McAfee Internet Security 5.0 McAfee Internet Security features This section briefly describes other features of McAfee Internet Security that protect you from the most common Internet threats. Only the designated administrator or a user with administrative rights can...
  • Page 20 Easy-to-use, yet highly secure, McAfee Firewall safeguards your PC's connection to the Internet whether you connect via DSL, cable modem, or dial-up. McAfee Firewall gives you the powerful tools you need to control the communications into and out of your PC.
  • Page 21: Installing Mcafee Internet Security

    Before you begin McAfee distributes McAfee Internet Security 5.0 in two formats: As an archived file that you can download from the McAfee web site. On CD-ROM. Although the method you use to transfer files from an archive obtained via...
  • Page 22 Palm OS. Windows CE or Pocket PC System requirements McAfee VirusScan for Windows CE or Pocket PC will install and run on any IBM PC or PC-compatible computer equipped with ActiveSync 3.0 or later.
  • Page 23: Installation Steps

    Step 3. Otherwise, skip to Step 4. Use the following procedure if the Autorun installation menu does not display, or, if you obtained your software via download at a McAfee web site. From the Windows Start menu, select Run.
  • Page 24: Troubleshooting Installation Problems

    If your computer does not have the required fonts to view the End User’s License Agreement (EULA), then you may locate the appropriate EULA on your McAfee software installation CD. You must read and agree to the terms of the agreement to complete your installation.
  • Page 25: Removing Or Modifying Your Mcafee Internet Security Installation

    Close Disk Defragmenter when it has finished defragmenting your disk. Removing or modifying your McAfee Internet Security installation If your computer’s operating system is... Windows 2000 Professional...
  • Page 26: Important Information About Windows Xp Migration

    Windows XP. You will be made aware of this situation as you make your first attempt to start a McAfee product (after migration) - you will be instructed to reinstall the product. As such, you will need to uninstall all McAfee products and reinstall using your installation CD or the software obtained from McAfee via download.
  • Page 27: Getting Started With Mcafee Internet Security 5.0

    Getting Started with McAfee Internet Security 5.0 McAfee Internet Security is a simple program to use. In fact, this one chapter covers the main things you need to know about using McAfee Internet Security. You begin with answering a few questions via the Interview so that McAfee Internet Security can effectively use its feature to protect you from Internet threats.
  • Page 28: The Title Bar And Tool Bar

    The tool bar displays four browser-like buttons that are common to all screens. Back. Click Back to return to the last screen viewed. Home. Click Home to go to the McAfee Internet Security Home page from any screen. Next. In conjunction with the Back button, use Next to go to any previously viewed screen during your current session.
  • Page 29: About Tasks

    McAfee Firewall on page About Tasks The Task pane displays links that allow you to start McAfee Internet Security’s Tasks. Depending upon your configuration, the Task pane displays McAfee, links that allow you start the Home page for any other current McAfee product that you have installed in your computer.
  • Page 30 User Preferences: The User Preferences tab on the Change User Settings property sheet enables all users to configure how McAfee Internet Security responds to particular events. Here you configure how McAfee Internet Security starts, how it should alert you, and manage user passwords.
  • Page 31 This page of the Change User Settings property sheet displays for restricted user profiles - only. In other words, this page does not display if the user possesses a self-administrating profile or is the McAfee Internet Security Administrator. Here you will enable or disable parental controls, and set the content ratings for the selected user.
  • Page 32 For step-by-step instructions on working with any of the report logs, see McAfee Internet Security online Help. Set Startup Options This task allows you to start and stop McAfee Internet Security manually and to configure McAfee Internet Security to start as Windows starts. Configuration Assistant Select this task to start the McAfee Internet Security Configuration Assistant.
  • Page 33: About The Mcafee List

    Visual Trace (You must install McAfee Firewall to see this link). About the McAfee list The McAfee list displays links to start the Home page to any other supported McAfee product. With this release of McAfee Internet Security 5.0, click the Firewall and VirusScan Home Edition links to start the respective program.
  • Page 34: How To Use The Mcafee Internet Security Configuration Assistant

    The McAfee Internet Security interview asks you to enter the personal and financial information that you want to protect. All the information you enter into McAfee Internet Security is stored in an encrypted form on your hard disk – it is never sent to McAfee Software.
  • Page 35: How The Mcafee Internet Security Administrator Works

    Internet. Creating the McAfee Internet Security Administrator account can only be done in the Interview feature of McAfee Internet Security. And only the designated Administrator can access and change information and protection settings of the computer.
  • Page 36: The Administrator's Password

    Please do not lose or forget the Administrator's password. As described above, you must use the Administrator's profile to effectively use and configure McAfee Internet Security. Due to the high security risk it poses to you, we cannot describe the solution to recovering a lost or forgotten Administrator profile password in this Product Guide, via online Help, or at our Internet web site.
  • Page 37: Using Mcafee Virusscan

    Getting Started with McAfee Internet Security 5.0 To customize protection settings for another user, click the Change user settings task displayed on the McAfee Internet Security Home page, the User Setup screen is displayed. You can add, edit or delete a user’s profile from this screen.
  • Page 38: Keep Your Program Up-To-Date

    To ensure the highest level of protection, you should always obtain the latest version of your McAfee product. McAfee’s Instant Updater component allows you to obtain and apply updates to your McAfee products while connected to the Internet. To learn more about Instant Updating McAfee Internet Security on page 101.
  • Page 39: What Mcafee Internet Security Does While Your Computer Is Running

    What Mcafee Internet Security does while your computer is running While you use your PC, McAfee Internet Security is on the lookout for potential privacy and security problems and takes action when it finds a problem. McAfee Internet Security uses the settings stored in Protection Settings to determine what to monitor and how to react.
  • Page 40 Web site’s login form. The text appears in the field. (If the site that you are logging into displays your password text as a series of asterisks (*), McAfee Internet Security will display one asterisk for each character in your password.) Continue logging in as usual to the Web site.
  • Page 41: Using File Encryption

    You must decode or decrypt the file before you can use it. The file encryption in McAfee Internet Security is designed so that you can easily encrypt or decrypt all of the files that you designate for encryption in File Guardian.
  • Page 42: Security Features

    Each time you start a program that attempts to use your Internet connection, McAfee Internet Security checks to see if that program is in the list of programs allowed to access the Internet. If the program is not in the list, McAfee Internet Security displays an alert message to tell you that the program is trying to connect to the Internet and asks you how to deal with the program.
  • Page 43 Internet Security to warn you the next time the program tries to access the Internet. Harmful Site Alert Message Before you can connect to a harmful site, McAfee Internet Security displays an alert message, “Your browser is visiting Sitename, a Web site that may harm your PC or data.”...
  • Page 44: Why Should I Change My Gatekeeper Settings

    Getting Started with McAfee Internet Security 5.0 If you choose ... Then McAfee Internet Security ... Not this time prevents the program from starting the other program just this time. This time only allows the program to start the other program just this time.
  • Page 45: What File Guardian Does

    An ActiveX control attempts to scan files on your hard drive. A program attempts to access your system password files. When McAfee Internet Security displays an alert message, you can decide if the program should be allowed to continue the operation or not.
  • Page 46 Web site, the control may need to delete files that it created for temporary use. However, if a site doesn’t warn you and begins to delete files, McAfee Internet Security gives you a chance to see what file is being deleted and think about how much you trust the site.
  • Page 47 (or a Zip or Jaz disk). When McAfee Internet Security detects a format command, it displays an alert message that tells you which program started the format command.
  • Page 48: What Password Manager Does

    Edit a record View a list of stored login names and passwords Whether you wish to add, edit, or remove a password or record, the McAfee Internet Security Inductive User Interface guides you through the steps. McAfee Internet Security 5.0...
  • Page 49: Privacy Features

    Blocks cookies when indirect sites try to set a cookie. Responding to a Cookie Blocker Alert Message If during the Interview, you set McAfee Internet Security to prompt you for action then it will display the Cookie Blocker alert message the first time a site tries to set a cookie.
  • Page 50 Each time you visit a site that appears in either the Allowed or Rejected list, McAfee Internet Security adds the number of cookies accepted or rejected to the list. You can see the totals for a Web site in the Browser Buddy.
  • Page 51: What Identity Protector Does

    “xxxx.” For example, if your child tries to order an item online without entering your McAfee Internet Security password, it replaces your credit card number with xxxx xxxx xxxx.”...
  • Page 52: Responding To An Identity Protector Alert Message

    Display an alert message when any application tries to send the information over the Internet to an unsecure site. This is the response that McAfee Internet Security sets up when you add information to protect in the McAfee Internet Security Interview.
  • Page 53: What Web Trail Cleaner Does

    Getting Started with McAfee Internet Security 5.0 A Note About Passwords When McAfee Internet Security asks for your password and you enter it, the password stays in effect until one of the following events takes place. For all Windows operating systems: You log out of McAfee Internet Security.
  • Page 54 If you later want to delete the files that you’ve left behind, run the McAfee Internet Security’s Security Check. Why should I change my Web Trail Cleaner settings? You may want to change your settings under the following circumstances: If you ...
  • Page 55 Getting Started with McAfee Internet Security 5.0 If you have Referer Filter selected in the Security Settings of McAfee Internet Security, it automatically removes search information before you go to another Web site. McAfee Internet Security does not display an alert message for this feature, but you can see the number of times Referer Filter blocks this information in the Browser Buddy.
  • Page 56 Getting Started with McAfee Internet Security 5.0 McAfee Internet Security 5.0...
  • Page 57: Mcafee Virusscan Home Edition

    McAfee VirusScan Home Edition Stop viruses and keep your PC safe with McAfee VirusScan! When you're surfing the Internet, there's more to worry about than just viruses. You need to be able to control the communications into and out of your PC to ensure that your computer is safe.
  • Page 58 Microsoft Word, Excel, and PowerPoint (2000+) in the event that VShield background scanning must be disabled. Usability enhancements: McAfee VirusScan includes many user interface enhancements to make it easier than ever to keep your computer and electronic files virus free.
  • Page 59: What Comes With Mcafee Virusscan

    Automatic Protection Settings status and version information about your virus definitions. The Home page also informs you if an update to McAfee VirusScan is available for download and the total number of scan operations performed.
  • Page 60 McAfee Instant Updater. Enables your computer to automatically communicate with McAfee while you are connected to the internet and inquire of the availability of product updates, updates to anti-virus signature files, and updates to the VirusScan scan engine. You will also use this feature to register your McAfee product.
  • Page 61 McAfee VirusScan Home Edition SCANPM.EXE, a scanner for 16-bit and 32-bit environments. This scanner provides you with a full set of scanning options for 16-bit and 32-bit protected-mode DOS environments. It also includes support for extended memory and flexible memory allocations.
  • Page 62: Getting Started

    McAfee VirusScan Home Edition Getting Started The McAfee VirusScan Home page is your central entry point to access and use all of McAfee VirusScan’s tasks, wizards, and components. This screen displays three regions that provide you with dynamic information about current status and navigation links to all tasks.
  • Page 63: Status Information

    McAfee VirusScan Home Edition Home. Click Home to go to the McAfee VirusScan Home page from any screen. Next. In conjunction with the Back button, use Next to go to any previously viewed screen during your current session. Help. Click Help to view its submenu. The Help submenu may include any of the following items.
  • Page 64: The Task Pane

    McAfee VirusScan Home Edition The Task pane The Task pane displays links that allow you to start McAfee VirusScan’s Tasks and Advanced Tasks. Depending upon your configuration, the Task pane displays McAfee, links that allow you start the Home page for any other current McAfee product that you have installed in your computer.
  • Page 65: Other Mcafee Virusscan Features

    McAfee VirusScan product. Select this advanced task to check for updates to McAfee VirusScan. About the McAfee list The McAfee list displays links to start the Home page to any other supported McAfee product. Other McAfee VirusScan features...
  • Page 66: About Vshield Scanner

    Download and Internet scanners included with previous versions of McAfee VirusScan. E-mail Scan The E-mail scanner monitors e-mail messages and message attachments that you receive via interoffice e-mail systems, and via the Internet. It scans your Microsoft Exchange or Outlook mailbox systems. McAfee Internet Security 5.0...
  • Page 67: How To Start And Stop Vshield Scanner

    If you recognize the script, you can allow it to run. If you allow a script to run, and indicate that you recognize the script, McAfee VirusScan adds the script to its records of trusted scripts. If there are scripts that you frequently use, or want to allow to run, you can add scripts to a trusted database directly from ™...
  • Page 68 VShield Scanner stops. By default, setup configures McAfee VirusScan to start as Windows starts. If you do not want McAfee VirusScan to start as Windows starts, clear the check box next to Load on startup. Click Apply to save your settings.
  • Page 69: Using Quarantine

    VirusScan does not now detect. If you have found what you suspect to be a new or unidentified virus, send the infected file to McAfee Labs Anti-Virus Emergency Response Team for analysis, using WebImmune. For more information about WebImmune, please visit www.webimmune.net.
  • Page 70: Safe & Sound

    (c:\) drive. If your files become corrupted due to a virus, or your system crashes, or if you lose your files, McAfee’s Safe & Sound utility provides you the ability to recover files using the Safe & Sound Windows or DOS recover utility.
  • Page 71: Safe & Sound Configuration

    McAfee VirusScan Home Edition Safe & Sound automatically selects files that are typically important to include in a backup set. However, you can select other files or types of files to include in your backup set. How often should you or safe & sound make these backups? The more recent your backup set, the happier you’ll be if your PC does...
  • Page 72: Emergency Disk Creation

    The special .DAT files have these names: EMCLEAN.DAT EMNAMES.DAT EMSCAN.DAT McAfee periodically updates these .DAT files to detect new boot-sector viruses. You can download updated Emergency .DAT files from this location: http://www.mcafeeb2b.com/naicommon/avert/avert-research-center/tools.asp McAfee recommends that you download new Emergency .DAT files directly to a newly formatted floppy disk in order to reduce the risk of infection.
  • Page 73: Using Virusscan With A Wireless Device

    How VirusScan protects your wireless device McAfee VirusScan is an application designed to protect your data by scanning the files on your wireless device every time a data exchange or update is performed with your computer.
  • Page 74 McAfee VirusScan Home Edition Table 4-1. Examples of wireless devices that McAfee VirusScan supports Operating System Wireless Device Manufacturer Pocket PC Jornada 540 Hewlett-Packard Jornada 680 Jornada 720 Pocket PC E125 Cassiopeia EM500 Windows CE PenCentra 130 Fujitso Hitachi Windows CE...
  • Page 75: Mcafee Firewall

    With intrusion detection, color coded security alerts, customizable audible alerts, detailed logging, and an application scan for Internet enabled applications, McAfee Firewall gives you the power you need to control the communications into and out of your PC, ensuring that your online experience is as safe as it is enjoyable.
  • Page 76: How Mcafee Firewall Works

    Setup During the installation process, the Configuration Assistant prompts you with basic questions to set up McAfee Firewall to do specific tasks – according to your needs (e.g. allow sharing of files or not). Operation McAfee Firewall filters traffic at the devices that your system uses - network cards and modems.
  • Page 77 McAfee Firewall McAfee Firewall protects your computer at the network level. It acts as a gatekeeper, checking every data packet going in or out of your PC. It allows only what you tell it to allow. McAfee Firewall has been designed to be easy to use, while providing superior protection.
  • Page 78: Getting Started With Mcafee Firewall

    IP networks are the most common. How can I still be harassed, even with McAfee Firewall? Many people use McAfee Firewall to block the “nukes” that cause their IRC connections to be broken. While McAfee Firewall blocks the nukes, there are other ways that attackers can still cause the connections to be broken: Server-side nuking.
  • Page 79: The Configuration Assistant

    McAfee Firewall Previous versions of McAfee Firewall did not allow you to run the Configuration Assistant more than once. However, McAfee Firewall 4.0 allows you to run the Configuration Assistant with an easily accessible link on the McAfee Firewall Home page.
  • Page 80: Startup Options

    Click Next. Startup Options This screen allows you to choose how you want McAfee Firewall to respond as you start your computer. For your convenience, recommended Startup Load Options have been pre-selected for you.
  • Page 81 Internet browsers, Internet e-mail programs, and ftp (file transfer protocol) clients. On this screen, you will identify programs that you will allow to access the Internet through McAfee Firewall. To allow specific programs to access the Internet, do the following: From the list of applications displayed on this, check the check box corresponding to each program you will allow access to the Internet.
  • Page 82: The Mcafee Firewall Home Page

    McAfee Firewall The McAfee Firewall Home page The McAfee Firewall main window is your central entry point to all of McAfee Firewall’s Tasks, Advanced Tasks, and shared features. The McAfee Firewall interface displays three regions common to all of McAfee Firewall’s screens.
  • Page 83 Firewall Status: Running or Stopped. Click the link below the status to start or stop McAfee Firewall. Home page notification. If there is an update to your version of McAfee Firewall available for download, select this task. The number of programs currently communicating. If you want to identify the program’s communication, select this task to view your...
  • Page 84 The Task pane displays links that allow you to start McAfee Firewall’s Tasks and Advanced Tasks. Depending upon your configuration, the Task pane displays a McAfee list, links that allow you start the Home page for any other current McAfee product installed in your computer.
  • Page 85 Other Tasks: Select this task to navigate to a screen that allows you to start McAfee Firewall’s shared features About the McAfee list The McAfee list displays links to start the Home page to any other supported McAfee product. Product Guide...
  • Page 86: Other Mcafee Firewall Features

    The McAfee Firewall Settings Security Check flags and suggests changes to help you keep your system set to optimal security. If Security Check detects an issue, click Fix and McAfee Firewall helps you analyze and correct potential problems. Home networking wizard Helps make setting up protections for your PCs sharing an Internet connection a breeze, providing helpful wizards to walk you through the process.
  • Page 87: Mcafee Firewall Configurations

    ENTER. Internet Explorer will attempt to connect to that URL over the Internet. The first time you do this, McAfee Firewall prompts if you “trust” Internet Explorer. If you say “Yes,” McAfee Firewall notes Internet Explorer is allowed and whenever you use Internet Explorer in the future, McAfee Firewall will allow its traffic.
  • Page 88: Program Configuration

    During your first attempt to start McAfee Firewall, the Configuration Assistant asked you to identify programs that you want to allow to communicate. At such time, McAfee Firewall created a default set of communication rules for the programs (applications); designated as allowed to communicate.
  • Page 89 Remove. Click Apply. How to customize filtering rules for a specific program For all programs designated as “filter,” McAfee Firewall provides power users with the flexibility to create a set of custom filtering rules for each filtered program.
  • Page 90 From the list of primary functions displayed on the Customize Filtering Rules dialog, you can choose one of the following: Table 5-4. Primary Functions You can choose to... by... Allow communication... protocol local port remote port Block communication... IP address domain name direction McAfee Internet Security 5.0...
  • Page 91: System Configuration

    System configuration Your computer’s operating system performs many types of network communication without reporting directly to you. McAfee Firewall lets you explicitly allow or block different system functions. Settings may be different for each network device, since a computer, for example, can be connected to an internal network as well as having a dial-up connection to the Internet.
  • Page 92 This should only be altered by the administrator. Other Protocols: Blocked If you are on an IPX network, you should allow “non-IP protocols”. If you use PPTP, you should allow “other IP protocols”. Ask your network administrator before making any change here. McAfee Internet Security 5.0...
  • Page 93: Mcafee Firewall's Intrusion Detection System

    McAfee Firewall’s IDS feature looks for specific traffic patterns used by attackers. McAfee Firewall checks each packet that your machine receives to detect suspicious or known attack traffic. For example, if McAfee Firewall sees ICMP packets, it analyzes those packets for suspicious traffic patterns by comparing the ICMP traffic against known attack patterns.
  • Page 94: Common Attacks Recognized By Ids

    McAfee Firewall Common attacks recognized by IDS The following table lists attacks recognized by McAfee Firewall’s IDS, a description of each attack, and the risk factor assigned to each attack. Attack Description Risk Factor 1234 Also known as the Flushot attack, an attacker sends an oversize ping Medium packet that networking software could not handle.
  • Page 95 McAfee Firewall Attack Description Risk Factor Newtear A Denial of Service (DoS) attack that usually causes computers with a High Windows NT-based operating system to crash. Although the attack is not usually harmful to the computer itself, data from running applications will most certainly be lost.
  • Page 96 Machine is inaccessible via TCP/IP. Occurs when machine is put to sleep and then awakened. Make sure that “Load Only When Needed” is not checked in the TCP/IP control panel. Then TCP/IP is loaded all the time, allowing McAfee Firewall to function while the machine is asleep. Winnuke...
  • Page 97: Mcafee Internet Security's Shared Features

    Remove deleted and sent messages from a Microsoft supported e-mail client (i.e.: Outlook, Outlook Express). Delete Most Recently Used shortcuts. Use McAfee Shredder to securely shred the items you want to remove from your computer. How QuickClean Lite works First, you select the types of files you wish to remove from your computer. A wizard guides you through this process.
  • Page 98 Start QuickClean Lite. From the Windows task bar click the Start button, point to Programs > McAfee > McAfee Shared Features and click QuickClean Lite. If you need help... For additional information about using QuickClean Lite refer to online Help.
  • Page 99: Mcafee Shredder

    You can shred files using drag and drop, which is a fast way if all the files are centrally located. If the files are in several places, you can shred them by starting McAfee Shredder and selecting the files to erase. A wizard guides you through the process.
  • Page 100 McAfee Internet Security’s Shared Features McAfee Shredder allows you to shred files on your PC’s Recycle Bin, Temporary Internet, as well as Web site history folder. You can also specify the number of shredding passes (1-99) and can now have the option to shred an entire drive.
  • Page 101: Updating Mcafee Internet Security

    To ensure the highest level of protection, you should always obtain the latest version of your McAfee product. Updating your software is simple using McAfee's Instant Updater. It is a seamless process and requires minimal interaction on your part.
  • Page 102 Home page query Related to Instant Updater is Home page query. This feature allows to configure your McAfee product’s home page to display a message when an update is available. After you install your McAfee software, Home-page query “on” is the default setting.
  • Page 103: A How To Contact Mcafee

    Phone support information can also be obtained from our self-help Web site at: http://www.mcafeehelp.com. BEFORE YOU CONTACT McAfee Software for technical support, locate yourself near the computer with the McAfee product installed and verify the information listed below: Version number of your McAfee software From the McAfee Internet Security Home page select Help >...
  • Page 104: Virus Definition Renewal

    McAfee VirusScan includes twelve (12) months of free virus protection updates obtained using Instant Updater. Renewal subscriptions are available at a cost of $9.95 per year at the www.McAfee-at-home.com Buy page. Please note that pricing is subject to change and we suggest that you refer to www.McAfee-at-home.com for the latest price quote.
  • Page 105: B Internet Security And Privacy

    This chapter provides some background information that will help you understand Internet security and privacy threats, and discusses strategies for using McAfee Internet Security to protect yourself and your computer. Networks and the Internet A computer network links individual computers together so they can share data and resources.
  • Page 106: Why Packets

    HTML is a set of commands designed to be interpreted by Web browsers. An HTML document consists of content (prose, graphics, video, etc.) and a series of commands that tell a Web browser how to display the content. McAfee Internet Security 5.0...
  • Page 107: About Privacy And Security On The Web

    Internet Security and Privacy About Privacy and Security on the Web Before the advent of the Web, Internet security usually posed a problem only for system administrators trying to keep meddlesome hackers away from their systems. When the Web arrived, the popularity of the Internet skyrocketed. Almost overnight, people began doing all sorts of potentially sensitive activities over the Internet, including: banking and stock transactions;...
  • Page 108: Snooping And Sniffing

    Microsoft and Netscape, and incorporated in their browsers. An icon in the browser changes to indicate that SSL is active. When you make a transaction with SSL active, you can be fairly comfortable that the transaction is safe. McAfee Internet Security 5.0...
  • Page 109 For more information, see How can I tell if a Web site is secure? McAfee Internet Security’s Security Check lets you know if your Web browser is up-to-date. The latest browser versions usually offer an enhanced degree of security.
  • Page 110 Secure Sockets Layer (SSL), which ensures data transmission privacy, you should turn on this option to facilitate secure data transmission. McAfee Internet Security’s Security Check automatically checks your browser’s security level, and lets you know if you need to change it.
  • Page 111: Security On The Web

    Can I prevent programs from accessing the Internet? You can use McAfee Internet Security to specify the applications that are allowed to access the Internet from your computer. Obviously, your default Internet browser is one of these applications.
  • Page 112: Computer Viruses And The Web

    All disks and drives have a boot sector, even if they aren’t “bootable.” A boot virus infects the boot sector of floppy disks and hard drives, and are activated when you access or boot from an afflicted disk. McAfee Internet Security 5.0...
  • Page 113 PC when you retrieve the message) can contain viruses. (If E-mail file access is turned on in Virus Sentry, McAfee Internet Security automatically scans e-mail attachments before you open them.) How can my PC become infected with a virus?
  • Page 114: Frequently Asked Questions About Internet Privacy

    Although Java and ActiveX are not, strictly speaking, viruses (i.e., it can’t spread and replicate), they can still harm your PC. McAfee Internet Security’s default settings allow it to monitor all Java and ActiveX activity on your PC, and warn you before something potentially dangerous occurs.
  • Page 115 Internet Security and Privacy Information about the items you add to the shopping basket is stored in a cookie on your computer because the Internet browser cannot retain information that you entered in one Internet page when you switch to another Internet page.
  • Page 116 Internet Security and Privacy McAfee Internet Security 5.0...
  • Page 117: C Your Mcafee Internet Security To-Do List

    The purpose of this section is to guide you through the customization process. Although each user or family member may have their own personal settings, it is the McAfee Internet Security Administrator that controls the user’s access and safely while travel the Internet.
  • Page 118 Your McAfee Internet Security To-do List Conversely, cookies can record “what you did” on a particular Web site. For example, you visit one of the major search engine’s Web site and shop for an automobile. You revisit the same Web site a few days later and shop for an automobile again.
  • Page 119 Your McAfee Internet Security To-do List Improve your Internet browsing experience by preventing ads and pop-up windows from displaying. Shield younger family members from distasteful or undesirable content. Users of the Internet, at all age levels can exposed to inappropriate Web site content.
  • Page 120: Virus Detection And Prevention Tips

    Your McAfee Internet Security To-do List Virus Detection and Prevention Tips Although far from harmless, most viruses that infect your personal computer or laptop will not destroy data, play pranks, or render your computer unusable. Even the comparatively rare viruses that do carry a destructive payload usually produce their nasty effects in response to a trigger event.
  • Page 121: Use A Firewall

    Your McAfee Internet Security To-do List Update your anti-virus software regularly. These updates should be at the least the product's virus signature files (DATs). You may also need to update the scanning engine as well. Back up your files on a regular basis. If a virus destroys your files, at least you can replace them with your back-up copy.
  • Page 122: Tips To Maintaining Your Computer And Its Software

    Your McAfee Internet Security To-do List If you allow your computer to run 24 hours per day, then configure your Firewall to block communication while you are away from the desk. Check for an update your software frequently, and configure it to notify you if there is an update available.
  • Page 123: Index

    Index Numerics Web trail cleaner Authentication 1234 Attack Automatic Protection Settings Start and Stop Autorun About Advanced tasks McAfee list Back orifice Tasks Bonk ActiveX Boot virus Applets Bootable CD discussed BOOTSCAN.EXE Activity Logs Browser Buddy Activity logs add a new user name and password...
  • Page 124 Internet traffic settings File Intrusion Detection How to Configure IP Spoofing File Guardian Filtering protocols Firewall (discussed) Java Firewall Communication Alert Messages applets Flood blocking a TCP connection discussed Flushot Jolt Forgotten Administrator password Jolt 2 McAfee Internet Security 5.0...
  • Page 125 Manage passwords Perform a security check Master Boot Record virus Ping flood McAfee Firewall Ping of death McAfee Guardian Pocket PC McAfee Guardian shortcut menu Port scanning McAfee Instant Updater Privacy McAfee list Cookie Blocker McAfee QuickClean Lite Search Filter...
  • Page 126 Scan for viruses now Set alert preferences Set Startup Options Set startup options Set up Home Networking View Activity Log View network activity TCP/IP Teardrop Technical Support The Task pane Title bar Token Ring Tool bar UDP flood Uninstallation McAfee Internet Security 5.0...
  • Page 127 Index Product Guide...
  • Page 128 For more information on products, worldwide services, and support, contact your authorized McAfee sales representative or visit us at: Network Associates 13465 Midway Road Dallas, TX 75244 (972) 308-9960 www.mcafee-at-home.com N A I - 5 9 2 - 0 0 1 0 - 1...

Table of Contents