Starting additional protection ................33 Setting up virus protection ..................37 Scanning your computer ..................53 Working with scan results..................57 McAfee Personal Firewall ....................61 Personal Firewall features..................62 Starting Firewall ...................... 65 Working with alerts ....................67 Managing informational alerts................69 Configuring Firewall protection................
Page 4
Contents Reference......................... 168 Glossary About McAfee Copyright ....................... 183 License ........................184 Customer and Technical Support.................. 185 Using McAfee Virtual Technician ................ 186 Support and Downloads ..................186 Index...
H A P T E R Introduction McAfee VirusScan Plus offers proactive PC security to prevent malicious attacks, so you can protect what you value as well as surf, search, and download files online with confidence. McAfee SiteAdvisor’s Web safety ratings, help you avoid unsafe Web sites.
H A P T E R McAfee SecurityCenter McAfee SecurityCenter allows you to monitor your computer's security status, know instantly whether your computer's virus, spyware, e-mail, and firewall protection services are up-to-date, and act on potential security vulnerabilities. It provides the navigational tools and controls you need to coordinate and manage all areas of your computer's protection.
Automated updates and upgrades Automatically download and install updates for your registered programs. When a new version of a registered McAfee program is available, you get it at no charge while your subscription is valid, ensuring that you always have up-to-date protection.
Understanding protection status (page 8) (page 9). Then, you can Understanding protection categories review your McAfee account information and verifying the validity of your subscription. In this chapter Understanding protection status.......8 Understanding protection categories......9 Understanding protection services ......10...
McAfee VirusScan Plus Understanding protection status Your computer's protection status is shown in the protection status area on the SecurityCenter Home pane. It indicates whether your computer is fully protected against the latest security threats and can be influenced by things like external security attacks, other security programs, and programs that access the Internet.
Chapter 3 Introduction Understanding protection categories SecurityCenter's protection services are divided into four categories: Computer & Files, Internet & Network, E-mail & IM, and Parental Controls. These categories help you to browse and configure the security services protecting your computer. You click a category name to configure its protection services and view any security problems detected for those services.
Understanding protection services Protection services are the core SecurityCenter components that you configure to protect your computer. Protection services directly correspond to McAfee programs. For example, when you install VirusScan, the following protection services become available: Virus Protection, PUP Protection, System Monitors, and Windows Protection.
Note: If you installed your McAfee programs from a CD, you must register them on the McAfee Web site to set up or update your McAfee account. Only then are you entitled to regular, automatic program updates.
You can also disable automatic updating. Note: If you installed your McAfee programs from a CD, you cannot receive regular, automatic updates for those programs unless you register them on the McAfee Web site.
Page 16
McAfee VirusScan Plus Configure automatic updates By default, SecurityCenter automatically checks for and installs updates every four hours when your computer is connected to the Internet. If you want to change this default behavior, you can configure SecurityCenter to automatically download updates and then notify you when the updates are ready to be installed or to notify you before downloading the updates.
Page 17
Chapter 4 Introduction 1. Under Common Tasks, click Home. 2. On the right pane, under SecurityCenter Information, click Configure. On the SecurityCenter Configuration pane, under Automatic updates are enabled, click Off. Tip: You enable automatic updates by clicking the button or by clearing Disable automatic updating and let me manually check for updates...
If you need help diagnosing your protection problems, you can run McAfee Virtual Technician. For more information about McAfee Virtual Technician, see the McAfee Virtual Technician help. In this chapter Fixing protection problems ........18...
Update your protection manually. (DATs) are out-of-date. For more information, see the VirusScan help. A program is not installed. Install the program from the McAfee Web site or CD. A program is missing Reinstall the program from the components. McAfee Web site or CD.
Chapter 5 Introduction Ignoring protection problems If SecurityCenter detects a non-critical problem, you can either fix or ignore it. Other non-critical problems (for example, if Anti-Spam or Privacy Service are not installed) are automatically ignored. Ignored problems are not shown in the protection category information area on the SecurityCenter Home pane, unless your computer's protection status is green.
Some alerts also contain links to additional information about the event. These links let you launch McAfee's global Web site or send information to McAfee for troubleshooting. There are three types of alerts: red, yellow, and green.
McAfee VirusScan Plus Showing and hiding informational alerts Informational alerts notify you when events occur that do not pose threats to your computer's security. For example, if you have set up Firewall Protection, an informational alert appears by default whenever a program on your computer is granted access to the Internet.
Page 25
Chapter 6 Introduction Show or hide informational alerts when gaming You can hide informational alerts when you are playing a game in full-screen mode on your computer. When you finish the game and exit full-screen mode, SecurityCenter starts displaying informational alerts again. Open the Alert Options pane.
Hide the splash screen at startup By default, the McAfee splash screen appears briefly when Windows starts, notifying you that SecurityCenter is protecting your computer. However, you can hide the splash screen if you do not want it to appear.
Page 27
Chapter 6 Introduction Hide virus outbreak alerts You can hide alerts that notify you about virus outbreaks and other security threats in the online community. Open the Alert Options pane. How? 1. Under Common Tasks, click Home. 2. On the right pane, under SecurityCenter Information, click Configure.
H A P T E R Viewing events An event is an action or configuration change that occurs within a protection category and its related protection services. Different protection services record different types of events. For example, SecurityCenter records an event if a protection service is enabled or disabled;...
Note: SecurityCenter reports critical and non-critical protection problems as soon as it detects them. If you need help diagnosing your protection problems, you can run McAfee Virtual Technician. In this chapter VirusScan features............30 Starting real-time virus protection ......31 Starting additional protection........33...
McAfee VirusScan Plus VirusScan features VirusScan provides the following features. Comprehensive virus protection VirusScan's advanced detection and protection services defend you and your computer from the latest security threats, including viruses, Trojans, tracking cookies, spyware, adware, and other potentially unwanted programs. Protection extends beyond the files and folders and on your desktop, targeting threats from different points of entry—including e-mail, instant messages, and...
Chapter 8 Introduction Starting real-time virus protection VirusScan provides two types of virus protection: real-time and manual. Real-time virus protection constantly monitors your computer for virus activity, scanning files each time you or your computer access them. Manual virus protection lets you scan files on demand.
Page 34
McAfee VirusScan Plus 1. On the left pane, click Advanced Menu. 2. Click Configure. 3. On the Configure pane, click Computer & Files. Under Virus protection, click Off. In the dialog box, select when to resume real-time scanning. Click OK.
H A P T E R Starting additional protection In addition to real-time virus protection, VirusScan provides advanced protection against scripts, spyware, and potentially harmful e-mail and instant message attachments. By default, script scanning, spyware, e-mail, and instant messaging protection are turned on and protecting your computer. Script scanning protection Script scanning protection detects potentially harmful scripts and prevents them from running on your computer.
McAfee VirusScan Plus Start script scanning protection Turn on script scanning protection to detect potentially harmful scripts and prevent them from running on your computer. Script scanning protection alerts you when a script tries to create, copy, or delete files on your computer, or make changes to your Windows registry.
Page 37
Chapter 9 Introduction 1. On the left pane, click Advanced Menu. 2. Click Configure. 3. On the Configure pane, click E-mail & Under E-mail protection, click On. Note: Although you can turn off e-mail protection at any time, doing so leaves your computer vulnerable to e-mail threats. Start instant messaging protection Turn on instant messaging protection to detect security threats that can be included in inbound instant message attachments.
H A P T E R Setting up virus protection VirusScan provides two types of virus protection: real-time and manual. Real-time virus protection scans files each time you or your computer access them. Manual virus protection lets you scan files on demand. You can set different options for each type of protection.
McAfee VirusScan Plus Setting real-time scan options When you start real-time virus protection, VirusScan uses a default set of options to scan files; however, you can change the default options to suit your needs. To change real-time scanning options, you must make decisions about what VirusScan checks for during a scan, as well as the locations and file types it scans.
Page 41
Chapter 10 Introduction To... Do this... Detect cookies Scan and remove Select the tracking cookies check box. Detect viruses and other Scan network drives Select the potential threats on drives check box. that are connected to your network Protect your computer from Enable buffer Select the buffer overflows...
McAfee VirusScan Plus Setting manual scan options Manual virus protection lets you scan files on demand. When you start a manual scan, VirusScan checks your computer for viruses and other potentially harmful items using a more comprehensive set of scanning options. To change manual scanning options, you must make decisions about what VirusScan checks for during a scan.
Page 43
Chapter 10 Introduction 1. Under Common Tasks, click Home. 2. On the SecurityCenter Home pane, click Computer & Files. 3. In the Computer & Files information area, click Configure. 4. On the Computer & Files Configuration pane, ensure that virus protection is enabled, and click Advanced. 5.
Page 44
McAfee VirusScan Plus 1. Under Common Tasks, click Home. 2. On the SecurityCenter Home pane, click Computer & Files. 3. In the Computer & Files information area, click Configure. 4. On the Computer & Files Configuration pane, ensure that virus protection is enabled, and click Advanced.
Page 45
Chapter 10 Introduction 1. Under Common Tasks, click Home. 2. On the SecurityCenter Home pane, click Computer & Files. 3. In the Computer & Files information area, click Configure. 4. On the Computer & Files Configuration pane, ensure that virus protection is enabled, and click Advanced. 5.
McAfee VirusScan Plus Using SystemGuards options SystemGuards monitor, log, report, and manage potentially unauthorized changes made to the Windows registry or critical system files on your computer. Unauthorized registry and file changes can harm your computer, compromise its security, and damage valuable system files.
Page 47
Chapter 10 Introduction Like Program and Windows SystemGuards, Browser SystemGuards detect potentially unauthorized changes to your computer's registry and other critical files that are essential to Windows. Browser SystemGuards, however, monitor changes to important registry items and files like Internet Explorer add-ons, Internet Explorer URLs, and Internet Explorer security zones.
Page 48
McAfee VirusScan Plus Browser SystemGuards Under I want to, do one of the following: To detect, log, and report unauthorized registry and file changes associated with Program, Windows, and Browsers SystemGuards, click Show alerts. To detect and log unauthorized registry and file changes...
Page 49
Chapter 10 Introduction Windows SystemGuards technology helps prevent your computer from sending and receiving unauthorized or personal information over the Internet. It also helps stop suspect programs that can bring unwanted changes to the appearance and behavior of the programs that are important to you and your family.
Page 50
McAfee VirusScan Plus SystemGuard Detects... Windows Spyware, adware, and other potentially Messenger unwanted programs that can make registry Service changes to the Windows messenger service, allowing unsolicited ads and remotely run programs on your computer. Windows Spyware, adware, and other potentially Win.ini File...
Page 51
Chapter 10 Introduction SystemGuard Detects... Internet Explorer Spyware, adware, and other potentially Restrictions unwanted programs that can make registry changes to Internet Explorer restrictions, affecting browser settings and options. Internet Explorer Spyware, adware, and other potentially Security Zones unwanted programs that can make registry changes to Internet Explorer security zones, allowing potentially harmful files to run when you start your computer.
McAfee VirusScan Plus Using trusted lists If VirusScan detects a file or registry change (SystemGuard), program, or buffer overflow, it prompts you to trust or remove it. If you trust the item and indicate that you do not want to receive...
Page 53
Chapter 10 Introduction Click OK. Note: For more information about trusted list types, see About trusted lists types (page 51). About trusted lists types SystemGuards on the Trusted Lists pane represent previously unauthorized registry and file changes that VirusScan has detected but that you have chosen to allow from an alert of from the Scan results pane.
Page 54
McAfee VirusScan Plus Option Description Browser Browser SystemGuards on the Trusted Lists pane SystemGuards represent previously unauthorized registry and file changes that VirusScan has detected, but that you have chosen to allow from an alert or from the Scan Results pane.
H A P T E R Scanning your computer When you start SecurityCenter for the first time, VirusScan's real-time virus protection starts protecting your computer from potentially harmful viruses, Trojans, and other security threats. Unless you disable real-time virus protection, VirusScan constantly monitors your computer for virus activity, scanning files each time you or your computer access them, using the real-time scanning options that you set.
McAfee VirusScan Plus Scan your computer You can run a manual scan from either the Advanced or Basic menu in SecurityCenter. If you run a scan from the Advanced menu, you can confirm your manual scan options before scanning. If you run a scan from the Basic menu, VirusScan starts scanning immediately, using the existing scanning options.
Page 57
Chapter 11 Introduction To... Do this... View scan and Scan completed Double-click the icon detection statistics in the notification area on your taskbar. View details about Scan completed Double-click the icon detected items, in the notification area on your taskbar, infection status, and View Results and then click...
H A P T E R Working with scan results If VirusScan detects a security threat while running a real-time or manual scan, it tries to handle the threat automatically according to the threat type. For example, If VirusScan detects a virus, Trojan, or tracking cookie on your computer, it tries to clean the infected file.
McAfee VirusScan Plus 1. Double-click the Scan completed icon in the notification area at the far right of your taskbar. 2. On the Scan Progress: Manual Scan pane, click View Results. In the scan results list, click Viruses and Trojans.
Page 61
Chapter 12 Introduction To remove the infected file from your computer, click Remove. Click to confirm your selected option. Tip: You can restore or remove multiple files at the same time. Work with quarantined programs and cookies When VirusScan quarantines potentially unwanted programs or tracking cookies, it encrypts and then moves them to a protected folder to prevent the programs or cookies from harming your computer.
Internet traffic for suspicious activities. Note: SecurityCenter reports critical and non-critical protection problems as soon as it detects them. If you need help diagnosing your protection problems, you can run McAfee Virtual Technician. In this chapter Personal Firewall features ..........62 Starting Firewall ............65...
McAfee VirusScan Plus Personal Firewall features Personal Firewall provides the following features. Standard and custom protection levels Guard against intrusion and suspicious activity using Firewall's default or customizable protection settings. Real-time recommendations Receive recommendations, dynamically, to help you determine whether programs should be granted Internet access or network traffic should be trusted.
Page 65
Intrusion prevention Protect your privacy from possible Internet threats. Using heuristic-like functionality, McAfee provides a tertiary layer of protection by blocking items that display symptoms of attacks or characteristics of hacking attempts. Sophisticated traffic analysis...
You can enable Firewall to protect your computer from intrusion and unwanted network traffic, as well as manage inbound and outbound Internet connections. On the McAfee SecurityCenter pane, click Internet & Network, and then click Configure. On the Internet & Network Configuration pane, under Firewall protection is disabled, click On.
When Firewall is disabled, you cannot manage inbound or outbound Internet connections. On the McAfee SecurityCenter pane, click Internet & Network, and then click Configure. On the Internet & Network Configuration pane, under Firewall protection is enabled, click Off.
H A P T E R Working with alerts Firewall employs an array of alerts to help you manage your security. These alerts can be grouped into three basic types: Red alert Yellow alert Green alert Alerts can also contain information to help you decide how to handle alerts or get information about programs running on your computer.
Web site to get information about a program that Firewall has detected on your computer. Tell McAfee about this program: Send information to McAfee about an unknown file that Firewall has detected on your computer. McAfee recommends: Advice about handling alerts. For example, an alert can recommend that you allow access for a program.
Display alerts while gaming You can allow Firewall informational alerts to be displayed when it detects intrusion attempts or suspicious activity during full-screen gameplay. On the McAfee SecurityCenter pane, click Advanced Menu. Click Configure. On the SecurityCenter Configuration pane, under Alerts, click Advanced.
H A P T E R Configuring Firewall protection Firewall offers a number of methods to manage your security and to tailor the way you want to respond to security events and alerts. After you install Firewall for the first time, your computer's protection security level is set to Trusting and your programs are allowed outbound-only Internet access.
McAfee VirusScan Plus Managing Firewall security levels Firewall's security levels control the degree to which you want to manage and respond to alerts. These alerts appear when it detects unwanted network traffic and inbound and outbound Internet connections. By default, Firewall's security level is set to Trusting, with outbound-only access.
Page 75
Set security level to Lockdown You can set Firewall's security level to Lockdown to block all inbound and outbound network connections. On the McAfee SecurityCenter pane, click Internet & Network, then click Configure. On the Internet & Network Configuration pane, under Firewall protection is enabled, click Advanced.
Page 76
You can set the Firewall security level to Tight to receive alerts when new programs attempt outbound Internet connections or receive inbound connection requests. On the McAfee SecurityCenter pane, click Internet & Network, then click Configure. On the Internet & Network Configuration pane, under Firewall protection is enabled, click Advanced.
Page 77
Set security level to Open You can set Firewall's security level to Open to allow all inbound and outbound network connections. On the McAfee SecurityCenter pane, click Internet & Network, then click Configure. On the Internet & Network Configuration pane, under Firewall protection is enabled, click Advanced.
You can enable Smart Recommendations for Firewall to automatically allow or block programs, and alert you about unrecognized and potentially dangerous programs. On the McAfee SecurityCenter pane, click Internet & Network, then click Configure. On the Internet & Network Configuration pane, under Firewall protection is enabled, click Advanced.
Page 79
Firewall detects a new program that is suspicious or is known to be a possible threat, it automatically blocks the program from accessing the Internet. On the McAfee SecurityCenter pane, click Internet & Network, then click Configure. On the Internet & Network Configuration pane, under Firewall protection is enabled, click Advanced.
Internet access, which you can allow or block. To use this option, your security level must not be set to Open or Lockdown. On the McAfee SecurityCenter pane, click Internet & Network, then click Configure. On the Internet & Network Configuration pane, under Firewall protection is enabled, click Advanced.
Page 81
Configure ping request settings You can allow or prevent detection of your computer on the network by other computer users. On the McAfee SecurityCenter pane, click Internet & Network, then click Configure. On the Internet & Network Configuration pane, under Firewall protection is enabled, click Advanced.
Page 82
McAfee VirusScan Plus Firewall is set to Open security level. Firewall service is not running. Firewall Protection is not installed on your computer. Your Windows Firewall is disabled. Outbound firewall is not installed on your computer. Click OK.
Lock Firewall instantly You can lock Firewall to instantly block all network traffic between your computer and the Internet. On the McAfee SecurityCenter pane, under Common Tasks, click Lockdown Firewall.
Page 84
Recommendations, restores the list of default programs and their permissions in the Program Permissions pane, removes trusted and banned IP addresses, and restores system services, event log settings, and intrusion detection. On the McAfee SecurityCenter pane, click Restore Firewall Defaults. On the Restore Firewall Protection Defaults pane, click Restore Defaults.
H A P T E R Managing programs and permissions Firewall allows you to manage and create access permissions for existing and new programs that require inbound and outbound Internet access. Firewall lets you control full or outbound-only access for programs. You can also block access for programs. In this chapter Allowing Internet access for programs ......84 Allowing outbound-only access for programs ..86...
Allow full access for a program You can allow an existing blocked program on your computer to have full inbound and outbound Internet access. On the McAfee SecurityCenter pane, click Internet & Network, then click Configure. On the Internet & Network Configuration pane, under Firewall protection is enabled, click Advanced.
Page 87
Allow full access from the Recent Events log You can allow an existing blocked program that appears in the Recent Events log to have full inbound and outbound Internet access. On the McAfee SecurityCenter pane, click Advanced Menu. Click Reports &...
Firewall lets you configure program permissions to allow outbound-only Internet access. Allow outbound-only access for a program You can allow a program to have outbound-only Internet access. On the McAfee SecurityCenter pane, click Internet & Network, then click Configure. On the Internet & Network Configuration pane, under Firewall protection is enabled, click Advanced.
Internet to function properly. Block access for a program You can block a program from having inbound and outbound Internet access. On the McAfee SecurityCenter pane, click Internet & Network, then click Configure. On the Internet & Network Configuration pane, under Firewall protection is enabled, click Advanced.
Page 90
McAfee VirusScan Plus Block access from the Recent Events log You can block a program that appears in the Recent Events log from having inbound and outbound Internet access. On the McAfee SecurityCenter pane, click Advanced Menu. Click Reports &...
Remove a program permission You can remove a program from having any inbound or outbound Internet access. On the McAfee SecurityCenter pane, click Internet & Network, then click Configure. On the Internet & Network Configuration pane, under Firewall protection is enabled, click Advanced.
More. Get program information from the Outbound Events log From the Outbound Events log, you can get program information from McAfee's HackerWatch Web site to decide which programs to allow or block inbound and outbound Internet access. Note: Ensure that you are connected to the Internet so that your...
H A P T E R Managing system services To work properly, certain programs (including Web servers and file-sharing server programs) must accept unsolicited connections from other computers through designated system service ports. Typically, Firewall closes these system service ports because they represent the most likely source of insecurities in your system.
McAfee VirusScan Plus Configuring system service ports System service ports can be configured to allow or block remote network access to a service on your computer. The list below shows the common system services and their associated ports: File Transfer Protocol (FTP) Ports 20-21...
Page 95
An open system service port can make your computer vulnerable to Internet security threats; therefore, only open a port if necessary. On the McAfee SecurityCenter pane, click Internet & Network, then click Configure. On the Internet & Network Configuration pane, under Firewall protection is enabled, click Advanced.
Page 96
Note: If port information is entered incorrectly, the system service fails. On the McAfee SecurityCenter pane, click Internet & Network, then click Configure. On the Internet & Network Configuration pane, under Firewall protection is enabled, click Advanced.
Page 97
You can remove an existing system service port from your computer. After removal, remote computers can no longer access the network service on your computer. On the McAfee SecurityCenter pane, click Internet & Network, then click Configure. On the Internet & Network Configuration pane, under Firewall protection is enabled, click Advanced.
If a computer that you trust is infected through a worm or other mechanism, your computer can be vulnerable to infection. In addition, McAfee recommends that the computer(s) you trust are protected by a firewall and an up-to-date antivirus program also.
If a computer that you trust is infected through a worm or other mechanism, your computer can be vulnerable to infection. In addition, McAfee recommends that the computer(s) you trust are protected by a firewall and an up-to-date antivirus program also.
Page 101
(ICS), see Configure a new system service. Add a trusted computer from the Inbound Events log You can add a trusted computer connection and its associated IP address from the Inbound Events log. On the McAfee SecurityCenter pane, on the Common Tasks pane, click Advanced Menu.
Page 102
Firewall automatically added from a trusting private network. Remove a trusted computer connection You can remove a trusted computer connection and its associated IP address. On the McAfee SecurityCenter pane, click Internet & Network, then click Configure. On the Internet & Network Configuration pane, under Firewall protection is enabled, click Advanced.
Page 103
Note: Ensure that you do not block important IP addresses, such as your DNS or DHCP server, or other ISP-related servers. On the McAfee SecurityCenter pane, click Internet & Network, then click Configure. On the Internet & Network Configuration pane, under Firewall protection is enabled, click Advanced.
Page 104
McAfee VirusScan Plus Edit a banned computer connection You can edit a banned computer connection and its associated IP address. On the McAfee SecurityCenter pane, click Internet & Network, then click Configure. On the Internet & Network Configuration pane, under Firewall protection is enabled, click Advanced.
Page 105
You can use the Inbound Events page, which lists the IP addresses of all inbound Internet traffic, to ban an IP address that you suspect is the source of suspicious or undesirable Internet activity. On the McAfee SecurityCenter pane, under Common Tasks, click Advanced Menu.
H A P T E R Logging, monitoring, and analysis Firewall provides extensive and easy-to-read logging, monitoring, and analysis for Internet events and traffic. Understanding Internet traffic and events helps you manage your Internet connections. In this chapter Event Logging ..............106 Working with Statistics ..........108 Tracing Internet traffic..........109 Monitoring Internet traffic .........112...
McAfee VirusScan Plus Event Logging Firewall allows you to enable or disable event logging and, when enabled, which event types to log. Event logging allows you to view recent inbound, outbound events and intrusion events. Configure event log settings You can specify and configure the types of Firewall events to log.
Page 109
Chapter 21 Introduction View inbound events If logging is enabled, you can view inbound events. Inbound Events include the date and time, source IP address, host name, and information and event type. Ensure the Advanced menu is enabled. On the Common Tasks pane, click Reports &...
McAfee VirusScan Plus Working with Statistics Firewall leverages McAfee's HackerWatch security Web site to provide you with statistics about global Internet security events and port activity. View global security event statistics HackerWatch tracks worldwide Internet security events, which you can view from SecurityCenter. Information tracked lists incidents reported to HackerWatch in the last 24 hours, 7 days, and 30 days.
Chapter 21 Introduction Tracing Internet traffic Firewall offers a number of options for tracing Internet traffic. These options let you geographically trace a network computer, obtain domain and network information, and trace computers from the Inbound Events and Intrusion Detection Events logs. Geographically trace a network computer You can use Visual Tracer to geographically locate a computer that is connecting or attempting to connect to your computer,...
Page 112
McAfee VirusScan Plus Trace a computer from the Inbound Events log From the Inbound Events pane, you can trace an IP address that appears in the Inbound Events log. Ensure the Advanced menu is enabled. On the Common Tasks pane, click Reports &...
Page 113
Chapter 21 Introduction Trace a monitored IP address You can trace a monitored IP address to obtain a geographical view which shows the most probable route of data taken from the source computer to yours. In addition, you can obtain registration and network information about the IP address.
McAfee VirusScan Plus Monitoring Internet traffic Firewall provides a number of methods to monitor your Internet traffic, including the following: Traffic Analysis graph: Displays recent inbound and outbound Internet traffic. Traffic Usage graph: Displays the percentage of bandwidth used by the most active programs during the past 24 hour period.
Page 115
Chapter 21 Introduction Analyze inbound and outbound traffic The Traffic Analysis graph is a numerical and graphical representation of inbound and outbound Internet traffic. In addition, the Traffic Monitor displays programs using the greatest number of network connections on your computer and the IP addresses that the programs access.
Page 116
McAfee VirusScan Plus Note: To view the most up-to-date statistics, click Refresh under Active Programs.
H A P T E R Learning about Internet security Firewall leverages McAfee's security Web site, HackerWatch, to provide up-to-date information about programs and global Internet activity. HackerWatch also provides an HTML tutorial about Firewall. In this chapter Launch the HackerWatch tutorial......116...
McAfee VirusScan Plus Launch the HackerWatch tutorial To learn about Firewall, you can access the HackerWatch tutorial from SecurityCenter. Ensure that the Advanced Menu is enabled, and then click Tools. On the Tools pane, click HackerWatch. Under HackerWatch Resources, click View Tutorial.
Active-X files, and system restore point files. QuickClean also protects your privacy by using the McAfee Shredder component to securely and permanently delete items that may contain sensitive, personal information, such as your name and address. For information about shredding files, see McAfee Shredder.
McAfee VirusScan Plus QuickClean features QuickClean provides various cleaners that delete unnecessary files safely and efficiently. By deleting these files, you increase the space on your computer's hard drive and improve its performance.
Chapter 23 Introduction Cleaning your computer QuickClean deletes files that can create clutter on your computer. It empties your Recycle Bin and deletes temporary files, shortcuts, lost file fragments, registry files, cached files, cookies, browser history files, sent and deleted e-mail, recently-used files, Active-X files, and system restore point files.
Page 122
McAfee VirusScan Plus Name Function Cookie Cleaner Deletes cookies. These files are usually stored as temporary files. A cookie is a small file containing information, usually including a user name and the current date and time, stored on the computer of a person browsing the Web.
Page 123
If any files or items were locked during cleanup, you may be prompted to restart your computer. Click to close the prompt. Click Finish. Note: Files deleted with Shredder cannot be recovered. For information about shredding files, see McAfee Shredder.
Defragment your computer You can defragment your computer to improve file and folder access and retrieval. On the McAfee SecurityCenter pane, under Common Tasks, click Maintain Computer.
When finished, under QuickClean Summary, you can view the date and time when your task is scheduled to run again. Open the Task Scheduler pane. How? 1. On the McAfee SecurityCenter, under Common Tasks, click Maintain Computer.
Click Finish. Note: Files deleted with Shredder cannot be recovered. For information about shredding files, see McAfee Shredder. Modify a QuickClean task You can modify a scheduled QuickClean task to change the cleaners it uses or the frequency with which it automatically runs on your computer.
Click Finish. Note: Files deleted with Shredder cannot be recovered. For information about shredding files, see McAfee Shredder. Delete a QuickClean task You can delete a scheduled QuickClean task if you no longer want it to run automatically.
McAfee VirusScan Plus 1. On the McAfee SecurityCenter, under Common Tasks, click Maintain Computer. 2. Under Task Scheduler, click Start. In the Select operation to schedule list, click Disk Defragmenter. Type a name for your task in the Task name box, and then click Create.
Chapter 23 Introduction Delete a Disk Defragmenter task You can delete a scheduled Disk Defragmenter task if you no longer want it to run automatically. Open the Task Scheduler pane. How? 1. On the McAfee SecurityCenter, under Common Tasks, click Maintain Computer.
H A P T E R McAfee Shredder McAfee Shredder deletes (or shreds) items permanently from your computer's hard drive. Even when you manually delete files and folders, empty your Recycle Bin, or delete your Temporary Internet Files folder, you can still recover this information using computer forensic tools.
McAfee VirusScan Plus Shredder features Shredder deletes items from your computer's hard drive so that their associated information cannot be recovered. It protects your privacy by safely and permanently deleting files and folders, items in your Recycle Bin and Temporary Internet Files folder, and the entire contents of computer disks, such as rewriteable CDs, external hard drives, and floppy disks.
You can shred files and folders from your computer's hard drive, including items in your Recycle Bin and in your Temporary Internet Files folder. Open Shredder. How? 1. On the McAfee SecurityCenter pane, under Common Tasks, click Advanced Menu. 2. On the left pane, click Tools.
You can shred the entire contents of a disk at once. Only removable drives, such as external hard drives, writeable CDs, and floppy disks can be shredded. Open Shredder. How? 1. On the McAfee SecurityCenter pane, under Common Tasks, click Advanced Menu.
Note: SecurityCenter reports critical and non-critical protection problems as soon as it detects them. If you need help diagnosing your protection problems, you can run McAfee Virtual Technician. In this chapter Network Manager features .........134 Understanding Network Manager icons ....135 Setting up a managed network........137...
McAfee VirusScan Plus Network Manager features Network Manager provides the following features. Graphical network map Network Manager's network map provides a graphical overview of the protection status of the computers and components that make up your home network. When you make changes to your network (for example, you add a computer), the network map recognizes those changes.
Chapter 25 Introduction Understanding Network Manager icons The following table describes the icons commonly used on the Network Manager network map. Icon Description Represents an online, managed computer Represents an offline, managed computer Represents an unmanaged computer that has SecurityCenter installed Represents an offline, unmanaged computer Represents an online computer that does not have SecurityCenter installed, or an unknown...
H A P T E R Setting up a managed network To set up a managed network, work with the items on your network map and add members (computers) to the network. Before a computer can be remotely managed, or granted permission to remotely manage other computers on the network, it must become a trusted member of the network.
McAfee VirusScan Plus Working with the network map When you connect a computer to the network, Network Manager analyzes the network to determine if there are any managed or unmanaged members, what the router attributes are, and the Internet status. If no members are found, Network Manager...
Page 141
Chapter 26 Introduction Rename the network By default, the name of the network includes the workgroup or domain name of the first computer that connects to the network and has SecurityCenter installed. If you prefer to use a different name, you can change it. On the Basic or Advanced Menu, click Manage Network.
When a computer joins the network, it is prompted to expose its McAfee protection status to other computers on the network. If a computer agrees to expose its protection status, it becomes a managed member of the network.
Page 143
Chapter 26 Introduction Join a managed network When you receive an invitation to join a managed network, you can accept it or reject it. You can also determine whether you want this computer and other computers on the network to monitor each other's security settings (for example, whether a computer's virus protection services are up-to-date).
Page 144
McAfee VirusScan Plus Click OK. An invitation to join the managed network is sent to the computer. When the computer accepts the invitation, two playing cards appear. Confirm that the playing cards are the same as those displayed on the computer that you have invited to join the managed network.
Page 145
Chapter 26 Introduction Stop trusting computers on the network If you trusted other computers on the network by mistake, you can stop trusting them. Click Stop trusting computers on this network under want Note: Stop trusting computers on this network link is not available if you have administrative permissions and there are other managed computers on the network.
H A P T E R Managing the network remotely After you set up your managed network, you can remotely manage the computers and components that make up your network. You can monitor the status and permission levels of the computers and components and fix most security vulnerabilities remotely.
A managed network has managed and unmanaged members. Managed members allow other computers on the network to monitor their McAfee protection status; unmanaged members do not. Unmanaged members are usually guest computers that want to access other network features (for example, send files or share printers).
Page 149
Chapter 27 Introduction Modify a managed computer's permissions You can change a managed computer's permissions at any time. This allows you to modify which computers can monitor the protection status of other computers on the network. Click a managed computer's icon on the network map. Click Modify permissions for this computer under...
McAfee VirusScan Plus Fixing security vulnerabilities Managed computers with administrative permissions can monitor the McAfee protection status of other managed computers on the network and fix reported security vulnerabilities remotely. For example, if a managed computer's McAfee protection status indicates that VirusScan is disabled, another managed computer with administrative permissions can enable VirusScan remotely.
Page 151
Chapter 27 Introduction Install McAfee security software on remote computers If one or more computers on your network are not using the latest version of SecurityCenter, their protection status cannot be monitored remotely. If you want to monitor these computers remotely, you must go to each computer, and install the latest version of SecurityCenter.
EasyNetwork help. Note: SecurityCenter reports critical and non-critical protection problems as soon as it detects them. If you need help diagnosing your protection problems, you can run McAfee Virtual Technician. In this chapter EasyNetwork features ..........152 Setting up EasyNetwork..........153...
McAfee VirusScan Plus EasyNetwork features EasyNetwork provides the following features. File sharing EasyNetwork makes it easy to share files with other computers on your network. When you share files, you grant other computers read-only access to those files. Only computers that have full or administrative access to your managed network (members) can share or access files shared by other members.
McAfee EasyNetwork. Tip: If you created desktop and quick launch icons during the installation, you can also open EasyNetwork by double-clicking the McAfee EasyNetwork icon on your desktop or in the notification area at the far right of your taskbar.
Note: After you join, if you have other McAfee networking programs installed (for example, Network Manager), the computer is also recognized as a managed computer in those programs. The permission level that is assigned to a computer in EasyNetwork applies to all McAfee networking programs.
Page 157
Chapter 29 Introduction Join the network When a computer connects to a trusted network for the first time after installing EasyNetwork, a message appears asking whether to join the managed network. If the computer agrees to join, a request is sent to all the other computers on the network that have administrative access.
Page 158
McAfee VirusScan Plus Click Allow administrative access to managed network programs to allow the computer access to the network with administrative permissions. It also allows the computer to grant access to other computers that want to join the managed network.
Page 159
Chapter 29 Introduction Rename the network By default, the network name includes the name of the first computer that joined; however, you can change the network name at any time. When you rename the network, you change the network description displayed in EasyNetwork. On the Options menu, click Configure.
McAfee VirusScan Plus Leaving a managed network If you join a managed network but then decide that you do not want to be a member, you can leave the network. After you leave the managed network, you can always rejoin; however, you must be granted permission again.
H A P T E R Sharing and sending files EasyNetwork makes it easy to share and send files among other computers on the network. When you share files, you grant other computers read-only access to them. Only computers that are members of the managed network (full or administrative access) can share or access files shared by other member computers.
McAfee VirusScan Plus Sharing files Only computers that are members of the managed network (full or administrative access) can share or access files shared by other member computers. If you share a folder, all the files contained in that folder and its subfolders are shared; however, subsequent files added to the folder are not automatically shared.
Page 163
Chapter 30 Introduction Copy a shared file You copy a shared file so that you still have it when it's not shared any more. You can copy a shared file from any computer on your managed network. Drag a file from the Shared Files window in EasyNetwork to a location in Windows Explorer or to the Windows desktop.
Page 164
McAfee VirusScan Plus Type of file Type Description Search all shared file types. Document Search all shared documents. Image Search all shared image files. Video Search all shared video files. Audio Search all shared audio files. Compressed Search all compressed files (for example, .zip...
Chapter 30 Introduction Sending files to other computers You can send files to other computers that are members of the managed network. Before sending a file, EasyNetwork confirms that the computer receiving the file has enough disk space available. When you receive a file, it appears in your EasyNetwork inbox. The inbox is a temporary storage location for the files that other computers on the network send you.
Page 166
McAfee VirusScan Plus Receive notification when a file is sent You can receive a notification message when another computer on the managed network sends you a file. If EasyNetwork is not running, the notification message appears in the notification area at the far right of your taskbar.
H A P T E R Sharing printers After you join a managed network, EasyNetwork shares the local printers attached to your computer and uses the printer's name as the shared printer name. EasyNetwork also detects printers shared by other computers on your network and allows you to configure and use them.
McAfee VirusScan Plus Working with shared printers EasyNetwork detects the printers that are shared by the computers on the network. If EasyNetwork detects a remote printer that is not connected to your computer, the Available network printers link appears in the Shared Files window when you open EasyNetwork for the first time.
Glossary 802.11 A set of IEEE standards for transmitting data across a wireless network. 802.11 is commonly known as Wi-Fi. 802.11a An extension to 802.11 that transmits data at up to 54 Mbps in the 5GHz band. Although the transmission speed is faster than 802.11b, the distance covered is much smaller. 802.11b An extension to 802.11 that transmits data at up to 11 Mbps in the 2.4 GHz band.
Page 172
McAfee VirusScan Plus bandwidth The amount of data that can be transmitted in a fixed amount of time. blacklist In anti-phishing, a list of Web sites that are considered fraudulent. browser A program used to view Web pages on the Internet. Popular Web browsers include Microsoft Internet Explorer and Mozilla Firefox.
Page 173
Glossary cookie A small file containing information, usually including a user name and the current date and time, stored on the computer of a person browsing the Web. Cookies are primarily used by Web sites to identify users who have previously registered on or visited the site; however, they can also be a source of information for hackers.
Page 174
(Extended Service Set) A set of two or more networks that form a single subnetwork. event An action initiated either by the user, a device, or the computer itself which triggers a response. McAfee records events in its event log. external hard drive A hard drive that is stored outside of the computer.
Page 175
Glossary hotspot A geographic boundary covered by a Wi-Fi (802.11) access point (AP). Users who enter a hotspot with a wireless laptop can connect to the Internet, provided that the hotspot is beaconing (that is, advertising its presence) and authentication is not required. Hotspots are often located in heavily populated areas such as airports.
Page 176
McAfee VirusScan Plus (Local Area Network) A computer network that spans a relatively small area (for example, a single building). Computers on a LAN can communicate with each other and share resources such as printers and files. launchpad A U3 interface component that acts as a starting point for launching and managing U3 USB programs.
Page 177
Glossary network drive A disk or tape drive that is connected to a server on a network that is shared by multiple users. Network drives are sometimes called remote drives. network map A graphical representation of the computers and components that make up a home network.
Page 178
McAfee VirusScan Plus plain text Text that is not encrypted. See also encryption. plug-in A small software program that works with a larger program to provide added functionality. For example, plug-ins permit a Web browser to access and execute files embedded in HTML documents that are in formats the browser normally would not recognize (for example, animation, video, and audio files).
Page 179
Glossary publish To make a backed up file available publicly, on the Internet. You can access published files by searching the Data Backup library. quarantine To isolate. For example, in VirusScan, suspect files are detected and quarantined so that they cannot cause harm to your computer or files. quick archive To archive only those files that have changed since the last full or quick archive.
Page 180
McAfee VirusScan Plus rootkit A collection of tools (programs) that grant a user administrator-level access to a computer or computer network. Rootkits may include spyware and other potentially unwanted programs that can create additional security or privacy risks to your computer data and personal information.
Page 181
You can also create and name your own restore points at any time. SystemGuard McAfee alerts that detect unauthorized changes to your computer and notify you when they occur. temporary file A file, created in memory or on disk, by the operating system or some other program, to be used during a session and then discarded.
Page 182
McAfee VirusScan Plus trusted list Contains items that you trusted and are not being detected. If you trust an item (for example, a potentially unwanted program or a registry change) by mistake, or you want the item to be detected again, you must remove it from this list.
Page 183
Glossary watch locations The folders on your computer that Data Backup monitors. Web bugs Small graphics files that can embed themselves in your HTML pages and allow an unauthorized source to set cookies on your computer. These cookies can then transmit information to the unauthorized source.
Page 184
McAfee VirusScan Plus worm A self-replicating virus that resides in active memory and can send copies of itself through e-mail. Worms replicate and consume system resources, slowing performance or halting tasks. (Wi-Fi Protected Access) A specification standard that strongly increases the level of data protection and access control for existing and future wireless LAN systems.
McAfee, Inc. McAfee and other trademarks contained herein are registered trademarks or trademarks of McAfee, Inc. and/or its affiliates in the US and/or other countries.
WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO MCAFEE, INC. OR THE PLACE OF PURCHASE FOR A FULL REFUND.
McAfee Virtual Technician. For more information about McAfee Virtual Technician, see the McAfee Virtual Technician help. If you purchased your security software from a partner or provider other than McAfee, open a Web browser, and go to . Then, under Partner Links, select your www.mcafeehelp.com partner or provider to access McAfee Virtual Technician.
McAfee Virtual Technician. Follow the on-screen instructions to download and run Virtual Technician. Support and Downloads Consult the following tables for the McAfee Support and Download sites in your country, including User Guides. Support and Downloads Country McAfee Support McAfee Downloads Australia www.mcafeehelp.com...
Page 189
Chapter 32 About McAfee China (chn) www.mcafeehelp.com cn.mcafee.com/root/do wnloads.asp China (tw) www.mcafeehelp.com tw.mcafee.com/root/do wnloads.asp Czechoslovakia www.mcafeenapoveda.co cz.mcafee.com/root/do wnloads.asp Denmark www.mcafeehjaelp.com dk.mcafee.com/root/do wnloads.asp Finland www.mcafeehelp.com fi.mcafee.com/root/do wnloads.asp France www.mcafeeaide.com fr.mcafee.com/root/do wnloads.asp Germany www.mcafeehilfe.com de.mcafee.com/root/do wnloads.asp Great Britain www.mcafeehelp.com uk.mcafee.com/root/do wnloads.asp Italy www.mcafeeaiuto.com...
Page 190
McAfee VirusScan Plus McAfee Total Protection User Guides Country McAfee User Guides Australia download.mcafee.com/products/manuals/en-au/MTP_us erguide_2008.pdf Brazil download.mcafee.com/products/manuals/pt-br/MTP_us erguide_2008.pdf Canada download.mcafee.com/products/manuals/en-ca/MTP_us (English) erguide_2008.pdf Canada download.mcafee.com/products/manuals/fr-ca/MTP_use (French) rguide_2008.pdf China (chn) download.mcafee.com/products/manuals/zh-cn/MTP_us erguide_2008.pdf China (tw) download.mcafee.com/products/manuals/zh-tw/MTP_us erguide_2008.pdf Czechoslovaki download.mcafee.com/products/manuals/cz/MTP_userg uide_2008.pdf Denmark download.mcafee.com/products/manuals/dk/MTP_userg uide_2008.pdf Finland download.mcafee.com/products/manuals/fi/MTP_userg...
Page 191
Chapter 32 About McAfee Portugal download.mcafee.com/products/manuals/pt/MTP_userg uide_2008.pdf Spain download.mcafee.com/products/manuals/es/MTP_userg uide_2008.pdf Sweden download.mcafee.com/products/manuals/sv/MTP_userg uide_2008.pdf Turkey download.mcafee.com/products/manuals/tr/MTP_userg uide_2008.pdf United States download.mcafee.com/products/manuals/en-us/MTP_us erguide_2008.pdf McAfee Internet Security User Guides Country McAfee User Guides Australia download.mcafee.com/products/manuals/en-au/MIS_us erguide_2008.pdf Brazil download.mcafee.com/products/manuals/pt-br/MIS_use rguide_2008.pdf Canada download.mcafee.com/products/manuals/en-ca/MIS_use (English) rguide_2008.pdf Canada download.mcafee.com/products/manuals/fr-ca/MIS_user (French) guide_2008.pdf...
Page 192
Portugal download.mcafee.com/products/manuals/pt/MIS_userg uide_2008.pdf Spain download.mcafee.com/products/manuals/es/MIS_userg uide_2008.pdf Sweden download.mcafee.com/products/manuals/sv/MIS_usergu ide_2008.pdf Turkey download.mcafee.com/products/manuals/tr/MIS_usergu ide_2008.pdf United States download.mcafee.com/products/manuals/en-us/MIS_use rguide_2008.pdf McAfee VirusScan Plus User Guides Country McAfee User Guides Australia download.mcafee.com/products/manuals/en-au/VSP_us erguide_2008.pdf Brazil download.mcafee.com/products/manuals/pt-br/VSP_use rguide_2008.pdf Canada download.mcafee.com/products/manuals/en-ca/VSP_use (English) rguide_2008.pdf Canada download.mcafee.com/products/manuals/fr-ca/VSP_user (French) guide_2008.pdf China (chn) download.mcafee.com/products/manuals/zh-cn/VSP_use...
Page 193
Chapter 32 About McAfee France download.mcafee.com/products/manuals/fr/VSP_usergu ide_2008.pdf Germany download.mcafee.com/products/manuals/de/VSP_userg uide_2008.pdf Great Britain download.mcafee.com/products/manuals/en-uk/VSP_us erguide_2008.pdf Italy download.mcafee.com/products/manuals/it/VSP_usergu ide_2008.pdf Japan download.mcafee.com/products/manuals/ja/VSP_usergu ide_2008.pdf Korea download.mcafee.com/products/manuals/ko/VSP_userg uide_2008.pdf Mexico download.mcafee.com/products/manuals/es-mx/VSP_us erguide_2008.pdf Netherlands download.mcafee.com/products/manuals/nl/VSP_usergu ide_2008.pdf Norway download.mcafee.com/products/manuals/no/VSP_userg uide_2008.pdf Poland download.mcafee.com/products/manuals/pl/VSP_usergu ide_2008.pdf Portugal download.mcafee.com/products/manuals/pt/VSP_userg uide_2008.pdf Spain download.mcafee.com/products/manuals/es/VSP_userg uide_2008.pdf...
Page 194
McAfee VirusScan Plus China (chn) download.mcafee.com/products/manuals/zh-cn/VS_user guide_2008.pdf China (tw) download.mcafee.com/products/manuals/zh-tw/VS_user guide_2008.pdf Czechoslovaki download.mcafee.com/products/manuals/cz/VS_usergui de_2008.pdf Denmark download.mcafee.com/products/manuals/dk/VS_usergui de_2008.pdf Finland download.mcafee.com/products/manuals/fi/VS_usergui de_2008.pdf France download.mcafee.com/products/manuals/fr/VS_usergui de_2008.pdf Germany download.mcafee.com/products/manuals/de/VS_usergui de_2008.pdf Great Britain download.mcafee.com/products/manuals/en-uk/VS_user guide_2008.pdf Italy download.mcafee.com/products/manuals/it/VS_usergui de_2008.pdf Japan download.mcafee.com/products/manuals/ja/VS_usergui de_2008.pdf Korea download.mcafee.com/products/manuals/ko/VS_usergui de_2008.pdf Mexico download.mcafee.com/products/manuals/es-mx/VS_user...
Page 195
Chapter 32 About McAfee Consult the following table for the McAfee Threat Center and Virus Information sites in your country. Country Security Headquarters Virus Information Australia www.mcafee.com/us/threat_ce au.mcafee.com/virusIn nter Brazil www.mcafee.com/us/threat_ce br.mcafee.com/virusIn nter Canada www.mcafee.com/us/threat_cent ca.mcafee.com/virusIn (English) Canada www.mcafee.com/us/threat_cent ca.mcafee.com/virusIn...
Page 196
McAfee VirusScan Plus Poland www.mcafee.com/us/threat_cent pl.mcafee.com/virusInf Portugal www.mcafee.com/us/threat_cent pt.mcafee.com/virusIn Spain www.mcafee.com/us/threat_cent es.mcafee.com/virusInf Sweden www.mcafee.com/us/threat_cent se.mcafee.com/virusInf Turkey www.mcafee.com/us/threat_cent tr.mcafee.com/virusInf United States www.mcafee.com/us/threat_cent us.mcafee.com/virusIn Consult the following table for the HackerWatch sites in your country. Country HackerWatch Australia www.hackerwatch.org Brazil www.hackerwatch.org/?lang=pt-br Canada www.hackerwatch.org...
Page 197
Chapter 32 About McAfee Portugal www.hackerwatch.org/?lang=pt-pt Spain www.hackerwatch.org/?lang=es Sweden www.hackerwatch.org/?lang=sv Turkey www.hackerwatch.org/?lang=tr United States www.hackerwatch.org...
Block access for a program .....87 Block access from the Recent Events log ...............88 About alerts ..........68 Block access to an existing system service About McAfee ........183 port............93 About SystemGuards types.....46 Blocking Internet access for programs ..87 About the Traffic Analysis graph ..112 browser ..........170...
Page 199
........171 Install an available network printer ..166 Disable automatic updates .....14 Install McAfee security software on Disable Smart Recommendations..77 remote computers ......149 Display alerts while gaming ....69 integrated gateway ........173 Display Smart Recommendations only .77 Internet ..........173...
Page 200
Index Managing your McAfee account.....11 pop-ups..........176 man-in-the-middle attack ....174 port ............176 MAPI ............174 potentially unwanted program (PUP) .176 McAfee EasyNetwork ......151 PPPoE .............176 McAfee Network Manager ....133 Protect your computer during startup...78 McAfee Personal Firewall......61 protocol..........176 McAfee QuickClean .......117 proxy............176 McAfee SecurityCenter ......5...
Page 201
USB............180 Shredding files, folders, and disks ..131 USB drive ..........180 smart drive ..........178 USB wireless adapter card ....180 SMTP ............178 Using McAfee Virtual Technician ..186 SSID ............179 Using SecurityCenter ........7 SSL ............179 Using SystemGuards options ....44 standard e-mail account .......179 Using trusted lists........50...
Page 202
Index wardriver ..........180 watch file types ........180 watch locations........181 Web bugs..........181 Webmail ..........181 WEP ............181 whitelist ..........181 Wi-Fi ............181 Wi-Fi Alliance.........181 Wi-Fi Certified ........181 wireless adapter........181 WLAN .............181 Work with potentially unwanted programs..........58 Work with quarantined files ....58 Work with quarantined programs and cookies ..........59 Work with viruses and Trojans ....57 Working with alerts .....