Viewing User-Approved Programs And Applications; Viewing Blocked Communications - McAfee MTP08EMB3RUA - Total Protection - PC Product Manual

Product guide
Hide thumbs Also See for MTP08EMB3RUA - Total Protection - PC:
Table of Contents

Advertisement

Viewing user-approved programs and applications

Use this SecurityCenter task to see which applications users have approved to run on their computers.
You can also add the applications to one or more policies so they will not be detected as unrecognized
programs on computers using the policies.
Task
For option definitions, click ? in the interface.
From the SecurityCenter, do any of the following:
1
• Click the Computers tab, then click a number in the User-Approved Applications column to view
applications for the associated computer.
• Click the Computers tab, then click the name of a computer. In the Computer Details page, under
Detections, click a number in the User-Approved Applications column to view applications.
2
To add the application to one or more policies, in the User-Approved Applications list, under Actions
click Allow.
3
In the Add Approved Application page, select each policy where you want to add the application,
then click Save.

Viewing blocked communications

Use this SecurityCenter task to view a list of communications that firewall protection prevented from
reaching client computers.
For the purposes of this report, each attempt to communicate is called an event.
Task
For option definitions, click ? in the interface.
Click the Reports tab, then click Inbound Events Blocked by Firewall.
1
In the report, view detailed information about detections and the computers where detections
2
occurred by using one of these methods.
When you want
to...
Display computers or
detections
View details about
events
View details about a
computer
Do this...
Click the triangle icon next to a name.
• Under a computer name, show which detections were found.
• Under a detection name, show the computers where it was found.
Click a group name to display computers in that group.
Click a quantity under Events to display the Inbound Event List, which
shows the name of the event, the number of occurrences, and the date on
which it was detected.
Click a computer name to display the Computer Details page, which
displays information about the computer, its service components, and its
detections.
McAfee Total Protection Service 5.1.5 Product Guide
Using Firewall Protection
Managing detections
5
103

Advertisement

Table of Contents
loading

This manual is also suitable for:

Total protection service 5.1.5

Table of Contents