McAfee MTP08EMB3RUA - Total Protection - PC Product Manual page 6

Product guide
Hide thumbs Also See for MTP08EMB3RUA - Total Protection - PC:
Table of Contents

Advertisement

Contents
Web filtering features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
Enabling and disabling browser protection via policy . . . . . . . . . . . . . . . . . . . 117
Block and warn sites by safety ratings . . . . . . . . . . . . . . . . . . . . . . . . . 118
Block and warn sites by content . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
Authorize and prohibit sites by URL or domain . . . . . . . . . . . . . . . . . . . . . 121
Customizing messages for users . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
Viewing browsing activity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
Web Filtering report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
Best practices (browser protection) . . . . . . . . . . . . . . . . . . . . . . . . . . 126
Frequently asked questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127
7
Core SaaS email protection features . . . . . . . . . . . . . . . . . . . . . . . . . 129
Additional SaaS email protection services . . . . . . . . . . . . . . . . . . . . . . . 130
The SaaS email protection widget and portal . . . . . . . . . . . . . . . . . . . . . . 131
Account activation and setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132
Reports and statistics for email protection . . . . . . . . . . . . . . . . . . . . . . . 135
Getting more information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
8
Email server protection features . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
The installation and setup process . . . . . . . . . . . . . . . . . . . . . . . . . . 139
Management of email server protection . . . . . . . . . . . . . . . . . . . . . . . . 141
Where to find more information . . . . . . . . . . . . . . . . . . . . . . . . . . . 144
9
Vulnerability scanning features . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
The vulnerability scanning widget and portal . . . . . . . . . . . . . . . . . . . . . . 146
Overview of scanning process . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148
Types of devices to scan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148
Types of scans . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
Managing scan devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150
6
McAfee Total Protection Service 5.1.5 Product Guide
Blocking phishing pages . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
Blocking or warning site access based on content . . . . . . . . . . . . . . . . . 121
How site patterns work . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122
Adding authorized and prohibited sites . . . . . . . . . . . . . . . . . . . . . 123
Activating and setting up your account . . . . . . . . . . . . . . . . . . . . . 133
Accessing the SaaS email protection portal . . . . . . . . . . . . . . . . . . . . 133
Configuring policy settings for SaaS email protection . . . . . . . . . . . . . . . . 134
Checking quarantined messages . . . . . . . . . . . . . . . . . . . . . . . . 134
Viewing email activity for the week . . . . . . . . . . . . . . . . . . . . . . . 135
Viewing reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
Installing email server protection . . . . . . . . . . . . . . . . . . . . . . . . 139
Checking notifications and action items . . . . . . . . . . . . . . . . . . . . . 141
Viewing detection and status information . . . . . . . . . . . . . . . . . . . . 142
Accessing the management console on the server . . . . . . . . . . . . . . . . . 143
Accessing the vulnerability scanning portal . . . . . . . . . . . . . . . . . . . . 147
Discovering IP addresses in a domain . . . . . . . . . . . . . . . . . . . . . . 150
Discovering IP addresses in a network . . . . . . . . . . . . . . . . . . . . . . 150
Adding devices to scan . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151
Configuring devices to accept scans . . . . . . . . . . . . . . . . . . . . . . . 152
Creating device groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153
129
137
145

Advertisement

Table of Contents
loading

This manual is also suitable for:

Total protection service 5.1.5

Table of Contents