McAfee MTP09EMB1RAA - Total Protection 2009 User Manual page 271

User guide
Table of Contents

Advertisement

I
Ignore a protection problem ..................19
Ignoring protection problems ................19
Import an address book ........................129
Include a location in the archive ..........172
Install an available network printer .....236
Install McAfee security software on
remote computers..............................215
integrated gateway ................................242
Interrupt an automatic archive ............176
intranet...................................................242
Invite a computer to join the managed
network ...............................................209
IP address ...............................................243
IP spoofing .............................................243
J
Join a managed network .......................208
Join the network ....................................225
Joining a managed network ..........224, 228
Joining the managed network ..............208
K
key...........................................................243
L
LAN .................................................242, 243
launchpad ..............................................243
Learning about Internet security..........113
Learning about programs .......................88
Leave a managed network ....................228
Leaving a managed network .................228
License....................................................253
Lockdown Firewall instantly...................78
Logging, monitoring, and analysis .......103
M
MAC address ..........................................243
Manage a computer's protection status
.............................................................212
Manage a device ....................................213
Manage trusted lists ................................58
Managing archives ................................182
Managing computer connections ..........89
Managing informational alerts ...............67
Managing programs and permissions ...81
Managing system services ......................97
Managing the network remotely ..........211
Managing your subscriptions........... 11, 17
man-in-the-middle attack ....................243
MAPI.......................................................243
Mark a message from the Anti-Spam
toolbar ................................................127
McAfee Anti-Spam ................................115
McAfee Backup and Restore.................167
McAfee EasyNetwork ............................221
McAfee Network Manager ....................201
McAfee Parental Controls.....................141
McAfee Personal Firewall .......................61
McAfee QuickClean...............................183
McAfee SecurityCenter .............................5
McAfee Shredder ...................................197
McAfee Total Protection ...........................3
McAfee VirusScan....................................29
message authentication code (MAC)...243
Modify a device's display properties....213
Modify a managed computer's
permissions ........................................213
Modify a password ................................164
Modify a QuickClean task.....................192
Modify a system service port ................101
Modify how spam is processed and
marked........................................ 121, 123
Monitor program activity .....................111
Monitor program bandwidth ...............111
Monitoring Internet traffic ...................110
Monitoring your networks....................217
MSN........................................................243
N
network ..................................................244
network drive.........................................244
Network Manager features ...................202
network map..........................................244
NIC .........................................................244
node .......................................................244
O
Obtain computer network information
.............................................................107
Obtain computer registration information
.............................................................107
on-demand scanning............................244
Open an archived file ............................179
Optimizing Firewall security ..................75
P
Parental Controls features ....................142
Index
269

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Total protection

Table of Contents