McAfee MTP09EMB1RAA - Total Protection 2009 User Manual page 273

User guide
Table of Contents

Advertisement

Setting up virus protection ...............31, 45
Setting up your Webmail accounts ......133
Setting Web browsing time limits ........154
share .......................................................247
Share a file ..............................................230
shared secret ..........................................247
Sharing and sending files ......................229
Sharing files............................................230
Sharing printers .....................................235
shortcut ..................................................247
Show or hide an item on the network map
.............................................................207
Show or hide ignored problems .............19
Show or hide informational alerts..........22
Show or hide informational alerts when
gaming ..................................................23
...............................................................22
Shred an entire disk...............................200
Shred files and folders ...........................199
Shredder features ..................................198
Shredding files, folders, and disks ........199
smart drive .............................................247
SMTP ......................................................247
Sort archived files ..................................178
Specify a personal filter .................123, 124
SSID ........................................................247
SSL ..........................................................248
standard e-mail account .......................248
Start e-mail protection ............................42
Start firewall protection ..........................63
Start instant messaging protection ........43
Start spyware protection .........................42
Starting Firewall.......................................63
Stop firewall protection...........................64
Stop managing a computer's protection
status ...................................................212
Stop monitoring networks ....................219
Stop real-time virus protection ..............47
Stop sharing a file ..................................230
Stop sharing a printer............................236
Stop trusting computers on the network
.............................................................210
Switch to Windows users ......................147
synchronize............................................248
system restore point ..............................248
SystemGuard..........................................248
T
temporary file ........................................248
TKIP ................................................248, 251
Trace a computer from the Inbound
Events log ...........................................108
Trace a computer from the Intrusion
Detection Events log ..........................108
Trace a monitored IP address...............109
Tracing Internet traffic..........................107
Trojan, Trojan horse .............................248
trusted list ..............................................248
U
U3 ...........................................................249
Understanding Network Manager icons
.............................................................203
Understanding protection categories. 7, 9,
27
Understanding protection services........10
Understanding protection status ..... 7, 8, 9
Understanding Webmail account
information ................................ 134, 135
Unlock Firewall instantly........................78
Update a filtered Web site ....................156
Updating SecurityCenter ........................13
URL.........................................................249
USB.........................................................249
USB drive ....................................... 247, 249
USB wireless adapter card ....................249
Using additional protection ...................41
Using McAfee Virtual Technician ........256
Using personal filters ............................123
Using SecurityCenter ................................7
Using SystemGuards options .................52
Using trusted lists....................................58
V
Verify your subscription .........................11
View a summary of your archive activity
.............................................................182
View all events .........................................27
View details for an item ........................207
View global Internet port activity.........106
View global security event statistics.....106
View inbound events.............................105
View intrusion detection events...........105
View outbound events .................... 83, 105
View recent events .......................... 27, 104
View scan results .....................................33
.............................................................138
Viewing events................................... 17, 27
virus........................................................249
VirusScan features...................................30
VPN.........................................................249
Index
271

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Total protection

Table of Contents