McAfee TSA00M005PAA - Total Protection Service Product Manual page 7

Processor guide
Hide thumbs Also See for TSA00M005PAA - Total Protection Service:
Table of Contents

Advertisement

Enabling and disabling protection at the client computer ......................................................................... 109
Block and warn sites by safety ratings ................................................................................................... 109
Block and warn sites by content ............................................................................................................ 112
Authorize and prohibit sites by URL or domain ....................................................................................... 113
Customizing messages for users ............................................................................................................ 115
Web Filtering report ............................................................................................................................. 117
Best practices (browser protection) ....................................................................................................... 117
Frequently asked questions ................................................................................................................... 118
Using the SaaS Vulnerability Scanning Service ................................................... 119
Vulnerability scanning features .............................................................................................................. 119
Certification programs .......................................................................................................................... 120
The SaaS vulnerability scanning widget and portal .................................................................................. 121
Overview of scanning process ............................................................................................................... 122
Overview of the certification process ..................................................................................................... 123
Types of devices to scan ....................................................................................................................... 123
Types of scans ..................................................................................................................................... 124
Managing scan devices ......................................................................................................................... 125
Performing scans ................................................................................................................................. 130
How detections are reported ................................................................................................................ 131
Viewing scan results ............................................................................................................................. 132
McAfee Total Protection Service Product Guide
Blocking or warning site access based on safety ratings ................................................................ 111
Blocking or warning file downloads based on safety ratings ........................................................... 111
Blocking phishing pages ............................................................................................................. 112
Blocking or warning site access based on content ......................................................................... 113
How site patterns work ............................................................................................................... 114
Adding authorized and prohibited sites ........................................................................................ 115
Accessing the SaaS vulnerability scanning portal ........................................................................... 122
Discovering IP addresses in a domain .......................................................................................... 126
Discovering IP addresses in a network ......................................................................................... 126
Adding devices to scan ............................................................................................................... 127
Configuring devices to accept scans ............................................................................................. 128
Creating device groups ............................................................................................................... 128
Changing device groups .............................................................................................................. 129
Deleting devices ........................................................................................................................ 129
Starting a scan ........................................................................................................................... 130
Scheduling scans for devices ....................................................................................................... 131
Viewing results for audit scans .................................................................................................... 132
Viewing results for DNS discovery on domains .............................................................................. 133
Viewing results for network discovery scans ................................................................................. 133
7

Advertisement

Table of Contents
loading

Table of Contents