Managing Detections; Viewing Unrecognized Programs Detected On The Account; Viewing User-Approved Programs And Applications - McAfee TSA00M005PAA - Total Protection Service Product Manual

Processor guide
Hide thumbs Also See for TSA00M005PAA - Total Protection Service:
Table of Contents

Advertisement

Using Firewall Protection

Managing detections

Managing detections
Use these tasks to view and manage suspicious activity and unrecognized applications
detected by firewall protection.
Tasks

Viewing unrecognized programs detected on the account

Viewing user-approved programs and applications

Viewing blocked communications
Viewing unrecognized programs detected on the account
Use this SecurityCenter task to view the Unrecognized Programs report, which lists potentially
unwanted programs detected on all the client computers on your account.
Task
For option definitions, click ? in the interface.
1 Click the Reports tab, then click Unrecognized Programs.
2 In the Unrecognized Programs report, view detailed information about unrecognized
programs and the computers where they were detected by using one of these methods.
When you want to...
Display computers or detections
View details about detections
View details about a computer
where a detection occurred
Approve a program
Viewing user-approved programs and applications
Use this task to see which applications users have approved to run on their computers.
You can also add the applications to one or more policies so they will not be detected as
unrecognized programs on computers using the policies.
McAfee Total Protection Service Product Guide
Do this...
Click the triangle icon next to a name.
Under a computer name, show which programs were detected.
Under a program name, show the computers where it was detected.
Click a group name to display computers in that group.
Click the name of a potentially unwanted program to display detailed
information from the McAfee Avert Labs Threat Library.
Click a computer name to display the Computer Details page, which displays
information about the computer, its service components, and its detections.
Click Allow, select one or more programs, select one or more policies
where the programs will be approved, then click Save. The selected
programs will no longer be detected as threats on computers using the
selected policies.
95

Advertisement

Table of Contents
loading

Table of Contents