Page 2
1. License Grant. Subject to the payment of the applicable license fees, and subject to the terms and conditions of this Agreement, McAfee hereby grants to you a non-exclusive, non-transferable right to use one copy of the specified version of the Software and the accompanying documentation (the "Documentation").
Page 3
4. Ownership Rights. The Software is protected by United States copyright laws and international treaty provisions. McAfee and its suppliers own and retain all right, title and interest in and to the Software, including all copyrights, patents, trade secret rights, trademarks and other intellectual property rights therein.
Page 4
Software is contained. You must return the defective media to McAfee at your expense with a copy of your receipt. This limited warranty is void if the defect has resulted from accident, abuse, or misapplication. Any replacement media will be warranted for the remainder of the original warranty period.
Page 5
CHARACTER INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF GOODWILL, WORK STOPPAGE, COMPUTER FAILURE OR MALFUNCTION, OR FOR ANY AND ALL OTHER DAMAGES OR LOSSES. IN NO EVENT WILL MCAFEE BE LIABLE FOR ANY DAMAGES IN EXCESS OF THE LIST PRICE MCAFEE CHARGES FOR A LICENSE TO THE SOFTWARE, EVEN IF MCAFEE SHALL HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Page 6
12. McAfee Customer Contact. If you have any questions concerning these terms and conditions, or if you would like to contact McAfee for any other reason, please call (408) 988-3832, fax (408) 970-9727, or write: McAfee Software, 3965 Freedom Circle, Santa Clara, California 95054.
Page 13
Table of Contents Internet Guard Dog and your online connection ..... .172 Internet Guard Dog features ........172 Protection from privacy threats .
Through a central interface, McAfee Office improvs integration with the individual components of the product suite. For example, instead of launching a separate McAfee Utilities main menu, a user can access all functions of McAfee Utilities directly from the McAfee Office Central interface.
24 hours a day. McAfee Utilities McAfee Utilities helps you keep your PC working at optimum efficiency and speed. You can diagnose and repair your system and application software; create a recovery disk and image snapshots of critical sectors of your hard drives;...
• Disk Minder safely, easily, and quickly diagnoses and repairs existing or potential disk problems. • McAfee Image saves a copy of critical disk information in a file and restores the image later if your disk is corrupted. • Registry Wizard allows you to easily maintain, troubleshoot, or repair the Registry database.
ActiveX controls, and Java applets. McAfee Internet Guard Dog McAfee Internet Guard Dog is designed to ensure that you can use all aspects of the Internet without worrying that your privacy and computer security will be compromised.
Welcome to McAfee Office McAfee Firewall McAfee Firewall is a personal firewall that lets you monitor, control and log your PC's network activity. It protects you from Internet hackers and keeps your PC private. McAfee Firewall filters traffic at the devices that your system uses - network cards and modems.
McAfee on the Web McAfee.com unveiled a new web site with a host of new services and online applications dedicated to updating, upgrading, and managing PCs over the web. McAfee.com provides personalized PC management.
McAfee Office. Common rescue disk McAfee Office will allow the user to create a single rescue disk for use in the event that their Windows system will not boot. Single update button McAfee Office can automatically update all of the installed components via the info button.
Page 22
(text document) files. In Windows Explorer: navigate to the Program Files folder on your hard drive; locate the McAfee Office folder; find any whatsnew.txt files in the folder; then double-click to open and view information.
Installating McAfee Office System requirements Prior to installing McAfee Office, please verify your existing PC system hardware components and configuration. The installation requirements and recommendations for the entire suite of McAfee Office are as follows: ® • Intel 486 or higher, Pentium recommended ®...
Installation When you begin installation of McAfee Office, the AutoRun program prompts you to choose a location where you want to install McAfee Office. You can accept the default location, or type in a new location. Use the following procedure to install the suite of utilities included with McAfee Office.
Page 25
Installating McAfee Office 3. Click Install McAfee Office. 4. Follow the instructions displayed in the window to complete installation. NOTE: Prior to installing any application from the McAfee Office suite, McAfee Office Central will identify any existing copies on your system.
The scan engine, meanwhile, combines the best features of technologies that McAfee and McAfee VirusScan researchers developed independently for more than a decade.
Page 28
Help icon on the upper right-hand corner of the window. To view available options in customizing how you want McAfee VirusScan components to work on your PC, click the Options button. • The VirusScan Console. This component allows you to create, configure and run VirusScan tasks at times you specify.
Page 29
McAfee VirusScan • The VShield scanner. This component gives you continuous anti-virus protection from viruses that arrive on floppy disks, from your network, or from various sources on the Internet. The VShield scanner starts when you start your computer, and stays in memory until you shut down. A flexible...
Page 30
• The SendVirus utility. This component gives you an easy and painless way to submit files that you believe are infected directly to McAfee anti-virus researchers. A simple wizard guides you as you choose files to submit, include contact details and, if you prefer, strip out any personal or confidential data from document files.
The next sections discuss other changes that this VirusScan release introduces. Installation and distribution features McAfee anti-virus products, including VirusScan software, now use the Microsoft Windows Installer (MSI), which comes with all Windows 2000 Professional systems. This Setup utility offers a wealth of custom installation and configuration features that make VirusScan software rollout across large organizations much easier and more intuitive.
Page 32
VirusScan software still requires regular .DAT file updates to keep pace with the 200 to 300 new viruses that appear each month. To meet this need, McAfee has incorporated updating technology in VirusScan software from its earliest incarnations. With this release, that technology takes a quantum leap forward with incremental .DAT...
Now or Run Now in a separate step to start an actual scan operation. Displaying the VirusScan application main window Follow these steps: 1. Click Start in the Windows taskbar, point to Programs, then to McAfee Office. Next, choose McAfee VirusScan. The VirusScan main window appears.
Page 34
McAfee VirusScan Figure 3-2. VirusScan main window From the McAfee VirusScan main window, you can: • Start scanning immediately. Click Scan to have the application scan your system with the last configuration options you set, or with default options. The following screen (Figure 3-2) allows you to select which area of your computer you want to scan.
Page 35
McAfee VirusScan Figure 3-3. Scan Now window • View the VirusScan application activity log. Through this window you are able to view a log of VirusScan activities performed on your your computer. You can also select to clear or print any of these activity logs (see Figure 3-3).
Page 36
• Set options. From the main window, the Options icon allows you to access and customize settings of the other components of McAfee VirusScan via a drop-down menu (e.g., Safe & Sound, and Emergency Disk).
McAfee VirusScan If you suspect you have a virus... First of all, don’t panic! Although far from harmless, most viruses that infect your machine will not destroy data, play pranks, or render your computer unusable. Even the comparatively rare viruses that do carry a destructive payload usually produce their nasty effects in response to a trigger event.
Page 38
NOTE: McAfee strongly recommends that you do not interrupt the BOOTSCAN.EXE scanner as it runs its scan operation. The Emergency Disk will not detect macro viruses, script viruses, or Trojan horse programs, but it will detect common file-infecting and boot-sector viruses.
Page 39
McAfee VirusScan If BOOTSCAN.EXE finds a virus, it will try to clean the infected file. If it fails, it will deny access to the file and continue the scan operation. After it finishes all of its scanning passes, it shows a summary report the actions it took for each hard disk on the screen.
McAfee VirusScan What does the VShield scanner do? McAfee desktop anti-virus products use two general methods to protect your system. The first method, background scanning, operates continuously, watching for viruses as you use your computer for everyday tasks. In the VirusScan product, the VShield scanner performs this function.
McAfee VirusScan NOTE: Because the VShield scanner runs continuously, you should not install or run more than one VShield scanner on the same workstation. Doing so can cause the scanners to interfere with each others' operations. Why use the VShield scanner? The VShield scanner has unique capabilities that make it an integral part of the VirusScan comprehensive anti-virus software security package.
• Netscape Navigator v3.x • Netscape Navigator v4.0.x (not including v4.0.6) • Microsoft Internet Explorer v3.x, v4.x and v5.x McAfee has also tested these e-mail clients and verified that they work with the VShield Download Scan module: • Microsoft Outlook Express •...
Page 43
Professional, the VShield scanner loads as a Windows NT service called VShield, which you can see in the Windows Services control panel. NOTE: McAfee recommends that you do not start or stop the VShield service from the Windows control panel. Instead, you can stop and restart the scanner from the provided VirusScan control panel.
Page 44
McAfee VirusScan Figure 3-6. VirusScan control panel - Components page 4. Select the Load VShield on startup checkbox at the top of the Components property page. 5. Click OK to close the control panel. Enabling the VShield scanner and its modules Once you have all VShield components installed, you can use any of four methods to enable them, in various combinations.
Page 45
McAfee VirusScan Depending on which combination of modules you enable, the VShield icon will display a different state. Method 2: Use the System Scan Status dialog box Follow these steps: 1. Double-click the VShield icon in the Windows system tray to open the System Scan Status dialog box.
Page 46
McAfee VirusScan Figure 3-8. VShield Properties dialog box 2. For each module that you want to enable, click the corresponding icon along the left side of the dialog box, then click the Detection tab. 3. Select the Enable checkbox at the top of each page.
McAfee VirusScan Using the VShield configuration wizard After you install VirusScan software and restart your computer, the VShield scanner loads into memory immediately and begins working with a default set of options that give you basic anti-virus protection. Unless you disable it or one of its modules—or stop it entirely—you never have to worry about...
Page 48
McAfee VirusScan The System Scan module will also scan files stored on floppy disks whenever you read from or write to them, or when you shut down your computer. If it finds a virus, the module will sound an alert and prompt you for a response.
Page 49
McAfee VirusScan – Lotus cc:Mail. Select this button if you use cc:Mail versions 6.x and later, which use a proprietary Lotus protocol for sending and receiving mail. – MAPI-compliant e-mail client. Select this button if you use Microsoft Exchange or Microsoft Outlook, as your corporate e-mail system.
Page 50
McAfee VirusScan The module will look for viruses in those files most susceptible to infection and will scan compressed files as you receive them. Otherwise, select the No, do not enable download scanning checkbox, then click Next> to continue. The next wizard panel sets options for the VShield Internet Filter module.
• About. Choose this to display the VShield scanner’s version number and serial number, the version number and creation date for the current .DAT files in use, and a McAfee copyright notice. • Exit. Choose this to stop all VShield modules and to unload the entire VShield scanner from memory.
McAfee Utilities central window Figure 4-1. McAfee Utilities Central window The McAfee Utilities Central window offers buttons to take you to the four suites of utilities (Figure 4-1). If you need help, click the Help icon at the upper right-hand side of the window to display the McAfee Utilities Central Help.
McAfee Utilities McAfee Utilities Properties Before using McAfee Utilities, you can access the properties dialog box to customize the way you want its components to display and work on your computer. From the McAfee Utilities central window, click Options and select Properties to display the Properties dialog box.
After making your selection, click Apply; then click OK. Disk Tools tab The Disk Tools tab displays options you can set to access McAfee Utilities properties when you point and right-click drives on your computer. When this option is activated, select a drive on your computer; point and right-click on the drive;...
Image Now... to take a snapshot of this drive using the McAfee Image. Follow the screen wizard to complete the task. If you do not want to perform any of these McAfee Utilities components via the Properties dialog box, select Disable this property sheet page.
McAfee Utilities • If you want to add a new file format to be excluded, click Add New. Type the new file format in the space provided within the Files to exclude text box. After making your selection, click Apply; then click OK.
• Compression Option is Save Folder Information. After making your selection, click Apply; then click OK. Repair and Recover Use McAfee Utilities Repair and Recover utilities to help you resolve problems with your PC’s system software and data. Disk Minder...
Page 59
McAfee Utilities Report errors only Before interactively fixing errors, you can run Disk Minder with the Report Errors Only option selected to examine or print reports describing a disk’s problems. To use Disk Minder to report errors only, start Disk Minder, click Properties, select the Report Errors Only check box and click OK.
McAfee Utilities Customizing Disk Minder Properties In addition to auto fix, report, and interactively fixing errors options, you can also select other properties options to set how you want Disk Minder to work on your computer. Select Properties options and click OK Figure 4-3.
McAfee Utilities • Check for Duplicate File Names–checks for duplicate file names—files with the same name in the same directory. • Test Drive Surface–performs read/write tests of a disk’s recordable surface media. If a sector is damaged, Disk Minder saves the data elsewhere so you can try to recover it later.
“snapshot” of the most critical areas on your hard drives. You can use McAfee Image to make a snapshot of the most crucial information on your drives. It saves information that you’ll need if your hard disk ever fails. This ensures that you can use Image’s Restore option to restore the latest states of...
Safe & Sound backup set. To restore one or more drives from an image file: 1. Start McAfee Image, select the Restore drive(s) from saved image radio button, and click Next >. User’s Guide...
Page 64
Figure 4-5. McAfee Image Recover 2. Do one of the following and click the Next > button: • Select an image file to use for restoring your drives from the list of those found on your system hard drive.
McAfee Utilities • File allocation tables–Select this option if your files are corrupted and you have been unable to repair them using Disk Minder. Often much or all of your data may be intact on the disk, but the file allocation tables (FATs) may be damaged.
McAfee Utilities Using a Rescue Disk Insert your Rescue disk into drive A, reboot your computer (or turn on the power). If your system doesn’t boot, access CMOS and make sure the Booting From Floppy option is enabled. Then follow the instructions on the screen.
Page 67
McAfee Utilities 2. During CheckUp, the component currently under examination is highlighted. Status information at the bottom of the screen lets you know exactly what CheckUp is doing. To perform a specific CheckUp 1. If you are having a specific hardware problem, click the appropriate component in the CheckUp desktop.
McAfee Utilities NOTE: If you know a component is operating properly but First Aid reports a problem, do not AutoFix it. First Aid may have incorrectly identified a “problem,” and the suggested fix may inadvertently cause a real problem to occur. If AutoFix produces unwanted changes in your PC, you can usually reverse the changes with Undo.
Page 69
McAfee Utilities Universal Undo allows you to undo: • A monitored event. Universal Undo monitors common events such as installing new software and drivers, and allows you to restore—safely and selectively—the changes made in the course of these events. • Changes to Windows settings. Most Windows configuration settings are housed in the Control Panel.
McAfee Utilities To undo a Control Panel setting: 1. Click Undo a Windows Settings Change on the Universal Undo screen. The Undo a Windows Setting dialog box appears. 2. Follow the screen instructions. Using Ask Advisor Ask Advisor allows you to access sources of information about your computer which can assist you in troubleshooting problems or simply learn more about your computer.
McAfee Utilities 3. Click Next >. Then click Finish. 4. Insert a disk into drive A and click OK. Rescue Disk formats the disk and copies critical startup files to it, as well as any files you added. When the process is complete, Rescue Disk exits and returns to the desktop.
McAfee Utilities Discover Pro lets you view information about your hardware and software. Each tab in the Discover Pro window covers a specific aspect of your PC, ranging from a general overview of your system configuration through software to benchmark and diagnostic tests. You can click the Advanced button at any time to obtain a far more detailed analysis of the current tab’s...
Page 73
McAfee Utilities Discover Pro displays the Advanced window for the active tab. All the Advanced windows have these elements in common: • Icon Panel–Click any of the icons in the panel at the left to view that type of information in the panel at the right.
McAfee Utilities Specifying Discover Pro settings Discover Pro lets you specify options (after clicking the Settings button) that determine the appearance of the Discover Pro window itself, whether you can view one or more category windows at a time, and whether Discover Pro should remember the positions of windows.
McAfee Utilities provides both a Windows and DOS version of the Undelete program. The DOS version of Undelete is also included on the McAfee Utilities Rescue disk when you create it. To undelete a file, select it in the list at the bottom and click the Undelete button.
McAfee Utilities Clean and Optimize Use McAfee Utilities Clean and Optimize utilities to help you ensure maximum performance of your computer via easy-to-use maintenance and optimization tools. Cleanup Wizard Cleanup Wizard allows you to reclaim space on the hard disk by helping you identify files that you no longer need such as duplicate files;...
McAfee Utilities Using Disk Tune to defragment or consolidate a disk After you specify one or more drives to tune and click Next >, Disk Tune analyzes the drive to determine the most suitable levels of optimization. Once the analysis is complete, depending upon the degree of fragmentation, Disk Tune recommends one of four methods: •...
McAfee Utilities The hard disk map Disk Tune displays a map of the hard disk with blocks—each block consists of a variable number of clusters, depending on the disk’s size—color coded to indicate their status. You can identify the contents of a block in the hard drive map by clicking it.
Page 79
McAfee Utilities • Disk Tune provides three verification levels: Verify (slow–ensures data written to a new cluster can be read), Compare (slowest–compares a relocated file’s contents against the original to ensure it is exactly the same), and None (fastest). • Ordering by Task–(Windows 98 only) Windows 98 tracks how often each of your programs are used and maintains this information in an application log file.
You can also enable or disable the McAfee Utilities Property sheet for supported drives and enable or disable Disk Tune in the Context menu for supported drives.
Page 81
McAfee Utilities In advanced file placement configurations, you can decide where on the disk various file groups will be located. Disk Tune divides the disk into five regions: Top, High, Middle, Low, and Bottom, and it lets you specify in which of these regions the various file categories are placed.
McAfee Utilities Registry Wizard Registry Wizard (for Windows 95/98 only) makes maintenance, troubleshooting, and repair of the Windows Registry database a quick and easy process. The Windows Registry is a database that replaces many functions of Windows 3.x’s AUTOEXEC.BAT, CONFIG.SYS, and *.INI files. This Registry contains all the information about the hardware, system, programs, and network user settings on your PC.
McAfee Utilities Figure 4-13. Registry Wizard window Select the task you want Registry Wizard to perform and click the Next > button. For step-by-step procedure, see the following topics on this chapter: • “Backing up & Restoring the Registry.” •...
Repair button to manually change the value for that key. Or, you can click the Advanced button to go to Registry Pro and edit the orphan entries using the McAfee utility instead of Registry Wizard. McAfee Office...
McAfee Utilities Select a column title to change the sort order of the keys Select a key handle or child key and click Repair Click Advanced to to manually edit its value go to Registry Pro where you can edit an Orphan key...
McAfee Utilities When you rebuild the Registry using the Registry Wizard Tune Up option, the current Registry files are saved in your Windows directory as system.hlx and user.hlx. In the unlikely event that you encounter any problems in Windows after a tune up, you can restore your original Registry by pressing F5 when you see the Starting Windows message when you boot, and by then typing REGUNDO at the C:>...
McAfee Utilities Finding orphans An orphan is an entry for a program that has moved or no longer exists. Choose the Find Orphans command from the Search menu. Registry Pro displays a list of all the orphans it finds in the database in the Orphans tab.
McAfee Utilities Launch Rocket Wizard dramatically reduces application launch times. It does this in two ways: • Normal Acceleration–McAfee Utilities keeps track of the order in which various parts of an application load. Thereafter, whenever you launch that application, McAfee Utilities directs your system to read those files from the hard disk in the most efficient manner.
For step-by-step instructions to perform any of these tasks, see online Help of Shortcut Wizard in McAfee Utilities or click the Help button within the wizard dialog box. Prevent and Protect...
McAfee Utilities Figure 4-15. McAfee Crash Protector dialog box When you see this dialog box, the application has caused an error which usually means it has gone astray. Therefore your data may already be lost or damaged. This dialog box lets you choose what to do with the faulty program.
4. Exit the application immediately and restart Windows. Selecting Crash Protector Properties McAfee Crash Protector lets you select a variety of properties that determine how the utility behaves and what kind of protection it gives you. To select Crash Protector properties: 1.
McAfee Utilities 4. Click the Apply button when you finish selecting options. 5. Click OK to close the Crash Protector Properties. Deactivating Crash Protector You can deactivate Crash Protector whenever you like without restarting Windows. To deactivate Crash Protector: 1. Right-click on the Guardian icon in the system tray (The blue cross icon near the system clock) 2.
McAfee Utilities NOTE: By disabling CPR, Crash Protector, or portions of it, you eliminate error protection, crash recoverability, and reactivation of programs that are not responding. WinGauge WinGauge is a dynamic reporting tool that constantly monitors your use of Windows and your applications, to alert you to potential problems before they become serious.
McAfee Utilities Working with gauges In WinGauge, you can set global gauge commands or set specific commands for each gauge. You can also add, update, or remove gauges. Adding a new gauge If you don’t see a particular gauge in the WinGauge window, you can add it to the window.
McAfee Utilities NOTE: A short description about a gauge’s function will appear in the description window of this dialogue box when you click on the gauge name. Click the Help button for additional gauge information 4. Click OK to add a gauge.
Page 96
McAfee Utilities To resize the WinGauge window: 1. Point to any corner or side of the WinGauge window. 2. Drag the window edge in any direction to a new location. Point to a side or corner of the WinGauge window and...
McAfee Utilities Rearranging gauges in the WinGauge window You can drag gauges around in the gauge area to move them to a new location in the WinGauge window. You might do this to place related gauges in adjacent positions. The titlebar must be visible in order to rearrange gauges.
Page 98
McAfee Utilities Data style Selecting a Data Style of Color Lines, Color Fill, Solid Lines, or Solid Fill makes certain Colors options visible. Size Selecting double wide or tall, both, or default adjusts the gauge size. Gauge text You can select whether to display a gauge’s title and value, show the title vertically or horizontally, and show the value as a percent.
Page 99
McAfee Utilities • Alarm Background (default maroon red)–Sets the color for the alarm background of the gauge indicator. Text (default black) Warning Regular (default bright yellow) (default lime green Frame Alarm (default white) (default bright red) • Warning (default bright yellow)–Sets the color for warning data usage (visible when Data Style is set to Color Lines or Color Fill).
Page 100
McAfee Utilities Warnings and Alarms Thresholds Threshold settings are available for warnings and alarms. Simply point, click, and drag the slider on each rule to set the threshold for warnings and/or alarms. The thresholds are constrained to each other (from Off to 100%). This constraint relationship is determined by whether the Invert Alarms check box is selected.
McAfee Utilities Show Bubble Help Select the Show Bubble Help check box to display Bubble Help when you point to a gauge. The delay time specifies the time in which the help information is delivered upon pointing to a gauge.
TIP: To have WinGauge automatically load a particular gauge settings file, specify the file name in the WinGauge shortcut properties sheet. VirusScan Please refer to the McAfee VirusScan in Chapter 3 for complete guide and related information. Trash Guard When you enable Trash Guard, all deleted files are moved to the Recycle Bin.
McAfee Utilities Safe & Sound lets you create backup sets in protected volume files, which is the safest and preferred type of backup, and is unique to McAfee Utilities. A protected volume file is a sectioned-off area of the drive, sometimes called a logical drive.
McAfee Utilities Creating automatic backups When you select to have Safe & Sound automatically create a backup set for you, it creates the first backup set while you are stepping through the Safe & Sound Wizard. Thereafter, while the Enable Automatic Backup option is selected, it continues to update your backup set at the time delay you’ve...
To create a backup set: 1. Launch Safe & Sound by doing one of the following: • From the McAfee Utilities central window, click Prevend and Protect. Then click Safe & Sound. • Click Start in the Windows taskbar; point to Programs. Next, select McAfee Utilities;...
Page 106
McAfee Utilities Protected Volume File–The Protected Volume File is the preferred backup type. A protected volume file is a sectioned off portion on the drive. It has special characteristics to ensure that even if organizational structures, such as the file allocation table on the drive is corrupted or lost, or the data becomes scrambled, the files in the backup set can be reconstructed.
Page 107
McAfee Utilities • Protected Volume Drive Letter–(available only for backup sets stored as a Protected Volume File). The drive letter you want to use for the Protected Volume File backup set. • Keep Deleted Files For–Select how long you want the backup set to keep files whose original counterparts have been deleted from your system.
McAfee Utilities If you are not yet familiar with file types and want to see them, you can open My Computer or Windows Explorer, choose the Options command from the View menu, and click the File Types tab. In the Options dialog box you can examine the list of the registered file types on your system.
Choose the McAfee Utilities command from the Start menu and click the Safe & Sound button. • Choose the Programs > McAfee Utilities > Safe & Sound command. 2. Select the backup set to modify and click the Properties button. User’s Guide...
Windows. If it is damaged, Safe & Sound starts and asks if you want to repair the backup set. To repair or rebuild a backup set: 1. Start McAfee Utilities Safe & Sound utility and click Next > while the Repair or Rebuild Backup Set radio button is selected. 2. Do one of the following: •...
Then click Save. Secure and Manage The McAfee Utilities Secure and Manage suite enables you to customize appearance of your Windows (including desktop); create launching pads where you can place any desktop icon for easy access; encrypt or decrypt files for added security and privacy;...
Page 112
McAfee Utilities • Boot to Windows–Select this check box to start Windows when you start your computer. When you deselect this check box and restart your computer, it boots up and takes you to the DOS prompt (usually the C:\>...
• Change–Select a screen in the pop-up menu. Then click Change to select a bitmap image (.BMP) or logo file (.SYS) to use for it. Note, Start-up images must be 320 x 400 color images—several are provided in the McAfee Utilities directory.
Page 114
McAfee Utilities Click the Folder Select the shortcut indicator type icon button to display the Change Icon dialog box where you can Drag the slider select a left to make custom shortcut menus appear icon by filename faster, or right...
McAfee Utilities Run/Add/Remove tab The Run/Add/Remove tab lets you add, remove, edit, and specify properties for programs that automatically run when you start Windows, and for programs that appear on the Start > Program menu. The Run/Add/Remove options are: • Programs Run Automatically at Windows Startup–Click Add to add a new program to run automatically at Windows startup.
McAfee Utilities Send To tab The Send To tab lets you add, remove, edit, and select properties for the commands that appear on the File > Send To menu. The Send To menu is also sometimes available in the context-sensitive pop-up menu that appears when you Right-click the mouse button, such as when you point to an icon in My Computer.
McAfee Utilities In most cases, each Context menu command has a check box beside it. By selecting or deselecting the check box, you can enable or disable each command performed by a Context menu handler. Some Context menu commands have a folder icon next to them, instead of a check box.
Starting Launch Pad To start Launch Pad, click the Launch Pad icon on your desktop, or choose the Launch Pad command from the Start > Programs > McAfee Utilities menu. An empty Launch Pad appears, which is a small window.
McAfee Utilities To dock Launch Pad, drag Launch Pad close to any edge of the desktop where you want it to be docked. Then point inside the Launch Pad window and Right-click. Choose the Dock Launch Pad command from the Global menu, and Launch Pad snaps to the edge of the desktop.
McAfee Utilities • Email plugins. One of the most convenient ways to use PGP is through one of the popular email applications supported by the PGP plug-ins. With these applications, you can encrypt and sign as well as decrypt and verify your messages while you are composing and reading your mail with a simple click of a button.
McAfee Utilities 6. Type a passphrase. An adequate passphrase contains multiple words and may include spaces, numbers, and punctuation characters. Choose something that you can remember easily but that others won’t be able to guess. NOTE: If you are creating a key with the same user name or email address as a previous key, you are given the opportunity to sign the new key with your older key.
McAfee Utilities Decrypting emails and files When someone sends you encrypted data, you can unscramble the contents and verify any appended signature to make sure that the data originated with the alleged sender and that it has not been altered.
McAfee Utilities When a PGPdisk volume is mounted, you can use it as you would any other disk. You can install applications within the volume, move or save your files to the volume. When the volume is unmounted, it is unaccessible to anyone who does not know your secret passphrase, which is a longer version of a password.
McAfee Utilities Move your mouse around in a random manner within the Wizard window and/or randomly press characters on your keyboard until progress bar shown in the dialog box is completely filled in. The mouse movement or character pressing on your keyboard generates random information used by the PGPdisk program as part of the encryption (data scrambling) process.
McAfee Shredder does this for you by “security wiping” deleted files so they cannot be restored or rebuilt using undelete utilities. Unlike other file security erase programs, McAfee Shredder erases even the file name and the compressed data on DriveSpace drives. Note that it is not possible to shred network files, or files compressed with compression other than DriveSpace in an absolutely secure manner.
Page 126
If you have selected the McAfee Shredder properties option to Prompt Before Shredding, a message appears listing the first file you dragged onto the McAfee Shredder icon. It asks you to confirm that you want to shred this file. 2. Do one of the following: •...
Next >. Then click Finish. A message appears showing you how the non-file data erasure is progressing. When the process is complete, McAfee Shredder closes and returns you to the desktop. McAfee Zip Manager A zip file is a file that has been compressed and which, therefore, takes up less space than it did in its original, decompressed form.
McAfee Utilities The McAfee Zip Manager is a complete zip management utility that you can use in two ways: via ZipMan Wizard or the advanced McAfee Zip Manager. ZipMan Wizard provides you with all the zip file management features you will normally use.
You can specify the properties that you want McAfee Zip Manager to have. The properties that you select apply to both ZipMan Wizard and advanced McAfee Zip Manager, but you can override some of these properties if you are working in advanced McAfee Zip Manager.
Page 130
Compression options • Save Folder Information–saves the folder name with the files you select. When you unzip these files, McAfee Zip Manager checks whether the same folder names exist as subfolders at the location where you want to place these extracted files. If the subfolders do not exist, McAfee Zip Manager creates them.
Click the Advanced button in any ZipMan Wizard window to automatically go to the advanced McAfee Zip Manager. Click the ZipMan Wizard tool button in the McAfee Zip Manager window to instantly go to ZipMan Wizard. Using Advanced McAfee Zip Manager Advanced McAfee Zip Manager provides all the capabilities of ZipMan Wizard, plus other, more advanced zip file maintenance features.
Page 132
Column title boxes File table McAfee Zip Manager tool buttons TIP: Point to a McAfee Zip Manager tool button and the status bar at the bottom of the window displays a brief description of the tool button’s purpose. The McAfee Zip Manager tool buttons on the toolbar allow you to quickly: •...
McAfee Utilities McAfee Zip Manager file table The file table in the McAfee Zip Manager window displays the files you are currently manipulating. You can select files by clicking them, using standard Windows selection techniques. You can rearrange the columns by dragging the column title boxes left or right to a new location.
McAfee Firewall About McAfee Firewall McAfee Firewall is a personal firewall that lets you monitor, control and log your PC's network activity. It protects you from Internet hackers and keeps your PC private. McAfee Firewall: • Stops fileshare and printshare access attempts.
In addition, during the installation process, it will prompt you with some basic questions to set up McAfee Firewall to do specific tasks, according to your needs (e.g. allow sharing of files or not). About Winsock 2 McAfee Firewall uses an API (Application Programming Interface) that is not supported by versions of Winsock prior to v2.0.
Settings/Applications menu item. There, you can move applications into either the "Trusted" list or the "Blocked" list. When you exit McAfee Firewall, your settings are saved and will be the same the next time it is run. User’s Guide...
Control system The operating system performs many types of network communication without reporting directly to the user. McAfee Firewall lets the user allow or block different system functions explicitly. Settings may be different for each network device, since a PC may, for example, be on an internal network as well as having a dial-up connection to the Internet.
Linux and Unix. When you use a password to protect your configuration: • The settings cannot be changed while McAfee Firewall is running unless the correct password has been entered.
7. Choose "OK" to close the dialog box. 8. Choose File/Save Settings if you want to write this new configuration to disk immediately. Note: the configuration is automatically written to disk when you exit McAfee Firewall. McAfee Office...
McAfee Firewall Configuring System Settings The following steps will help the Administrator set up the System portion of the configuration. While the configuration file (CPD.SFR) is not intended to be transferrable, the Applications settings can be successfully copied from one system to another.
McAfee Firewall Configuration after Adding/Removing Network Devices The System Settings must be verified after changes are made to network devices. This is especially important if a network device is added or removed. If a device was removed, all settings may have to be re-entered, because they previous settings may now be associated with the wrong device.
Page 143
It is better to use a new password every time you make an important configuration change. Every file you create with a password is "valid" in that McAfee Firewall will see that it matches the password you used for it. Using a new password prevents someone from secretly replacing an older configuration file for a newer one.
Using McAfee UnInstaller Before you can start using the powerful features of UnInstaller, it will first create a SmartLinks database to store information between files on your computer (see SmartLinks database).
McAfee UnInstaller • Each time you start UnInstaller, the old version of the database is compared with new information on your computer. • After you restore files or applications from UnInstaller backup copies, UnInstaller records changes that it has just made.
Page 147
McAfee UnInstaller NOTE: Wizards are designed to be easy to understand and to use. Each wizard screen tells you what you need to know to enter information or choose options. If you want to know more about a wizard, click Help.
About McAfee Guardian You use McAfee Guardian to schedule the QuickClean wizard that keeps your computer free of junk files and to set up Installation Monitor so that it either does or does not run in the background as you work.
Page 149
McAfee UnInstaller To schedule an UnInstaller event: 1. Right-click the Guardian icon in the clock area of the Windows taskbar, and choose What’s Scheduled from the popup menu. Figure 6-16. Scheduling events The What’s Scheduled dialog box appears. 2. Select QuickClean or Installation Monitor from the list of scheduled events in the Events window and click Schedule to open the Event Schedule dialog box.
McAfee UnInstaller Using QuickClean Use the QuickClean wizard to perform any of the following actions to keep your computer free of unused files and invalid shortcuts: • Remove unused files in the cache folder of your Internet browser. • Remove any temporary files in folders that are used by applications and Windows.
How do I schedule QuickClean to run at a specific time? Events for McAfee applications are managed by the McAfee Guardian. Each McAfee application adds to the list of events that the Guardian can run at a scheduled time. To change the QuickClean schedule: 1.
McAfee UnInstaller No file is deleted if it has been modified or accessed within the period specified by the SpaceMaker page of the Settings dialog box. The default period is 180 days. To view or change SpaceMaker defaults, click Settings from the Options menu, and click the SpaceMaker tab in the Settings dialog box.
McAfee UnInstaller Using Transport Use the Transport wizard to package an entire application and its configuration settings so that you can rebuild the application with exactly the same option settings on a different computer. To start the Transport wizard, click Transport in the UnInstaller window.
McAfee UnInstaller You do not need to have UnInstaller installed on the machine where you reinstall the transported application. You do need to make sure that the application license agreement permits you to use the application on more than one computer.
McAfee UnInstaller After the Archive wizard creates the compressed archive file, it removes the application from the folder where it was installed, but leaves the shortcuts to the application in place. When you click a shortcut to the application in the...
McAfee UnInstaller If you have installed a second hard disk, relocate some applications from your primary hard disk to create more space there. • From your local computer to a drive on another computer. If you have more than one computer at your disposal, you can manage how you use the available disk space by moving applications between hard drives.
McAfee UnInstaller To run Installation Monitor automatically in the background while you work, you must select either or both of the options on the BackTrack page. When BackTrack Monitor detects an installation program, it displays a message box where you can choose whether to monitor the installation.
McAfee UnInstaller To undo an application installation: 1. Click BackTrack in the main UnInstaller screen to start the BackTrack wizard. 2. In the first BackTrack wizard screen, click Next. 3. Select the BackTrack archive from the list and click Next again.
McAfee UnInstaller • The information in the Restore wizard list includes the name of the backup or archive file, such as “Archive of Glaxian,” the name of the wizard that created the backup, and the date the backup was created.
McAfee UnInstaller To restore individual files: 1. Click Restore in the main UnInstaller window. 2. On the Restore wizard screen, click the arrow by the dropdown list and select the backup or archive folder. To see a list of the files contained in the backup or archive, click Next.
McAfee UnInstaller You can perform the same actions on individual files or groups of files that the UnInstaller wizards perform on entire applications. • Find out what application uses a selected file. Right-click File Links from the popup menu to see what application uses a selected file.
Page 162
McAfee UnInstaller When you want to use PowerClean to manage files, clear the check next to Read-only mode on the PowerClean page of the Settings dialog box. Open the Settings dialog box by clicking Settings from the Options menu. The PowerClean feature opens in a dialog box that works like the Windows Explorer.
Page 163
McAfee UnInstaller The major file groups are described briefly in the following table. A description of the selected group or subgroup appears in the Advice tab pane. Note that some files appear in more than one group. For example, the...
Page 164
McAfee UnInstaller The PowerClean default file groups (Continued) Category Description Windows Registry Important Registry entries for applications. Registered File Types Files in each file-type category that is associated with an application. Custom File Groups This group contains file groups that you name and define.
McAfee UnInstaller 5. Click OK to save the new group. To change the definition of a custom file group: 1. Select the file group in the Cleanup Types list. 2. Click Edit File Group from the Tools menu. The Custom Group dialog box appears.
McAfee UnInstaller Using the tab panes? The tab panes below the group and file lists display information, either about the selected file or about the actions that you have performed during this PowerClean session. Information in the PowerClean tab panes Click this To see...
McAfee UnInstaller In some cases, the color code is determined by your default settings. For example, if you specify that files of a specific type in a specific location should never be deleted, those files are marked with a red circle.
McAfee UnInstaller If you have started UnInstaller, but are not are not working with the PowerClean feature, click Options in the main UnInstaller window, then click Settings in the menu that appears. When the Settings dialog box opens, click the PowerClean tab.
Page 169
McAfee UnInstaller When you first open the Reports dialog box, you see summary information from the Master Log in all pages. To see information about a specific action, click Open. Then choose the action from the list that appears, and click OK.
While most of these files are harmless, some can invade your privacy or even damage the data on your computer’s hard drive. McAfee’s Internet Guard Dog addresses any of these potential risks with its comprehensive features designed to protect your privacy and security when surfing the Internet.
McAfee Internet Guard Dog Activity Logs On the Product Name Home screen, Activity Logs allow you to view a list of all the interactions that you and other profiled users of your computer had with Product Name, including the date and time of the action. You can print, save or clear this list.
McAfee Internet Guard Dog Protection from privacy threats • Identity Protector monitors your Internet connection and warns you before private information is sent to an unsecure Internet site. It stops programs and other people that use your computer (like your kids) from sending your name and credit card numbers over the Internet without your approval.
• Scheduler to launch the McAfee VirusScan Scheduler. This utility enables you to configure and run unattended virus scan operations. • Virus info to display virus information via the McAfee Web site. Using the Internet Guard Dog Interview Although Product Name is set up to use security and privacy settings that are appropriate for most users, some features require your input.
McAfee Internet Guard Dog • Other financial numbers such as bank account, brokerage account, credit card, phone card, and so on. • Any Web site login names and passwords that you want to store in Password Manager. Information about other users of your computer. If you are the Administrator, you can create user profiles and set protection settings that Internet Guard will use whenever the user is browsing the Internet via your computer.
McAfee Internet Guard Dog Self-Administrator The Internet Guard Dog Administrator may designate another user as a Self-Administrator. This feature may be used if for example, the user is an adult and is deemed responsible enough to customize his privacy and protection settings on his own.
Perform a security check to find any privacy or Security Check security problem on your computer. Display user activity logs Activity Logs Display the McAfee Software Home screen in Help, then select McAfee your Web browser. Software on the Web Display the McAfee Software Support page in Help, then select Product your Web browser.
McAfee Internet Guard Dog User Profile To customize protection settings for another user, click User Setup from the Internet Guard Dog Home page, the User Setup screen is displayed. You can add, edit or delete a user’s profile from this screen. Click any of the buttons available and follow through the instructions displayed on screen.
McAfee Internet Guard Dog • Word List. This option allows you to filter Web sites and chat messages using words and phrases. • Ad Blocker. Select this option if you want Internet Guard Dog to block certain ads that you do not want the user to view.
McAfee Internet Guard Dog Performing a Security Check After completing the interview, you’ll want to find out how your PC may be at risk. Security Check examines your PC for privacy and security problems and then guides you through fixing any problem it finds. If you are using the settings suggested by Product Name in the interview, you only need to run Security Check right after installation and then every month or so.
McAfee Internet Guard Dog If you find over time that you are being alerted to potential security risks too often, you can adjust the alert message settings in Protection Settings. Cookie Blocker and Gatekeeper require a period of adjustment before Product Name has learned to address your concerns with the least amount of disruption.
Page 182
McAfee Internet Guard Dog To open Browser Buddy 1. Right-click the Product Name icon on the Windows taskbar, then click Browser Buddy. The dialog box is displayed. Figure 7-18. Browser Buddy To add a new username and password 1. In Browser Buddy, select Add New Entry from the Password Manager drop-down list.
McAfee Internet Guard Dog To retrieve your username and password 1. In Browser Buddy, select the site name if it doesn’t appear automatically in the Current Web Site list. 2. Drag your username or password from the Password Manager box to appropriate field in your Web site’s login form.
McAfee Internet Guard Dog If during the Interview, you accepted Internet Guard Dog’s recommendation on how to respond to cookies, Cookie blocker will: • Automatically allow cookies to be accepted from direct sites. • Display an alert message when an indirect sites tries to set a cookie.
McAfee Internet Guard Dog What Web Trail Cleaner does As you surf the Internet, your browser stores information that makes your browsing experience more satisfying. It uses the information as follows: Your browser uses Cached files Speed up the display of Web page elements such as graphics.
McAfee Internet Guard Dog • Your browser is directed to a harmful site—one that has been known to contain virus-infected files (e.g., Trojan horses, prank or destructive ActiveX controls, or other security concerns). • A program silently uses your modem to connect to another computer.
McAfee Internet Guard Dog • An ActiveX control attempts to delete files on your hard drive. • An ActiveX control attempts to scan files on your hard drive. • A program attempts to access your system password files. When Product Name displays an alert message, you can decide...
Page 188
McAfee Internet Guard Dog 2. Change the information that you want to store in the record. 3. Click OK. To remove a password record • In the Password Manager list, click a record to select it, then click Remove. McAfee Office...
PGP Personal Privacy The PGP Personal Privacy secures and protects the privacy of your data by encrypting it so that only the intended individuals can read it. You can also sign information digitally to ensures it’s authenticity. Using PGP Personal Privacy Figure 8-1.
• If you are using an email application supported by the plug-ins, you can encrypt and sign your messages by selecting the appropriate options from your application’s tool bar. McAfee Office...
PGP Personal Privacy • If your email application is not supported by the plug-ins, you can perform the appropriate functions from PGPtray. You can also encrypt and sign files from PGPtools before attaching them to your email. Encrypting ensures that only you and your intended recipients can decipher the file’s contents;...
When you choose PGP Preferences from the PGP pop-up menu, you access the PGP Preferences dialog box in which you specify settings that affect how the PGP program functions based on your computing environment. By clicking the appropriate tab, you can advance to the preference settings you want to modify. McAfee Office...
PGP Personal Privacy Getting Help When you choose Help from the PGP menu or window, you access the PGP online Help system, which provides a general overview and instructions for all of the procedures you are likely to perform. Many of the dialog boxes also have context-sensitive help, which you access by clicking the question mark in the right corner of the window and then pointing to the area of interest on the screen.
Windows Explorer, you must manually select the recipient’s public key from the PGP Key Selection dialog box. To select a recipient’s public key, simply drag the icon representing their key into the Recipient’s list box and then click OK. . McAfee Office...
PGP Personal Privacy Taking shortcuts Although you will find that PGP is easy to use, a number of shortcuts are available to help you accomplish your encryption tasks even quicker. For instance, while you are managing your keys in the PGPkeys window, you can press the right mouse button to perform all the necessary PGP functions rather than accessing them from the menu bar.
NOTE: Passphrase should contain more than one word, along with spaces, numbers, and other recognizable characters. Choose something you are very familiar with. It is important that you do not forget your passphrase or you will lose your data. 8. Click Next. McAfee Office...
PGP Personal Privacy Move your mouse around in a random manner within the Wizard window and/or randomly press characters on your keyboard until progress bar shown in the dialog box is completely filled in. The mouse movement or character pressing on your keyboard generates random information used by the PGPdisk program as part of the encryption (data scrambling) process.
If removing a public key • Drag the key or keys you want to remove from the bottom pane of the window, to the top of the pane. 5. Click OK. McAfee Office...
Product Support BEFORE YOU CONTACT McAfee Software for technical support, locate yourself near the computer with McAfee Office installed and verify the information listed below: • Have you sent in your product registration card? • Version of McAfee Office • Customer number if registered •...
We encourage you to make this your first stop for answers to frequently asked questions, for updates to McAfee software, and for access to McAfee news and virus information. Take advantage of the McAfee Product KnowledgeCenter—your free online product support center - 24 hours a day, 7 days a week (http://www.mcafeehelp.com).
Index Backup strategies Acceleration Type normal or super Backup Set ActiveX controls creating deleting files modifying protection against damage by Backups scanning hard drives automatic alert messages where to store them help for why you need them America Online Benchmarks information mail client, supported in VShield Boot delay Appearance tab...
Page 202
Download Scan module set up Cookie Blocker using configuration wizard Browser Buddy and described Drives information cookies DriveSpace Browser Buddy drivers corporate e-mail systems, choosing in configuration wizard credit cards Edit protecting with Gatekeeper Registry entry protecting with Identity Protector McAfee Office...
Page 203
Index e-mail files client software deleting manually choosing in configuration wizard infected supported in VShield cleaning by yourself when VirusScan cannot E-mail Scan module protecting from ActiveX controls set up protecting with File Guardian using configuration wizard removing junk files emergency boot disk Find Emergency Disk...
Page 204
MAPI (Messaging Application Programming Instructions for Administrators Interface) e-mail clients choosing in configuration wizard Internet e-mail clients, choosing in configuration wizard Internet connection, protecting Internet Explorer as browser supported in VShield Internet Filter module set up using configuration wizard McAfee Office...
Page 205
Index McAfee Firewall Orphans finding McAfee Firewall - how it works Outlook and Outlook Express McAfee Firewall configuration as e-mail clients supported in VShield McAfee Guardian. SeeGuardian. distinguishing between McAfee Image ?? to McAfee Shredder McAfee Zip Manager panic, avoiding when your system is infected...
Page 206
Quick Copy file groups described quick start for VShield configuration original default settings listed read-only mode, turning off QuickClean wizard tab panes, using how to use scheduling setting defaults for McAfee Office...
Page 207
Index Restore wizard restoring archived applications read-only mode, turning off for PowerClean restoring deleted files feature dialog box restoring reasons to run VShield deleted application rebooting, with the Emergency Disk deleted files rebuilding transported applications transported applications Refresh Registry database undoing a monitored application installation file type...
Page 208
Launch Pad System activity Launch Rocket McAfee Image ?? to system crashes, attributing to viruses McAfee Shredder System Scan module McAfee Zip Manager set up Registry Pro using configuration wizard Registry Wizard Retake Shortcut Wizard Trash Guard Undelete WinGauge...
Page 209
Index WinGauge Winsock 2 viruses Wizard, button in VShield Properties dialog effects of removing before installation, necessity of and wizards steps for Archive from infected files listed and described threats Move VirusScan QuickClean components included with Remove description of program components SpaceMaker installation Transport...
Need help?
Do you have a question about the OFFICE 3.1 and is the answer not in the manual?
Questions and answers