Table of Contents

Advertisement

McAfee Office
Version 3.1
User's Guide

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the OFFICE 3.1 and is the answer not in the manual?

Questions and answers

Summary of Contents for McAfee OFFICE 3.1

  • Page 1 McAfee Office Version 3.1 User’s Guide...
  • Page 2 1. License Grant. Subject to the payment of the applicable license fees, and subject to the terms and conditions of this Agreement, McAfee hereby grants to you a non-exclusive, non-transferable right to use one copy of the specified version of the Software and the accompanying documentation (the "Documentation").
  • Page 3 4. Ownership Rights. The Software is protected by United States copyright laws and international treaty provisions. McAfee and its suppliers own and retain all right, title and interest in and to the Software, including all copyrights, patents, trade secret rights, trademarks and other intellectual property rights therein.
  • Page 4 Software is contained. You must return the defective media to McAfee at your expense with a copy of your receipt. This limited warranty is void if the defect has resulted from accident, abuse, or misapplication. Any replacement media will be warranted for the remainder of the original warranty period.
  • Page 5 CHARACTER INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF GOODWILL, WORK STOPPAGE, COMPUTER FAILURE OR MALFUNCTION, OR FOR ANY AND ALL OTHER DAMAGES OR LOSSES. IN NO EVENT WILL MCAFEE BE LIABLE FOR ANY DAMAGES IN EXCESS OF THE LIST PRICE MCAFEE CHARGES FOR A LICENSE TO THE SOFTWARE, EVEN IF MCAFEE SHALL HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
  • Page 6 12. McAfee Customer Contact. If you have any questions concerning these terms and conditions, or if you would like to contact McAfee for any other reason, please call (408) 988-3832, fax (408) 970-9727, or write: McAfee Software, 3965 Freedom Circle, Santa Clara, California 95054.
  • Page 7: Table Of Contents

    McAfee Internet Guard Dog ........18...
  • Page 8 McAfee Utilities central window ........53...
  • Page 9 Table of Contents Working with advanced information ......72 Specifying Discover Pro settings ......74 Using the multi-window views .
  • Page 10 McAfee Shredder ........
  • Page 11 Chapter 5. McAfee Firewall ........135...
  • Page 12 About McAfee Guardian ........148...
  • Page 13 Table of Contents Internet Guard Dog and your online connection ..... .172 Internet Guard Dog features ........172 Protection from privacy threats .
  • Page 14 Index ............201 McAfee Office...
  • Page 15: Chapter 1. Welcome To Mcafee Office

    Through a central interface, McAfee Office improvs integration with the individual components of the product suite. For example, instead of launching a separate McAfee Utilities main menu, a user can access all functions of McAfee Utilities directly from the McAfee Office Central interface.
  • Page 16: Mcafee Virusscan

    24 hours a day. McAfee Utilities McAfee Utilities helps you keep your PC working at optimum efficiency and speed. You can diagnose and repair your system and application software; create a recovery disk and image snapshots of critical sectors of your hard drives;...
  • Page 17: Mcafee Uninstaller

    • Disk Minder safely, easily, and quickly diagnoses and repairs existing or potential disk problems. • McAfee Image saves a copy of critical disk information in a file and restores the image later if your disk is corrupted. • Registry Wizard allows you to easily maintain, troubleshoot, or repair the Registry database.
  • Page 18: Mcafee Internet Guard Dog

    ActiveX controls, and Java applets. McAfee Internet Guard Dog McAfee Internet Guard Dog is designed to ensure that you can use all aspects of the Internet without worrying that your privacy and computer security will be compromised.
  • Page 19: Mcafee Firewall

    Welcome to McAfee Office McAfee Firewall McAfee Firewall is a personal firewall that lets you monitor, control and log your PC's network activity. It protects you from Internet hackers and keeps your PC private. McAfee Firewall filters traffic at the devices that your system uses - network cards and modems.
  • Page 20: Other Features

    McAfee on the Web McAfee.com unveiled a new web site with a host of new services and online applications dedicated to updating, upgrading, and managing PCs over the web. McAfee.com provides personalized PC management.
  • Page 21: Improvements

    McAfee Office. Common rescue disk McAfee Office will allow the user to create a single rescue disk for use in the event that their Windows system will not boot. Single update button McAfee Office can automatically update all of the installed components via the info button.
  • Page 22 (text document) files. In Windows Explorer: navigate to the Program Files folder on your hard drive; locate the McAfee Office folder; find any whatsnew.txt files in the folder; then double-click to open and view information.
  • Page 23: Chapter 2. Installating Mcafee Office

    Installating McAfee Office System requirements Prior to installing McAfee Office, please verify your existing PC system hardware components and configuration. The installation requirements and recommendations for the entire suite of McAfee Office are as follows: ® • Intel 486 or higher, Pentium recommended ®...
  • Page 24: Installation

    Installation When you begin installation of McAfee Office, the AutoRun program prompts you to choose a location where you want to install McAfee Office. You can accept the default location, or type in a new location. Use the following procedure to install the suite of utilities included with McAfee Office.
  • Page 25 Installating McAfee Office 3. Click Install McAfee Office. 4. Follow the instructions displayed in the window to complete installation. NOTE: Prior to installing any application from the McAfee Office suite, McAfee Office Central will identify any existing copies on your system.
  • Page 26 Installating McAfee Office McAfee Office...
  • Page 27: Chapter 3. Mcafee Virusscan

    The scan engine, meanwhile, combines the best features of technologies that McAfee and McAfee VirusScan researchers developed independently for more than a decade.
  • Page 28 Help icon on the upper right-hand corner of the window. To view available options in customizing how you want McAfee VirusScan components to work on your PC, click the Options button. • The VirusScan Console. This component allows you to create, configure and run VirusScan tasks at times you specify.
  • Page 29 McAfee VirusScan • The VShield scanner. This component gives you continuous anti-virus protection from viruses that arrive on floppy disks, from your network, or from various sources on the Internet. The VShield scanner starts when you start your computer, and stays in memory until you shut down. A flexible...
  • Page 30 • The SendVirus utility. This component gives you an easy and painless way to submit files that you believe are infected directly to McAfee anti-virus researchers. A simple wizard guides you as you choose files to submit, include contact details and, if you prefer, strip out any personal or confidential data from document files.
  • Page 31: What's New With Virusscan

    The next sections discuss other changes that this VirusScan release introduces. Installation and distribution features McAfee anti-virus products, including VirusScan software, now use the Microsoft Windows Installer (MSI), which comes with all Windows 2000 Professional systems. This Setup utility offers a wealth of custom installation and configuration features that make VirusScan software rollout across large organizations much easier and more intuitive.
  • Page 32 VirusScan software still requires regular .DAT file updates to keep pace with the 200 to 300 new viruses that appear each month. To meet this need, McAfee has incorporated updating technology in VirusScan software from its earliest incarnations. With this release, that technology takes a quantum leap forward with incremental .DAT...
  • Page 33: Starting The Virusscan Application

    Now or Run Now in a separate step to start an actual scan operation. Displaying the VirusScan application main window Follow these steps: 1. Click Start in the Windows taskbar, point to Programs, then to McAfee Office. Next, choose McAfee VirusScan. The VirusScan main window appears.
  • Page 34 McAfee VirusScan Figure 3-2. VirusScan main window From the McAfee VirusScan main window, you can: • Start scanning immediately. Click Scan to have the application scan your system with the last configuration options you set, or with default options. The following screen (Figure 3-2) allows you to select which area of your computer you want to scan.
  • Page 35 McAfee VirusScan Figure 3-3. Scan Now window • View the VirusScan application activity log. Through this window you are able to view a log of VirusScan activities performed on your your computer. You can also select to clear or print any of these activity logs (see Figure 3-3).
  • Page 36 • Set options. From the main window, the Options icon allows you to access and customize settings of the other components of McAfee VirusScan via a drop-down menu (e.g., Safe & Sound, and Emergency Disk).
  • Page 37: If You Suspect You Have A Virus

    McAfee VirusScan If you suspect you have a virus... First of all, don’t panic! Although far from harmless, most viruses that infect your machine will not destroy data, play pranks, or render your computer unusable. Even the comparatively rare viruses that do carry a destructive payload usually produce their nasty effects in response to a trigger event.
  • Page 38 NOTE: McAfee strongly recommends that you do not interrupt the BOOTSCAN.EXE scanner as it runs its scan operation. The Emergency Disk will not detect macro viruses, script viruses, or Trojan horse programs, but it will detect common file-infecting and boot-sector viruses.
  • Page 39 McAfee VirusScan If BOOTSCAN.EXE finds a virus, it will try to clean the infected file. If it fails, it will deny access to the file and continue the scan operation. After it finishes all of its scanning passes, it shows a summary report the actions it took for each hard disk on the screen.
  • Page 40: What Does The Vshield Scanner Do

    McAfee VirusScan What does the VShield scanner do? McAfee desktop anti-virus products use two general methods to protect your system. The first method, background scanning, operates continuously, watching for viruses as you use your computer for everyday tasks. In the VirusScan product, the VShield scanner performs this function.
  • Page 41: Why Use The Vshield Scanner

    McAfee VirusScan NOTE: Because the VShield scanner runs continuously, you should not install or run more than one VShield scanner on the same workstation. Doing so can cause the scanners to interfere with each others' operations. Why use the VShield scanner? The VShield scanner has unique capabilities that make it an integral part of the VirusScan comprehensive anti-virus software security package.
  • Page 42: Browser And E-Mail Client Support

    • Netscape Navigator v3.x • Netscape Navigator v4.0.x (not including v4.0.6) • Microsoft Internet Explorer v3.x, v4.x and v5.x McAfee has also tested these e-mail clients and verified that they work with the VShield Download Scan module: • Microsoft Outlook Express •...
  • Page 43 Professional, the VShield scanner loads as a Windows NT service called VShield, which you can see in the Windows Services control panel. NOTE: McAfee recommends that you do not start or stop the VShield service from the Windows control panel. Instead, you can stop and restart the scanner from the provided VirusScan control panel.
  • Page 44 McAfee VirusScan Figure 3-6. VirusScan control panel - Components page 4. Select the Load VShield on startup checkbox at the top of the Components property page. 5. Click OK to close the control panel. Enabling the VShield scanner and its modules Once you have all VShield components installed, you can use any of four methods to enable them, in various combinations.
  • Page 45 McAfee VirusScan Depending on which combination of modules you enable, the VShield icon will display a different state. Method 2: Use the System Scan Status dialog box Follow these steps: 1. Double-click the VShield icon in the Windows system tray to open the System Scan Status dialog box.
  • Page 46 McAfee VirusScan Figure 3-8. VShield Properties dialog box 2. For each module that you want to enable, click the corresponding icon along the left side of the dialog box, then click the Detection tab. 3. Select the Enable checkbox at the top of each page.
  • Page 47: Using The Vshield Configuration Wizard

    McAfee VirusScan Using the VShield configuration wizard After you install VirusScan software and restart your computer, the VShield scanner loads into memory immediately and begins working with a default set of options that give you basic anti-virus protection. Unless you disable it or one of its modules—or stop it entirely—you never have to worry about...
  • Page 48 McAfee VirusScan The System Scan module will also scan files stored on floppy disks whenever you read from or write to them, or when you shut down your computer. If it finds a virus, the module will sound an alert and prompt you for a response.
  • Page 49 McAfee VirusScan – Lotus cc:Mail. Select this button if you use cc:Mail versions 6.x and later, which use a proprietary Lotus protocol for sending and receiving mail. – MAPI-compliant e-mail client. Select this button if you use Microsoft Exchange or Microsoft Outlook, as your corporate e-mail system.
  • Page 50 McAfee VirusScan The module will look for viruses in those files most susceptible to infection and will scan compressed files as you receive them. Otherwise, select the No, do not enable download scanning checkbox, then click Next> to continue. The next wizard panel sets options for the VShield Internet Filter module.
  • Page 51: Using The Vshield Shortcut Menu

    • About. Choose this to display the VShield scanner’s version number and serial number, the version number and creation date for the current .DAT files in use, and a McAfee copyright notice. • Exit. Choose this to stop all VShield modules and to unload the entire VShield scanner from memory.
  • Page 52 McAfee VirusScan McAfee Office...
  • Page 53: Chapter 4. Mcafee Utilities

    McAfee Utilities central window Figure 4-1. McAfee Utilities Central window The McAfee Utilities Central window offers buttons to take you to the four suites of utilities (Figure 4-1). If you need help, click the Help icon at the upper right-hand side of the window to display the McAfee Utilities Central Help.
  • Page 54: Mcafee Utilities Properties

    McAfee Utilities McAfee Utilities Properties Before using McAfee Utilities, you can access the properties dialog box to customize the way you want its components to display and work on your computer. From the McAfee Utilities central window, click Options and select Properties to display the Properties dialog box.
  • Page 55: Window Patterns Tab

    After making your selection, click Apply; then click OK. Disk Tools tab The Disk Tools tab displays options you can set to access McAfee Utilities properties when you point and right-click drives on your computer. When this option is activated, select a drive on your computer; point and right-click on the drive;...
  • Page 56: Start Menu Tab

    Image Now... to take a snapshot of this drive using the McAfee Image. Follow the screen wizard to complete the task. If you do not want to perform any of these McAfee Utilities components via the Properties dialog box, select Disable this property sheet page.
  • Page 57: File Shredder Tab

    McAfee Utilities • If you want to add a new file format to be excluded, click Add New. Type the new file format in the space provided within the Files to exclude text box. After making your selection, click Apply; then click OK.
  • Page 58: Zip File Manager Tab

    • Compression Option is Save Folder Information. After making your selection, click Apply; then click OK. Repair and Recover Use McAfee Utilities Repair and Recover utilities to help you resolve problems with your PC’s system software and data. Disk Minder...
  • Page 59 McAfee Utilities Report errors only Before interactively fixing errors, you can run Disk Minder with the Report Errors Only option selected to examine or print reports describing a disk’s problems. To use Disk Minder to report errors only, start Disk Minder, click Properties, select the Report Errors Only check box and click OK.
  • Page 60: Customizing Disk Minder Properties

    McAfee Utilities Customizing Disk Minder Properties In addition to auto fix, report, and interactively fixing errors options, you can also select other properties options to set how you want Disk Minder to work on your computer. Select Properties options and click OK Figure 4-3.
  • Page 61: Creating And Reverting To An Undo File

    McAfee Utilities • Check for Duplicate File Names–checks for duplicate file names—files with the same name in the same directory. • Test Drive Surface–performs read/write tests of a disk’s recordable surface media. If a sector is damaged, Disk Minder saves the data elsewhere so you can try to recover it later.
  • Page 62: Mcafee Image

    “snapshot” of the most critical areas on your hard drives. You can use McAfee Image to make a snapshot of the most crucial information on your drives. It saves information that you’ll need if your hard disk ever fails. This ensures that you can use Image’s Restore option to restore the latest states of...
  • Page 63: Setting Image Properties

    Safe & Sound backup set. To restore one or more drives from an image file: 1. Start McAfee Image, select the Restore drive(s) from saved image radio button, and click Next >. User’s Guide...
  • Page 64 Figure 4-5. McAfee Image Recover 2. Do one of the following and click the Next > button: • Select an image file to use for restoring your drives from the list of those found on your system hard drive.
  • Page 65: Rescue Disk

    McAfee Utilities • File allocation tables–Select this option if your files are corrupted and you have been unable to repair them using Disk Minder. Often much or all of your data may be intact on the disk, but the file allocation tables (FATs) may be damaged.
  • Page 66: Using A Rescue Disk

    McAfee Utilities Using a Rescue Disk Insert your Rescue disk into drive A, reboot your computer (or turn on the power). If your system doesn’t boot, access CMOS and make sure the Booting From Floppy option is enabled. Then follow the instructions on the screen.
  • Page 67 McAfee Utilities 2. During CheckUp, the component currently under examination is highlighted. Status information at the bottom of the screen lets you know exactly what CheckUp is doing. To perform a specific CheckUp 1. If you are having a specific hardware problem, click the appropriate component in the CheckUp desktop.
  • Page 68: Using Universal Undo

    McAfee Utilities NOTE: If you know a component is operating properly but First Aid reports a problem, do not AutoFix it. First Aid may have incorrectly identified a “problem,” and the suggested fix may inadvertently cause a real problem to occur. If AutoFix produces unwanted changes in your PC, you can usually reverse the changes with Undo.
  • Page 69 McAfee Utilities Universal Undo allows you to undo: • A monitored event. Universal Undo monitors common events such as installing new software and drivers, and allows you to restore—safely and selectively—the changes made in the course of these events. • Changes to Windows settings. Most Windows configuration settings are housed in the Control Panel.
  • Page 70: Using Ask Advisor

    McAfee Utilities To undo a Control Panel setting: 1. Click Undo a Windows Settings Change on the Universal Undo screen. The Undo a Windows Setting dialog box appears. 2. Follow the screen instructions. Using Ask Advisor Ask Advisor allows you to access sources of information about your computer which can assist you in troubleshooting problems or simply learn more about your computer.
  • Page 71: Discover Pro

    McAfee Utilities 3. Click Next >. Then click Finish. 4. Insert a disk into drive A and click OK. Rescue Disk formats the disk and copies critical startup files to it, as well as any files you added. When the process is complete, Rescue Disk exits and returns to the desktop.
  • Page 72: Working With Advanced Information

    McAfee Utilities Discover Pro lets you view information about your hardware and software. Each tab in the Discover Pro window covers a specific aspect of your PC, ranging from a general overview of your system configuration through software to benchmark and diagnostic tests. You can click the Advanced button at any time to obtain a far more detailed analysis of the current tab’s...
  • Page 73 McAfee Utilities Discover Pro displays the Advanced window for the active tab. All the Advanced windows have these elements in common: • Icon Panel–Click any of the icons in the panel at the left to view that type of information in the panel at the right.
  • Page 74: Specifying Discover Pro Settings

    McAfee Utilities Specifying Discover Pro settings Discover Pro lets you specify options (after clicking the Settings button) that determine the appearance of the Discover Pro window itself, whether you can view one or more category windows at a time, and whether Discover Pro should remember the positions of windows.
  • Page 75: Undelete

    McAfee Utilities provides both a Windows and DOS version of the Undelete program. The DOS version of Undelete is also included on the McAfee Utilities Rescue disk when you create it. To undelete a file, select it in the list at the bottom and click the Undelete button.
  • Page 76: Clean And Optimize

    McAfee Utilities Clean and Optimize Use McAfee Utilities Clean and Optimize utilities to help you ensure maximum performance of your computer via easy-to-use maintenance and optimization tools. Cleanup Wizard Cleanup Wizard allows you to reclaim space on the hard disk by helping you identify files that you no longer need such as duplicate files;...
  • Page 77: Using Disk Tune To Defragment Or Consolidate A Disk

    McAfee Utilities Using Disk Tune to defragment or consolidate a disk After you specify one or more drives to tune and click Next >, Disk Tune analyzes the drive to determine the most suitable levels of optimization. Once the analysis is complete, depending upon the degree of fragmentation, Disk Tune recommends one of four methods: •...
  • Page 78: The Hard Disk Map

    McAfee Utilities The hard disk map Disk Tune displays a map of the hard disk with blocks—each block consists of a variable number of clusters, depending on the disk’s size—color coded to indicate their status. You can identify the contents of a block in the hard drive map by clicking it.
  • Page 79 McAfee Utilities • Disk Tune provides three verification levels: Verify (slow–ensures data written to a new cluster can be read), Compare (slowest–compares a relocated file’s contents against the original to ensure it is exactly the same), and None (fastest). • Ordering by Task–(Windows 98 only) Windows 98 tracks how often each of your programs are used and maintains this information in an application log file.
  • Page 80: Specifying File Categories

    You can also enable or disable the McAfee Utilities Property sheet for supported drives and enable or disable Disk Tune in the Context menu for supported drives.
  • Page 81 McAfee Utilities In advanced file placement configurations, you can decide where on the disk various file groups will be located. Disk Tune divides the disk into five regions: Top, High, Middle, Low, and Bottom, and it lets you specify in which of these regions the various file categories are placed.
  • Page 82: Registry Wizard

    McAfee Utilities Registry Wizard Registry Wizard (for Windows 95/98 only) makes maintenance, troubleshooting, and repair of the Windows Registry database a quick and easy process. The Windows Registry is a database that replaces many functions of Windows 3.x’s AUTOEXEC.BAT, CONFIG.SYS, and *.INI files. This Registry contains all the information about the hardware, system, programs, and network user settings on your PC.
  • Page 83: Backing Up & Restoring The Registry

    McAfee Utilities Figure 4-13. Registry Wizard window Select the task you want Registry Wizard to perform and click the Next > button. For step-by-step procedure, see the following topics on this chapter: • “Backing up & Restoring the Registry.” •...
  • Page 84: Cleaning The Registry

    Repair button to manually change the value for that key. Or, you can click the Advanced button to go to Registry Pro and edit the orphan entries using the McAfee utility instead of Registry Wizard. McAfee Office...
  • Page 85: Tuning Up The Registry

    McAfee Utilities Select a column title to change the sort order of the keys Select a key handle or child key and click Repair Click Advanced to to manually edit its value go to Registry Pro where you can edit an Orphan key...
  • Page 86: Registry Pro

    McAfee Utilities When you rebuild the Registry using the Registry Wizard Tune Up option, the current Registry files are saved in your Windows directory as system.hlx and user.hlx. In the unlikely event that you encounter any problems in Windows after a tune up, you can restore your original Registry by pressing F5 when you see the Starting Windows message when you boot, and by then typing REGUNDO at the C:>...
  • Page 87: Finding Orphans

    McAfee Utilities Finding orphans An orphan is an entry for a program that has moved or no longer exists. Choose the Find Orphans command from the Search menu. Registry Pro displays a list of all the orphans it finds in the database in the Orphans tab.
  • Page 88: Launch Rocket

    McAfee Utilities Launch Rocket Wizard dramatically reduces application launch times. It does this in two ways: • Normal Acceleration–McAfee Utilities keeps track of the order in which various parts of an application load. Thereafter, whenever you launch that application, McAfee Utilities directs your system to read those files from the hard disk in the most efficient manner.
  • Page 89: Shortcut Wizard

    For step-by-step instructions to perform any of these tasks, see online Help of Shortcut Wizard in McAfee Utilities or click the Help button within the wizard dialog box. Prevent and Protect...
  • Page 90: Recovering A Crashed, Locked-Up, Or Hung Application

    McAfee Utilities Figure 4-15. McAfee Crash Protector dialog box When you see this dialog box, the application has caused an error which usually means it has gone astray. Therefore your data may already be lost or damaged. This dialog box lets you choose what to do with the faulty program.
  • Page 91: Selecting Crash Protector Properties

    4. Exit the application immediately and restart Windows. Selecting Crash Protector Properties McAfee Crash Protector lets you select a variety of properties that determine how the utility behaves and what kind of protection it gives you. To select Crash Protector properties: 1.
  • Page 92: Deactivating Crash Protector

    McAfee Utilities 4. Click the Apply button when you finish selecting options. 5. Click OK to close the Crash Protector Properties. Deactivating Crash Protector You can deactivate Crash Protector whenever you like without restarting Windows. To deactivate Crash Protector: 1. Right-click on the Guardian icon in the system tray (The blue cross icon near the system clock) 2.
  • Page 93: Wingauge

    McAfee Utilities NOTE: By disabling CPR, Crash Protector, or portions of it, you eliminate error protection, crash recoverability, and reactivation of programs that are not responding. WinGauge WinGauge is a dynamic reporting tool that constantly monitors your use of Windows and your applications, to alert you to potential problems before they become serious.
  • Page 94: Working With Gauges

    McAfee Utilities Working with gauges In WinGauge, you can set global gauge commands or set specific commands for each gauge. You can also add, update, or remove gauges. Adding a new gauge If you don’t see a particular gauge in the WinGauge window, you can add it to the window.
  • Page 95: Manipulating The Wingauge Window

    McAfee Utilities NOTE: A short description about a gauge’s function will appear in the description window of this dialogue box when you click on the gauge name. Click the Help button for additional gauge information 4. Click OK to add a gauge.
  • Page 96 McAfee Utilities To resize the WinGauge window: 1. Point to any corner or side of the WinGauge window. 2. Drag the window edge in any direction to a new location. Point to a side or corner of the WinGauge window and...
  • Page 97: Changing Wingauge Properties

    McAfee Utilities Rearranging gauges in the WinGauge window You can drag gauges around in the gauge area to move them to a new location in the WinGauge window. You might do this to place related gauges in adjacent positions. The titlebar must be visible in order to rearrange gauges.
  • Page 98 McAfee Utilities Data style Selecting a Data Style of Color Lines, Color Fill, Solid Lines, or Solid Fill makes certain Colors options visible. Size Selecting double wide or tall, both, or default adjusts the gauge size. Gauge text You can select whether to display a gauge’s title and value, show the title vertically or horizontally, and show the value as a percent.
  • Page 99 McAfee Utilities • Alarm Background (default maroon red)–Sets the color for the alarm background of the gauge indicator. Text (default black) Warning Regular (default bright yellow) (default lime green Frame Alarm (default white) (default bright red) • Warning (default bright yellow)–Sets the color for warning data usage (visible when Data Style is set to Color Lines or Color Fill).
  • Page 100 McAfee Utilities Warnings and Alarms Thresholds Threshold settings are available for warnings and alarms. Simply point, click, and drag the slider on each rule to set the threshold for warnings and/or alarms. The thresholds are constrained to each other (from Off to 100%). This constraint relationship is determined by whether the Invert Alarms check box is selected.
  • Page 101: Saving And Loading Gauge Settings

    McAfee Utilities Show Bubble Help Select the Show Bubble Help check box to display Bubble Help when you point to a gauge. The delay time specifies the time in which the help information is delivered upon pointing to a gauge.
  • Page 102: Virusscan

    TIP: To have WinGauge automatically load a particular gauge settings file, specify the file name in the WinGauge shortcut properties sheet. VirusScan Please refer to the McAfee VirusScan in Chapter 3 for complete guide and related information. Trash Guard When you enable Trash Guard, all deleted files are moved to the Recycle Bin.
  • Page 103: Safe & Sound

    McAfee Utilities Safe & Sound lets you create backup sets in protected volume files, which is the safest and preferred type of backup, and is unique to McAfee Utilities. A protected volume file is a sectioned-off area of the drive, sometimes called a logical drive.
  • Page 104: Creating Automatic Backups

    McAfee Utilities Creating automatic backups When you select to have Safe & Sound automatically create a backup set for you, it creates the first backup set while you are stepping through the Safe & Sound Wizard. Thereafter, while the Enable Automatic Backup option is selected, it continues to update your backup set at the time delay you’ve...
  • Page 105: Creating A Backup Set

    To create a backup set: 1. Launch Safe & Sound by doing one of the following: • From the McAfee Utilities central window, click Prevend and Protect. Then click Safe & Sound. • Click Start in the Windows taskbar; point to Programs. Next, select McAfee Utilities;...
  • Page 106 McAfee Utilities Protected Volume File–The Protected Volume File is the preferred backup type. A protected volume file is a sectioned off portion on the drive. It has special characteristics to ensure that even if organizational structures, such as the file allocation table on the drive is corrupted or lost, or the data becomes scrambled, the files in the backup set can be reconstructed.
  • Page 107 McAfee Utilities • Protected Volume Drive Letter–(available only for backup sets stored as a Protected Volume File). The drive letter you want to use for the Protected Volume File backup set. • Keep Deleted Files For–Select how long you want the backup set to keep files whose original counterparts have been deleted from your system.
  • Page 108: Restoring Files From A Backup Set

    McAfee Utilities If you are not yet familiar with file types and want to see them, you can open My Computer or Windows Explorer, choose the Options command from the View menu, and click the File Types tab. In the Options dialog box you can examine the list of the registered file types on your system.
  • Page 109: Modifying Or Deleting Backup Sets

    Choose the McAfee Utilities command from the Start menu and click the Safe & Sound button. • Choose the Programs > McAfee Utilities > Safe & Sound command. 2. Select the backup set to modify and click the Properties button. User’s Guide...
  • Page 110: Repairing And Rebuilding A Backup Set

    Windows. If it is damaged, Safe & Sound starts and asks if you want to repair the backup set. To repair or rebuild a backup set: 1. Start McAfee Utilities Safe & Sound utility and click Next > while the Repair or Rebuild Backup Set radio button is selected. 2. Do one of the following: •...
  • Page 111: Secure And Manage

    Then click Save. Secure and Manage The McAfee Utilities Secure and Manage suite enables you to customize appearance of your Windows (including desktop); create launching pads where you can place any desktop icon for easy access; encrypt or decrypt files for added security and privacy;...
  • Page 112 McAfee Utilities • Boot to Windows–Select this check box to start Windows when you start your computer. When you deselect this check box and restart your computer, it boots up and takes you to the DOS prompt (usually the C:\>...
  • Page 113: Explorer Tab

    • Change–Select a screen in the pop-up menu. Then click Change to select a bitmap image (.BMP) or logo file (.SYS) to use for it. Note, Start-up images must be 320 x 400 color images—several are provided in the McAfee Utilities directory.
  • Page 114 McAfee Utilities Click the Folder Select the shortcut indicator type icon button to display the Change Icon dialog box where you can Drag the slider select a left to make custom shortcut menus appear icon by filename faster, or right...
  • Page 115: Run/Add/Remove Tab

    McAfee Utilities Run/Add/Remove tab The Run/Add/Remove tab lets you add, remove, edit, and specify properties for programs that automatically run when you start Windows, and for programs that appear on the Start > Program menu. The Run/Add/Remove options are: • Programs Run Automatically at Windows Startup–Click Add to add a new program to run automatically at Windows startup.
  • Page 116: Send To Tab

    McAfee Utilities Send To tab The Send To tab lets you add, remove, edit, and select properties for the commands that appear on the File > Send To menu. The Send To menu is also sometimes available in the context-sensitive pop-up menu that appears when you Right-click the mouse button, such as when you point to an icon in My Computer.
  • Page 117: Launch Pad

    McAfee Utilities In most cases, each Context menu command has a check box beside it. By selecting or deselecting the check box, you can enable or disable each command performed by a Context menu handler. Some Context menu commands have a folder icon next to them, instead of a check box.
  • Page 118: Starting Launch Pad

    Starting Launch Pad To start Launch Pad, click the Launch Pad icon on your desktop, or choose the Launch Pad command from the Start > Programs > McAfee Utilities menu. An empty Launch Pad appears, which is a small window.
  • Page 119: Pgp

    McAfee Utilities To dock Launch Pad, drag Launch Pad close to any edge of the desktop where you want it to be docked. Then point inside the Launch Pad window and Right-click. Choose the Dock Launch Pad command from the Global menu, and Launch Pad snaps to the edge of the desktop.
  • Page 120: Using Pgp

    McAfee Utilities • Email plugins. One of the most convenient ways to use PGP is through one of the popular email applications supported by the PGP plug-ins. With these applications, you can encrypt and sign as well as decrypt and verify your messages while you are composing and reading your mail with a simple click of a button.
  • Page 121: Encrypting Emails And Files

    McAfee Utilities 6. Type a passphrase. An adequate passphrase contains multiple words and may include spaces, numbers, and punctuation characters. Choose something that you can remember easily but that others won’t be able to guess. NOTE: If you are creating a key with the same user name or email address as a previous key, you are given the opportunity to sign the new key with your older key.
  • Page 122: Decrypting Emails And Files

    McAfee Utilities Decrypting emails and files When someone sends you encrypted data, you can unscramble the contents and verify any appended signature to make sure that the data originated with the alleged sender and that it has not been altered.
  • Page 123: Creating A New Pgpdisk Volume

    McAfee Utilities When a PGPdisk volume is mounted, you can use it as you would any other disk. You can install applications within the volume, move or save your files to the volume. When the volume is unmounted, it is unaccessible to anyone who does not know your secret passphrase, which is a longer version of a password.
  • Page 124: Add/Remove Public Keys

    McAfee Utilities Move your mouse around in a random manner within the Wizard window and/or randomly press characters on your keyboard until progress bar shown in the dialog box is completely filled in. The mouse movement or character pressing on your keyboard generates random information used by the PGPdisk program as part of the encryption (data scrambling) process.
  • Page 125: Mcafee Shredder

    McAfee Shredder does this for you by “security wiping” deleted files so they cannot be restored or rebuilt using undelete utilities. Unlike other file security erase programs, McAfee Shredder erases even the file name and the compressed data on DriveSpace drives. Note that it is not possible to shred network files, or files compressed with compression other than DriveSpace in an absolutely secure manner.
  • Page 126 If you have selected the McAfee Shredder properties option to Prompt Before Shredding, a message appears listing the first file you dragged onto the McAfee Shredder icon. It asks you to confirm that you want to shred this file. 2. Do one of the following: •...
  • Page 127: Shredding Non-File Data

    Next >. Then click Finish. A message appears showing you how the non-file data erasure is progressing. When the process is complete, McAfee Shredder closes and returns you to the desktop. McAfee Zip Manager A zip file is a file that has been compressed and which, therefore, takes up less space than it did in its original, decompressed form.
  • Page 128: Zip Files

    McAfee Utilities The McAfee Zip Manager is a complete zip management utility that you can use in two ways: via ZipMan Wizard or the advanced McAfee Zip Manager. ZipMan Wizard provides you with all the zip file management features you will normally use.
  • Page 129: Selecting Mcafee Zip Manager Properties

    You can specify the properties that you want McAfee Zip Manager to have. The properties that you select apply to both ZipMan Wizard and advanced McAfee Zip Manager, but you can override some of these properties if you are working in advanced McAfee Zip Manager.
  • Page 130 Compression options • Save Folder Information–saves the folder name with the files you select. When you unzip these files, McAfee Zip Manager checks whether the same folder names exist as subfolders at the location where you want to place these extracted files. If the subfolders do not exist, McAfee Zip Manager creates them.
  • Page 131: Extracting, Archiving, Or Adding Files

    Click the Advanced button in any ZipMan Wizard window to automatically go to the advanced McAfee Zip Manager. Click the ZipMan Wizard tool button in the McAfee Zip Manager window to instantly go to ZipMan Wizard. Using Advanced McAfee Zip Manager Advanced McAfee Zip Manager provides all the capabilities of ZipMan Wizard, plus other, more advanced zip file maintenance features.
  • Page 132 Column title boxes File table McAfee Zip Manager tool buttons TIP: Point to a McAfee Zip Manager tool button and the status bar at the bottom of the window displays a brief description of the tool button’s purpose. The McAfee Zip Manager tool buttons on the toolbar allow you to quickly: •...
  • Page 133: Mcafee Oil Change

    McAfee Utilities McAfee Zip Manager file table The file table in the McAfee Zip Manager window displays the files you are currently manipulating. You can select files by clicking them, using standard Windows selection techniques. You can rearrange the columns by dragging the column title boxes left or right to a new location.
  • Page 134 McAfee Utilities McAfee Office...
  • Page 135: Chapter 5. Mcafee Firewall

    McAfee Firewall About McAfee Firewall McAfee Firewall is a personal firewall that lets you monitor, control and log your PC's network activity. It protects you from Internet hackers and keeps your PC private. McAfee Firewall: • Stops fileshare and printshare access attempts.
  • Page 136: About Winsock 2

    In addition, during the installation process, it will prompt you with some basic questions to set up McAfee Firewall to do specific tasks, according to your needs (e.g. allow sharing of files or not). About Winsock 2 McAfee Firewall uses an API (Application Programming Interface) that is not supported by versions of Winsock prior to v2.0.
  • Page 137: Applications

    Settings/Applications menu item. There, you can move applications into either the "Trusted" list or the "Blocked" list. When you exit McAfee Firewall, your settings are saved and will be the same the next time it is run. User’s Guide...
  • Page 138: Systems

    Control system The operating system performs many types of network communication without reporting directly to the user. McAfee Firewall lets the user allow or block different system functions explicitly. Settings may be different for each network device, since a PC may, for example, be on an internal network as well as having a dial-up connection to the Internet.
  • Page 139: Password Protection

    Linux and Unix. When you use a password to protect your configuration: • The settings cannot be changed while McAfee Firewall is running unless the correct password has been entered.
  • Page 140: Display Control

    7. Choose "OK" to close the dialog box. 8. Choose File/Save Settings if you want to write this new configuration to disk immediately. Note: the configuration is automatically written to disk when you exit McAfee Firewall. McAfee Office...
  • Page 141: Configuring System Settings

    McAfee Firewall Configuring System Settings The following steps will help the Administrator set up the System portion of the configuration. While the configuration file (CPD.SFR) is not intended to be transferrable, the Applications settings can be successfully copied from one system to another.
  • Page 142: Configuration After Adding/Removing Network Devices

    McAfee Firewall Configuration after Adding/Removing Network Devices The System Settings must be verified after changes are made to network devices. This is especially important if a network device is added or removed. If a device was removed, all settings may have to be re-entered, because they previous settings may now be associated with the wrong device.
  • Page 143 It is better to use a new password every time you make an important configuration change. Every file you create with a password is "valid" in that McAfee Firewall will see that it matches the password you used for it. Using a new password prevents someone from secretly replacing an older configuration file for a newer one.
  • Page 144 McAfee Firewall McAfee Office...
  • Page 145: Chapter 6. Mcafee Uninstaller

    Using McAfee UnInstaller Before you can start using the powerful features of UnInstaller, it will first create a SmartLinks database to store information between files on your computer (see SmartLinks database).
  • Page 146: Customization Interview

    McAfee UnInstaller • Each time you start UnInstaller, the old version of the database is compared with new information on your computer. • After you restore files or applications from UnInstaller backup copies, UnInstaller records changes that it has just made.
  • Page 147 McAfee UnInstaller NOTE: Wizards are designed to be easy to understand and to use. Each wizard screen tells you what you need to know to enter information or choose options. If you want to know more about a wizard, click Help.
  • Page 148: About Powerclean

    About McAfee Guardian You use McAfee Guardian to schedule the QuickClean wizard that keeps your computer free of junk files and to set up Installation Monitor so that it either does or does not run in the background as you work.
  • Page 149 McAfee UnInstaller To schedule an UnInstaller event: 1. Right-click the Guardian icon in the clock area of the Windows taskbar, and choose What’s Scheduled from the popup menu. Figure 6-16. Scheduling events The What’s Scheduled dialog box appears. 2. Select QuickClean or Installation Monitor from the list of scheduled events in the Events window and click Schedule to open the Event Schedule dialog box.
  • Page 150: Using Quickclean

    McAfee UnInstaller Using QuickClean Use the QuickClean wizard to perform any of the following actions to keep your computer free of unused files and invalid shortcuts: • Remove unused files in the cache folder of your Internet browser. • Remove any temporary files in folders that are used by applications and Windows.
  • Page 151: How Do I Schedule Quickclean To Run At A Specific Time

    How do I schedule QuickClean to run at a specific time? Events for McAfee applications are managed by the McAfee Guardian. Each McAfee application adds to the list of events that the Guardian can run at a scheduled time. To change the QuickClean schedule: 1.
  • Page 152: Using Remove

    McAfee UnInstaller No file is deleted if it has been modified or accessed within the period specified by the SpaceMaker page of the Settings dialog box. The default period is 180 days. To view or change SpaceMaker defaults, click Settings from the Options menu, and click the SpaceMaker tab in the Settings dialog box.
  • Page 153: Using Transport

    McAfee UnInstaller Using Transport Use the Transport wizard to package an entire application and its configuration settings so that you can rebuild the application with exactly the same option settings on a different computer. To start the Transport wizard, click Transport in the UnInstaller window.
  • Page 154: Using Archive

    McAfee UnInstaller You do not need to have UnInstaller installed on the machine where you reinstall the transported application. You do need to make sure that the application license agreement permits you to use the application on more than one computer.
  • Page 155: Using Move

    McAfee UnInstaller After the Archive wizard creates the compressed archive file, it removes the application from the folder where it was installed, but leaves the shortcuts to the application in place. When you click a shortcut to the application in the...
  • Page 156: Using Backtrack

    McAfee UnInstaller If you have installed a second hard disk, relocate some applications from your primary hard disk to create more space there. • From your local computer to a drive on another computer. If you have more than one computer at your disposal, you can manage how you use the available disk space by moving applications between hard drives.
  • Page 157: How Do I Monitor Installation Of A Single Application

    McAfee UnInstaller To run Installation Monitor automatically in the background while you work, you must select either or both of the options on the BackTrack page. When BackTrack Monitor detects an installation program, it displays a message box where you can choose whether to monitor the installation.
  • Page 158: Using Restore

    McAfee UnInstaller To undo an application installation: 1. Click BackTrack in the main UnInstaller screen to start the BackTrack wizard. 2. In the first BackTrack wizard screen, click Next. 3. Select the BackTrack archive from the list and click Next again.
  • Page 159: How Do I Restore Deleted Files

    McAfee UnInstaller • The information in the Restore wizard list includes the name of the backup or archive file, such as “Archive of Glaxian,” the name of the wizard that created the backup, and the date the backup was created.
  • Page 160: Using Powerclean

    McAfee UnInstaller To restore individual files: 1. Click Restore in the main UnInstaller window. 2. On the Restore wizard screen, click the arrow by the dropdown list and select the backup or archive folder. To see a list of the files contained in the backup or archive, click Next.
  • Page 161: Why Does The Powerclean Feature Open In Read-Only Mode

    McAfee UnInstaller You can perform the same actions on individual files or groups of files that the UnInstaller wizards perform on entire applications. • Find out what application uses a selected file. Right-click File Links from the popup menu to see what application uses a selected file.
  • Page 162 McAfee UnInstaller When you want to use PowerClean to manage files, clear the check next to Read-only mode on the PowerClean page of the Settings dialog box. Open the Settings dialog box by clicking Settings from the Options menu. The PowerClean feature opens in a dialog box that works like the Windows Explorer.
  • Page 163 McAfee UnInstaller The major file groups are described briefly in the following table. A description of the selected group or subgroup appears in the Advice tab pane. Note that some files appear in more than one group. For example, the...
  • Page 164 McAfee UnInstaller The PowerClean default file groups (Continued) Category Description Windows Registry Important Registry entries for applications. Registered File Types Files in each file-type category that is associated with an application. Custom File Groups This group contains file groups that you name and define.
  • Page 165: Powerclean Menus

    McAfee UnInstaller 5. Click OK to save the new group. To change the definition of a custom file group: 1. Select the file group in the Cleanup Types list. 2. Click Edit File Group from the Tools menu. The Custom Group dialog box appears.
  • Page 166: Using The Tab Panes

    McAfee UnInstaller Using the tab panes? The tab panes below the group and file lists display information, either about the selected file or about the actions that you have performed during this PowerClean session. Information in the PowerClean tab panes Click this To see...
  • Page 167: Changing The Defaults For The Powerclean Feature

    McAfee UnInstaller In some cases, the color code is determined by your default settings. For example, if you specify that files of a specific type in a specific location should never be deleted, those files are marked with a red circle.
  • Page 168: Viewing Changes Done Using The Powerclean Feature

    McAfee UnInstaller If you have started UnInstaller, but are not are not working with the PowerClean feature, click Options in the main UnInstaller window, then click Settings in the menu that appears. When the Settings dialog box opens, click the PowerClean tab.
  • Page 169 McAfee UnInstaller When you first open the Reports dialog box, you see summary information from the Master Log in all pages. To see information about a specific action, click Open. Then choose the action from the list that appears, and click OK.
  • Page 170 McAfee UnInstaller McAfee Office...
  • Page 171: Chapter 7. Mcafee Internet Guard Dog

    While most of these files are harmless, some can invade your privacy or even damage the data on your computer’s hard drive. McAfee’s Internet Guard Dog addresses any of these potential risks with its comprehensive features designed to protect your privacy and security when surfing the Internet.
  • Page 172: Activity Logs

    McAfee Internet Guard Dog Activity Logs On the Product Name Home screen, Activity Logs allow you to view a list of all the interactions that you and other profiled users of your computer had with Product Name, including the date and time of the action. You can print, save or clear this list.
  • Page 173: Protection From Privacy Threats

    McAfee Internet Guard Dog Protection from privacy threats • Identity Protector monitors your Internet connection and warns you before private information is sent to an unsecure Internet site. It stops programs and other people that use your computer (like your kids) from sending your name and credit card numbers over the Internet without your approval.
  • Page 174: Protection From Virus Threats

    • Scheduler to launch the McAfee VirusScan Scheduler. This utility enables you to configure and run unattended virus scan operations. • Virus info to display virus information via the McAfee Web site. Using the Internet Guard Dog Interview Although Product Name is set up to use security and privacy settings that are appropriate for most users, some features require your input.
  • Page 175: How Internet Guard Dog Administrator Works

    McAfee Internet Guard Dog • Other financial numbers such as bank account, brokerage account, credit card, phone card, and so on. • Any Web site login names and passwords that you want to store in Password Manager. Information about other users of your computer. If you are the Administrator, you can create user profiles and set protection settings that Internet Guard will use whenever the user is browsing the Internet via your computer.
  • Page 176: Self-Administrator

    McAfee Internet Guard Dog Self-Administrator The Internet Guard Dog Administrator may designate another user as a Self-Administrator. This feature may be used if for example, the user is an adult and is deemed responsible enough to customize his privacy and protection settings on his own.
  • Page 177: How User Setup Works

    Perform a security check to find any privacy or Security Check security problem on your computer. Display user activity logs Activity Logs Display the McAfee Software Home screen in Help, then select McAfee your Web browser. Software on the Web Display the McAfee Software Support page in Help, then select Product your Web browser.
  • Page 178: User Profile

    McAfee Internet Guard Dog User Profile To customize protection settings for another user, click User Setup from the Internet Guard Dog Home page, the User Setup screen is displayed. You can add, edit or delete a user’s profile from this screen. Click any of the buttons available and follow through the instructions displayed on screen.
  • Page 179: Viewing Activity Logs

    McAfee Internet Guard Dog • Word List. This option allows you to filter Web sites and chat messages using words and phrases. • Ad Blocker. Select this option if you want Internet Guard Dog to block certain ads that you do not want the user to view.
  • Page 180: Performing A Security Check

    McAfee Internet Guard Dog Performing a Security Check After completing the interview, you’ll want to find out how your PC may be at risk. Security Check examines your PC for privacy and security problems and then guides you through fixing any problem it finds. If you are using the settings suggested by Product Name in the interview, you only need to run Security Check right after installation and then every month or so.
  • Page 181: Using Browser Buddy To Retrieve Or Store Your Web Site Passwords

    McAfee Internet Guard Dog If you find over time that you are being alerted to potential security risks too often, you can adjust the alert message settings in Protection Settings. Cookie Blocker and Gatekeeper require a period of adjustment before Product Name has learned to address your concerns with the least amount of disruption.
  • Page 182 McAfee Internet Guard Dog To open Browser Buddy 1. Right-click the Product Name icon on the Windows taskbar, then click Browser Buddy. The dialog box is displayed. Figure 7-18. Browser Buddy To add a new username and password 1. In Browser Buddy, select Add New Entry from the Password Manager drop-down list.
  • Page 183: Privacy Features

    McAfee Internet Guard Dog To retrieve your username and password 1. In Browser Buddy, select the site name if it doesn’t appear automatically in the Current Web Site list. 2. Drag your username or password from the Password Manager box to appropriate field in your Web site’s login form.
  • Page 184: What Identity Protector Does

    McAfee Internet Guard Dog If during the Interview, you accepted Internet Guard Dog’s recommendation on how to respond to cookies, Cookie blocker will: • Automatically allow cookies to be accepted from direct sites. • Display an alert message when an indirect sites tries to set a cookie.
  • Page 185: What Web Trail Cleaner Does

    McAfee Internet Guard Dog What Web Trail Cleaner does As you surf the Internet, your browser stores information that makes your browsing experience more satisfying. It uses the information as follows: Your browser uses Cached files Speed up the display of Web page elements such as graphics.
  • Page 186: What File Guardian Does

    McAfee Internet Guard Dog • Your browser is directed to a harmful site—one that has been known to contain virus-infected files (e.g., Trojan horses, prank or destructive ActiveX controls, or other security concerns). • A program silently uses your modem to connect to another computer.
  • Page 187: What Password Manager Does

    McAfee Internet Guard Dog • An ActiveX control attempts to delete files on your hard drive. • An ActiveX control attempts to scan files on your hard drive. • A program attempts to access your system password files. When Product Name displays an alert message, you can decide...
  • Page 188 McAfee Internet Guard Dog 2. Change the information that you want to store in the record. 3. Click OK. To remove a password record • In the Password Manager list, click a record to select it, then click Remove. McAfee Office...
  • Page 189: Chapter 8. Pgp Personal Privacy

    PGP Personal Privacy The PGP Personal Privacy secures and protects the privacy of your data by encrypting it so that only the intended individuals can read it. You can also sign information digitally to ensures it’s authenticity. Using PGP Personal Privacy Figure 8-1.
  • Page 190: Basic Steps For Using Pgp Personal Privacy

    • If you are using an email application supported by the plug-ins, you can encrypt and sign your messages by selecting the appropriate options from your application’s tool bar. McAfee Office...
  • Page 191: Running Pgp Personal Privacy

    PGP Personal Privacy • If your email application is not supported by the plug-ins, you can perform the appropriate functions from PGPtray. You can also encrypt and sign files from PGPtools before attaching them to your email. Encrypting ensures that only you and your intended recipients can decipher the file’s contents;...
  • Page 192: From The System Tray

    When you choose PGP Preferences from the PGP pop-up menu, you access the PGP Preferences dialog box in which you specify settings that affect how the PGP program functions based on your computing environment. By clicking the appropriate tab, you can advance to the preference settings you want to modify. McAfee Office...
  • Page 193: Getting Help

    PGP Personal Privacy Getting Help When you choose Help from the PGP menu or window, you access the PGP online Help system, which provides a general overview and instructions for all of the procedures you are likely to perform. Many of the dialog boxes also have context-sensitive help, which you access by clicking the question mark in the right corner of the window and then pointing to the area of interest on the screen.
  • Page 194: Using Pgp/Mime

    Windows Explorer, you must manually select the recipient’s public key from the PGP Key Selection dialog box. To select a recipient’s public key, simply drag the icon representing their key into the Recipient’s list box and then click OK. . McAfee Office...
  • Page 195: Taking Shortcuts

    PGP Personal Privacy Taking shortcuts Although you will find that PGP is easy to use, a number of shortcuts are available to help you accomplish your encryption tasks even quicker. For instance, while you are managing your keys in the PGPkeys window, you can press the right mouse button to perform all the necessary PGP functions rather than accessing them from the menu bar.
  • Page 196: Creating A New Pgpdisk Volume

    NOTE: Passphrase should contain more than one word, along with spaces, numbers, and other recognizable characters. Choose something you are very familiar with. It is important that you do not forget your passphrase or you will lose your data. 8. Click Next. McAfee Office...
  • Page 197: Changing A Passphrase

    PGP Personal Privacy Move your mouse around in a random manner within the Wizard window and/or randomly press characters on your keyboard until progress bar shown in the dialog box is completely filled in. The mouse movement or character pressing on your keyboard generates random information used by the PGPdisk program as part of the encryption (data scrambling) process.
  • Page 198: Add/Remove Public Keys

    If removing a public key • Drag the key or keys you want to remove from the bottom pane of the window, to the top of the pane. 5. Click OK. McAfee Office...
  • Page 199: Appendix A. Product Support

    Product Support BEFORE YOU CONTACT McAfee Software for technical support, locate yourself near the computer with McAfee Office installed and verify the information listed below: • Have you sent in your product registration card? • Version of McAfee Office • Customer number if registered •...
  • Page 200: Technical Support

    We encourage you to make this your first stop for answers to frequently asked questions, for updates to McAfee software, and for access to McAfee news and virus information. Take advantage of the McAfee Product KnowledgeCenter—your free online product support center - 24 hours a day, 7 days a week (http://www.mcafeehelp.com).
  • Page 201: Index

    Index Backup strategies Acceleration Type normal or super Backup Set ActiveX controls creating deleting files modifying protection against damage by Backups scanning hard drives automatic alert messages where to store them help for why you need them America Online Benchmarks information mail client, supported in VShield Boot delay Appearance tab...
  • Page 202 Download Scan module set up Cookie Blocker using configuration wizard Browser Buddy and described Drives information cookies DriveSpace Browser Buddy drivers corporate e-mail systems, choosing in configuration wizard credit cards Edit protecting with Gatekeeper Registry entry protecting with Identity Protector McAfee Office...
  • Page 203 Index e-mail files client software deleting manually choosing in configuration wizard infected supported in VShield cleaning by yourself when VirusScan cannot E-mail Scan module protecting from ActiveX controls set up protecting with File Guardian using configuration wizard removing junk files emergency boot disk Find Emergency Disk...
  • Page 204 MAPI (Messaging Application Programming Instructions for Administrators Interface) e-mail clients choosing in configuration wizard Internet e-mail clients, choosing in configuration wizard Internet connection, protecting Internet Explorer as browser supported in VShield Internet Filter module set up using configuration wizard McAfee Office...
  • Page 205 Index McAfee Firewall Orphans finding McAfee Firewall - how it works Outlook and Outlook Express McAfee Firewall configuration as e-mail clients supported in VShield McAfee Guardian. SeeGuardian. distinguishing between McAfee Image ?? to McAfee Shredder McAfee Zip Manager panic, avoiding when your system is infected...
  • Page 206 Quick Copy file groups described quick start for VShield configuration original default settings listed read-only mode, turning off QuickClean wizard tab panes, using how to use scheduling setting defaults for McAfee Office...
  • Page 207 Index Restore wizard restoring archived applications read-only mode, turning off for PowerClean restoring deleted files feature dialog box restoring reasons to run VShield deleted application rebooting, with the Emergency Disk deleted files rebuilding transported applications transported applications Refresh Registry database undoing a monitored application installation file type...
  • Page 208 Launch Pad System activity Launch Rocket McAfee Image ?? to system crashes, attributing to viruses McAfee Shredder System Scan module McAfee Zip Manager set up Registry Pro using configuration wizard Registry Wizard Retake Shortcut Wizard Trash Guard Undelete WinGauge...
  • Page 209 Index WinGauge Winsock 2 viruses Wizard, button in VShield Properties dialog effects of removing before installation, necessity of and wizards steps for Archive from infected files listed and described threats Move VirusScan QuickClean components included with Remove description of program components SpaceMaker installation Transport...
  • Page 210 Index McAfee Office...

Table of Contents