McAfee MTP08EMB3RUA - Total Protection - PC Product Manual
McAfee MTP08EMB3RUA - Total Protection - PC Product Manual

McAfee MTP08EMB3RUA - Total Protection - PC Product Manual

Product guide
Hide thumbs Also See for MTP08EMB3RUA - Total Protection - PC:
Table of Contents

Advertisement

Quick Links

Product Guide
McAfee Total Protection Service 5.1.5

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the MTP08EMB3RUA - Total Protection - PC and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Summary of Contents for McAfee MTP08EMB3RUA - Total Protection - PC

  • Page 1 Product Guide McAfee Total Protection Service 5.1.5...
  • Page 2: License Agreement

    MCAFEE, NETSHIELD, PORTALSHIELD, PREVENTSYS, SECURITYALLIANCE, SITEADVISOR, TOTAL PROTECTION, VIRUSSCAN, WEBSHIELD are registered trademarks or trademarks of McAfee, Inc. and/or its affiliates in the US and/or other countries. McAfee Red in connection with security is distinctive of McAfee brand products. All other registered and unregistered trademarks herein are the sole property of their respective owners.
  • Page 3: Table Of Contents

    The SecurityCenter ....... . . 37 Logging on to the SecurityCenter ......38 McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 4 Management of security policies ......51 McAfee Default policy ......52 Working with policies .
  • Page 5 Viewing safety reports ......115 Information that browser protection sends to McAfee ....115 Installing browser protection during policy updates .
  • Page 6 Configuring devices to accept scans ..... . . 152 Creating device groups ......153 McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 7 Error messages ........160 Index McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 8 Contents McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 9: Preface

    Preface This guide provides the information you need to configure, use, and maintain your McAfee product. About this guide This information describes the guide's target audience, the typographical conventions and icons used in this guide, and how the guide is organized.
  • Page 10: Finding Product Documentation

    Finding product documentation Finding product documentation McAfee provides the information you need during each phase of product implementation, from installation to daily use and troubleshooting. After a product is released, information about the product is entered into the McAfee online KnowledgeBase.
  • Page 11 How Total Protection Service works Types of protection Additional features with specific versions Core product strengths New features for this release The role of the client software Updates to the client software Management with the SecurityCenter McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 12: Introducing Total Protection Service How Total Protection Service Works

    The client software updates itself — automatically and silently — by downloading the latest ® detection definition (DAT) files from your account’s administrative website, the McAfee SecurityCenter. DAT files define the threats that the client software detects. The client software uploads security information about each computer to the SecurityCenter for use in administrative reports.
  • Page 13: Types Of Protection

    Based on SiteAdvisor Enterprise Plus. Web-based Vulnerability Analyzes your domains and IP addresses, then reports vulnerability detections and ™ scanning recommends steps for correcting them. Based on SECURE McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 14: Core Product Strengths

    • SaaS Email Intelligent Routing — Routes filtered email to distributed email systems. If you have subscribed to email protection previously, your account will be migrated to SaaS email protection. McAfee will notify you when this occurs and provide instructions for setting up the new account. Email server...
  • Page 15: New Features For This Release

    Early Warning system and outbreak response — Total Protection Service uses the latest ® information about threats and outbreaks as soon as they are discovered by McAfee Labs, a research division of McAfee. Whenever McAfee Labs releases an outbreak detection definition (DAT) file, computers on your account receive it promptly.
  • Page 16 • SaaS Email Intelligent Routing — Routes filtered email to distributed email systems. If you have subscribed to email protection previously, your account will be migrated to SaaS email protection. McAfee will notify you when this occurs and provide instructions for setting up the new account. Control access to...
  • Page 17: The Role Of The Client Software

    Total Protection Service client software checks for updates. If updates are available, the client computer retrieves them. In addition, users can check for updates manually at any time by clicking the Total Protection Service icon in the system tray, then selecting Update Now. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 18: Simple Updates Through Direct Connections

    Simple updates through direct connections Each client computer that has a direct Internet connection can check for updates and download them from the update site on the Internet. This is the simplest method of retrieving updates. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 19: Updates Using Rumor Technology

    From the SecurityCenter, you can access tools to monitor the status of computers on your account, view reports on detections and activities, and configure security settings that address the specific needs of your account. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 20 Links to related portals — Some widgets contain a link to a portal used for managing non-client-based protection, such as SaaS email protection and vulnerability scanning. The SecurityCenter offers two powerful tools for protecting and monitoring displaying your computers and fine-tuning their security settings. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 21: Create User Groups

    You should configure policies for your users to meet your own company’s needs. Policy setting On-Demand Scan Weekly Daily Daily Enable outbreak response Enabled Enabled Enabled Scan within archives during Enabled Enabled on-access scans McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 22: Customize Policies

    After installation, Total Protection Service protects client computers from threats immediately by using the security settings configured in the McAfee Default policy. You might want to change the way some settings are configured for some or all of the computers on your account.
  • Page 23 Administrator checks the security status for the Sales Team group in reports on the SecurityCenter. The administrator adjusts the Sales policy. The modified policy is downloaded automatically to client computers in the Sales Team group the next time they check for updates. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 24: Check Reports

    Use them to evaluate the current policy options for your account and adjust them as needed. You can also schedule these reports to run at regular intervals and be delivered to you or other specified persons as an email attachment. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 25: Using The Client Software

    • Icon and protection status summary, which allows users to access a limited set of features. • Icon and full console, which allows users to access all features. This is the default setting. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 26: About The Icon

    Use the icon to: • Check for product updates. • Open the console, to check the protection status and access features. (Available if the administrator has configured this option.) McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 27: About The Console

    • Click the icon, then select Open Console. • Click Start | Programs | McAfee | Managed Services | Total Protection Service. The basic console displays the status of the protection features installed on the computer. • Detected risks are highlighted in red. Click Fix to resolve the risk.
  • Page 28: Types Of Client Software Updates

    At times, users might want to check for updates manually. For example, when a computer appears to be out-of-date in your administrative reports, users might need to update manually as part of the troubleshooting process. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 29: Terminal Server Support

    By default, they check every 12 hours. For virus and spyware scans to detect all the latest threats, the detection definition (DAT) files must be kept up-to-date. DAT files are updated by McAfee Labs whenever new threats are discovered. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 30: Updating Client Computers Manually

    On the Client Settings tab, under Update Settings, deselect Update client computers where users are not logged on. Click Save. (For a new policy, click Next, select additional options for the policy, then click Save.) McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 31: Performing Setup And Maintenance Tasks

    • Viewing the progress of scheduled scans that are in progress. • Managing files in the Quarantine Viewer. • Disabling and enabling on-access scanning. • Logging on to the SecurityCenter. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 32: Configuring Notifications

    • Show the icon only — The tray icon is displayed, and the tray menu lists only the Update Now option. Click Save. (For a new policy, click Next, select additional options for the policy, then click Save.) McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 33: Uninstalling The Client Software

    On computers running the Windows firewall, the setting for the Windows firewall is automatically restored to the setting that was in effect before Total Protection Service firewall protection was installed. If the Windows firewall was enabled then, it is re-enabled automatically now. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 34: Frequently Asked Questions

    Empty the Internet Explorer cache and adjust the security level settings to Medium or Medium-high. • Empty the Internet Explorer cache. (See your browser's documentation for instructions.) • Adjust your corporate firewall or proxy settings. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 35 Updates might fail if the Temp folder does not exist on the client computer. If you delete the folder inadvertently, restart the computer to re-create the folder automatically, or manually create a Temp folder in the Program Files\McAfee\Managed VirusScan folder. Activate your software.
  • Page 36 Using the Client Software Error messages McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 37: Using The Securitycenter

    ® vulnerabilities. Status emails contain a link to your McAfee SecurityCenter website, where you can view detailed reports and instructions for resolving problems.
  • Page 38: Logging On To The Securitycenter

    • Password — In most cases, the password that you created when signing up. If you have forgotten your password, click the link and it will be emailed to you at the login email address. Click Log On. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 39: Accessing Data On Securitycenter Pages

    • In a computer listing, click the name of the computer to display details about it, then click the action item. Display details about a Click a computer name in a listing. computer McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 40: Protection Status At A Glance

    View and resolve action items. • View protection coverage and activity for all computers or specific groups with interactive reports (known as widgets) containing clickable charts and links. • Check and update your subscriptions and licenses. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 41 Select, resize, and reposition the widgets that appear on the page. • Access associated management portals or dashboards by clicking a link (available only when your account includes SaaS email protection, vulnerability scanning, or email server protection). McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 42: Viewing Protection At A Glance

    Widgets are small, interactive reports that appear on the Dashboard page of the SecurityCenter. They provide summary and overview information about your account's protection status, activity, and subscriptions. Some widgets provide links to associated portals or subscription-related tasks. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 43: Management Of Client Computers

    (DAT) file is current, the number of detections, and the number of Internet applications approved by its user. You can easily see which computers need your attention, display additional information, and perform necessary management tasks. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 44 100 computers to optimize SecurityCenter performance. From the Computers page you can click a computer name to display details of the individual computer on the Computer Details page. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 45: Working With Computers

    Move to Group list. Assign a policy to Select the checkbox for one or more computers in the list, then select computers an existing policy from the Policy list. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 46: Working With An Individual Computer

    Do this... View detections for a Click a quantity under Detections to open the Detections List, then click computer a detection name to view detailed information from the McAfee Labs Threat Library. Add user-approved 1 Click a quantity under User-Approved Applications.
  • Page 47: Management Of Computer Groups

    You can also track the number of detections on those computers through more frequent reports and adjust the security settings as needed. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 48: Working With Groups

    Group administrators oversee and manage the groups that you, the site administrator, assign to them. When creating group administrators, you specify which groups they manage, a password they use to access the SecurityCenter, and their access level. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 49 Group administrators manage the client computers in their assigned groups. The management tasks they can perform and the information they can access on the SecurityCenter depend on the access level assigned to them. The site administrator can manage all client computers in all groups. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 50: Working With Group Administrators

    Use this task to manage group administrators on the My Account page. Here you can view, edit, create, or delete group administrators. Up to six group administrators can be listed. If you have created more than six group administrator accounts, click View all group administrators to display a complete listing. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 51: Management Of Security Policies

    Whenever you want to adjust those setting, simply change the policy. Your changes will be applied to all the computers in the Sales Team group automatically. There is no need to update each computer’s setting individually. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 52: Mcafee Default Policy

    You cannot rename or modify the McAfee Default policy. When you add computers to your account, the McAfee Default policy is assigned to them. When you delete a policy that is assigned to one or more groups, the McAfee Default policy is assigned to those groups automatically.
  • Page 53 High: These scans are allowed to use a high percentage of CPU Maximum percentage of CPU time allocated for on-demand and scheduled scans time. (Scans should be requested during non-peak hours, when users are not performing tasks on their computers.) McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 54 • Unrated: Allow Access to Downloads Regulate access to file downloads according to their safety ratings: • Yellow: Warn • Red: Block • Unrated: Allow This feature is not supported on Firefox browsers. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 55: Working With Policies

    Under Actions, select Delete for the policy, then click Save. If you delete a policy that is assigned to one or more groups, the default policy you have selected for your account (or the McAfee Default policy) is assigned to the groups in its place. You cannot delete the McAfee Default policy.
  • Page 56: Generation Of Security Reports

    For blocked events to be reported, the Report blocked events option must be enabled in the Firewall Protection policy. Blocked events are logged for all computers that are assigned a policy where this option is enabled. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 57 Use this report to monitor status and detections. Click the IP address of an Exchange server to open the email server protection dashboard on the server, which enables you to view details about detections and manage email server protection. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 58: Scheduling Reports

    Logo files can be .gif, .jpeg, .jpg, or .png format. Logo dimensions must be 175 x 65 pixels with a file size under 500 KB. Other dimensions will result in a stretched or shrunken logo. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 59: Computer Profiles Report

    Browser version Specify computers running all versions of Internet Explorer or only those running a selected version. Display all the computers on your account or only those in the selected Groups group. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 60: Duplicate Computers Report

    View details about a Click a computer name to display the Computer Details page, which computer displays information about the computer, its service components, and its detections. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 61: Managing Your Account

    Use this task to select the email notifications you want to receive from your service provider. Task For option definitions, click ? in the interface. On the My Account page, click the Subscription & Notification tab. In the Notification Preferences section, click Edit. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 62: Viewing And Updating Subscription Information

    Subscriptions entitle you to a certain type of protection (such as virus and spyware or web filtering) and the number of licenses determine how many computers are protected. You can configure your notification preferences to receive an email whenever the expiration date for a subscription approaches. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 63: Locating Or Creating Keys For Your Account

    Company Key section. Install protection on new computers 1 Click standard URL installation to open the installation wizard. 2 Click VSSETUP to download the silent installation utility. See the installation guide for more information. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 64: Merging Accounts

    Use this task to access helpful tools for managing your Total Protection Service account. Information on using the utilities related to installation is provided in the installation guide, available from the Help page. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 65: Getting Assistance

    • View the Installation Tutorial — Describes how to install the product. • View the SecurityCenter Demo — Describes how to use the features of the administrative website to manage your account. Your service provider determines which demos are available. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 66: Frequently Asked Questions About The Securitycenter

    Sample reports are available in all product languages. Select the language from the Global Sites pull-down list in the upper right corner of the page. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 67: Questions About Adding, Renewing, And Moving Licenses

    For Groups, select All, then select the old computer in the listing and click Delete. Install the software on the reformatted computer. The new computer appears in your reports after it uploads its status to the SecurityCenter. This usually takes about 20 minutes. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 68 Using the SecurityCenter Frequently asked questions about the SecurityCenter McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 69 Spyware protection mode and detections Types of scans Scanning on client computers Configuring scanning policy options Managing detections Reports for virus and spyware protection Best practices (virus and spyware protection) Frequently asked questions Error messages McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 70: Using Virus And Spyware Protection How Detections Are Handled

    For all modes, detections are reported to the SecurityCenter, where you can view information about them in reports. To prevent popup prompts from appearing on client computers when potentially unwanted programs are detected, and for highest security, we recommend using Protect mode. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 71: Use Learn Mode To Discover Programs

    The behavior of the scanning features on client computers is defined in the policies configured in the SecurityCenter. Policy settings determine the types of files, programs, and other items detected; whether users can manage their detections; how frequently computers check for updates; and when scheduled scans occur. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 72: On-Access (Automatic) Scans

    Whether files are scanned for spyware. • The types of virus and spyware threats to detect. • Whether unrecognized detections are sent to McAfee Labs for investigation. • Whether to enable on-access scanning (if it is disabled) whenever computers check for updates. •...
  • Page 73: Email Scans

    Virus and spyware protection policy options let you configure these spyware scanning features: • Whether files are scanned for spyware. • The types of spyware threats to detect. • Approved programs that should not be detected as threats. The default spyware-related settings are: McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 74: Scanning On Client Computers

    If needed, click Pause Scan to temporarily interrupt the scan or Cancel Scan to end the scan. (Optional) Click View detailed report to open a browser window and display the results of the scan. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 75: Scanning On Demand From Windows Explorer

    In the Virus and Spyware Protection section, select View Scheduled Scan. Virus and spyware protection displays the progress of the scan. This option is available only when a scheduled scan is in progress. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 76: Enabling And Disabling On-Access Scanning

    (For a new policy, click Next, select additional options for the policy, then click Save.) Enabling optional types of virus scans Use this SecurityCenter task to specify optional scans and features for virus protection. If none of these features is selected, virus protection still detects viruses. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 77: Excluding Files And Folders From Virus Scans

    Virus and spyware protection protects against buffer overflow in more than 30 most commonly used Windows-based programs. McAfee updates this list as it adds buffer overflow protection for additional programs. Buffer overflow protection does not stop data from being written.
  • Page 78: Selecting Spyware Scanning Options

    For option definitions, click ? in the interface. On the Policies page, click Add Policy (or click Edit to modify an existing policy). Click Virus & Spyware Protection, then click the Approved Programs tab. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 79: Managing Detections

    Detected The item is still a threat and still resides on the system. For files, they are most likely contained within a compressed archive (for example, a .ZIP archive) or on write-protected media. For registry keys and cookies, the file they are associated with has a status of Detected. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 80: Managing Potentially Unwanted Programs On Client Computers

    Items are placed into the quarantine folder in a format that is no longer a threat to your computer. These items are deleted after 30 days. Users with administrator rights can manage these items using the Quarantine Viewer. Click Back to return to the console. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 81: Viewing Quarantined Files On Client Computers

    • Quarantined — You have not performed any action on this item since it was placed in the quarantine folder. Select Get more information on the threats detected to open a browser window and visit the McAfee Labs Threat Library.
  • Page 82: Viewing Threats Detected On The Account

    • Click a quantity for Detected Objects to display a list of detected threats and their status. • From the Detections List, click the name of a detection to display detailed information from the McAfee Labs Threat Library. View details about a Click a computer name to display the Computer Details page, which...
  • Page 83: Viewing Unrecognized Programs Detected On The Account

    View details about Click the name of a potentially unwanted program to display detailed detections information from the McAfee Labs Threat Library. View details about a Click a computer name to display the Computer Details page, which computer where a...
  • Page 84: Unrecognized Programs Report

    • From the Detections List, click the name of a detection to display detailed information from the McAfee Labs Threat Library. View details about a Click a computer name to display the Computer Details page, which displays computer where a information about the computer, its service components, and its detections.
  • Page 85: Detection History Report

    View details about Click the name of a potentially unwanted program to display detailed detections information from the McAfee Labs Threat Library. View details about a Click a computer name to display the Computer Details page, which displays computer where a information about the computer, its service components, and its detections.
  • Page 86 Then change your spyware protection mode to Protect. View the Detection History report periodically to discover trends specific to your network, and verify your strategy’s success in reducing detections. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 87: Frequently Asked Questions

    No. However, you can create a new policy and add them. When you click Add Policy on the Policies page of the SecurityCenter, the new policy is prepopulated with the McAfee Default policy settings. Specify a name for the new policy, save it, and then add approved programs as needed. You can also designate the new policy as your default policy.
  • Page 88 Using Virus and Spyware Protection Error messages McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 89: Using Firewall Protection

    Firewall protection has two primary modes: users configure firewall settings and an administrator configures firewall settings. The McAfee default policy is configured to let client computer users decide which communications and applications firewall protection allows. The administrator setting puts all or partial control with the administrator.
  • Page 90: Connection Type And Detections Of Incoming Communications

    When the option is enabled, you can see a listing of all blocked events in the report entitled Inbound Events Blocked by Firewall. The connection type does not affect the way that firewall protection handles detections of Internet applications running on client computers. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 91: Custom Connections

    IP addresses from which a computer can receive communications. This allows you to limit communications to specific IP addresses. Configure settings for custom connections on the General tab of the Firewall Protection policy page. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 92: Firewall Protection Mode And Detections Of Unknown Applications

    For all modes, detections are reported to the SecurityCenter, where you can view information about them in reports. To prevent popup prompts from appearing on client computers when applications are detected, and for highest security, we recommend using Protect mode. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 93: Use Learn Mode To Discover Internet Applications

    The request or message to be delivered to the correct destination. • The receiving device to know where the request or message originated and where to send a response if one is required. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 94: The Role Of System Service Ports

    These commonly used standard service ports are listed by default, where you can open or close them: • File and Print Sharing • Remote Desktop • Remote Assistance You can add other service ports as needed. Standard service ports for typical system services are: McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 95: Firewall Configuration

    IP addresses, and ports, and blocking those that could cause harm. There are two methods of establishing firewall protection: • The administrator configures firewall settings in a Total Protection Service policy. • Client computer users configure firewall settings for their computers. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 96 Using Firewall Protection Firewall configuration For the highest level of security, McAfee recommends that administrators configure firewall settings. If you allow users to configure the settings, it is important to educate them about threats and strategies for avoiding risk. Configuring firewall features enables you, the administrator, to control which applications and communications are allowed on your network.
  • Page 97: Interaction Between User And Administrator Policy Settings

    Select Firewall Protection, then click the General Settings tab. Under Firewall Configuration, select Administrator configures firewall or User configures firewall. If you select the administrator option, additional policy options are displayed for you to configure. Under Connection Type, select an option. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 98: Configuring Options For Internet Applications

    These policy option settings determine: • Whether firewall protection checks the list of Internet applications that McAfee has determined to be safe at the www.hackerwatch.org website. • Whether firewall protection blocks an unrecognized application, prompts users for a response, or simply reports it to the SecurityCenter.
  • Page 99: Configuring Custom Connections

    2 In the Add or Edit Incoming Connection panel, type a name for the service, type the ports through which the service will communicate with computers using this policy, then click OK. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 100: Configuring Ip Addresses

    1 Select Any computer. any IP address 2 Click OK. Accept communications from 1 Select My network (the subnet only). IP addresses on the subnet where the computers are 2 Click OK. located McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 101: Installing And Enabling Firewall Protection At The Policy Level

    Select Firewall Protection, then click the General Settings tab. Under Firewall Configuration, select Automatically install firewall protection on all computers using this policy. Click Save. (For a new policy, click Next, select additional options for the policy, then click Save.) McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 102: Enabling And Disabling Firewall Protection

    View details about Click the name of a potentially unwanted program to display detailed detections information from the McAfee Labs Threat Library. View details about a Click a computer name to display the Computer Details page, which computer where a...
  • Page 103: Viewing User-Approved Programs And Applications

    View details about a Click a computer name to display the Computer Details page, which computer displays information about the computer, its service components, and its detections. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 104: Reports For Firewall Protection

    View details about Click the name of a potentially unwanted program to display detailed detections information from the McAfee Labs Threat Library. View details about a Click a computer name to display the Computer Details page, which displays computer where a information about the computer, its service components, and its detections.
  • Page 105: Inbound Events Blocked By Firewall Report

    To centralize management and more easily monitor the types of applications and communications allowed on client computers, configure client firewall protection settings in a policy. Use McAfee’s recommendations for commonly used, safe Internet applications. When this option is enabled, applications rated safe on McAfee’s www.hackerwatch.org site are approved automatically, minimizing the need for you or users to approve applications manually.
  • Page 106: Frequently Asked Questions

    Frequently asked questions This section includes questions asked by administrators and client computer users that are related to using features of firewall protection. • Policies • General issues McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 107: Questions About Policies

    No. However, you can create a new policy and add them. When you click Add Policy on the Policies page of the SecurityCenter, the new policy is prepopulated with the McAfee Default policy settings. Specify a name for the new policy, save it, and then add allowed Internet applications as needed.
  • Page 108 Using Firewall Protection Frequently asked questions McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 109: Using Browser Protection And Web Filtering

    How safety ratings are compiled Safety icons and balloons protect during searches SiteAdvisor menu protects while browsing Safety reports provide details Information that browser protection sends to McAfee Installing browser protection during policy updates Web filtering features Enabling and disabling browser protection via policy...
  • Page 110: How Safety Ratings Are Compiled

    Web filtering features are described in more detail later in this section. How safety ratings are compiled A McAfee team derives safety ratings by testing a variety of criteria for each site and evaluating the results to detect common threats.
  • Page 111: Safety Icons And Balloons Protect During Searches

    Use this task from a client computer to determine why browser protection is not communicating with the SiteAdvisor server that provides safety ratings information. Communication problems are indicated by a gray SiteAdvisor menu button with disconnected cables. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 112: Siteadvisor Menu Protects While Browsing

    In Internet Explorer, users can display or hide the menu button by using the • View | Toolbars | McAfee SiteAdvisor menu option. This does not affect the functional status (enabled or disabled) of the browser protection client software. Firefox users cannot hide the menu button while browser protection is enabled.
  • Page 113: Using The Siteadvisor Menu

    Users can supplement the color-coded safety information for a site by viewing its detailed safety report. These reports describe specific threats discovered by testing and include feedback submitted by site owners and users. Safety reports for sites are delivered from the McAfee SiteAdvisor server and provide the following information: Item...
  • Page 114 We don't allow sites to pay to be rated or to change or improve their ratings. Reviewer What our volunteer reviewers have to say about this website. These comments are comments posted unedited. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 115: Viewing Safety Reports

    Using Browser Protection and Web Filtering Information that browser protection sends to McAfee Viewing safety reports Use this task to view safety reports to obtain more information about a site’s safety rating. Task • Do any of the following to view a safety report for a site: From this location...
  • Page 116: Installing Browser Protection During Policy Updates

    Customize the message that browser protection displays on computers that attempt to access a blocked website. • Enable and disable browser protection at the policy level. • Specify whether browser protection can be disabled from a client computer. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 117: Enabling And Disabling Browser Protection Via Policy

    Under Browser Protection Status, select or deselect Allow users to enable or disable browser protection. Specify whether a password is required on the client computer. If so, type the password. Click Save. (For a new policy, click Next, select additional options for the policy, then click Save.) McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 118: Block And Warn Sites By Safety Ratings

    When you block a site, users are redirected to a message explaining that the site is blocked. A policy option allows you to customize the message that is displayed. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 119: Blocking Or Warning Site Access Based On Safety Ratings

    • Warn — Display a warning when users attempt to download a file with the specified rating. • Allow — Allow all downloads of files with the specified rating. Click Save. (For a new policy, click Next, select additional options for the policy, then click Save.) McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 120: Blocking Phishing Pages

    Web filtering allows browser protection to retrieve content classifications for a site from the SecurityCenter server along with the site's safety rating. Use policy options to allow, warn, or block access to sites based on the type of content they contain. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 121: Blocking Or Warning Site Access Based On Content

    Users can also access unsafe downloads and phishing pages on authorized sites. It is important to exercise caution when adding authorized sites to an Exceptions list. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 122: How Site Patterns Work

    This is the domain. The domain consists of two parts: www.mcafee.com • Protocol. In this case: http:// • Internet domain. In this case: www.mcafee.com Domain information is matched from the end. A matching URL’s domain must end with the site pattern’s domain. The protocol can vary.
  • Page 123: Adding Authorized And Prohibited Sites

    You might use this message to explain the reason the site is blocked. This message appears on client computers in the language configured for the client software, if you have created a message in that language. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 124: Viewing Browsing Activity

    View details about a Click a computer name to display the Computer Details page, which computer displays information about the computer, its service components, and its detections. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 125: Web Filtering Report

    View details about a Click a computer name to display the Computer Details page. computer The Computer Details page displays information about the computer, its service components, and its detections. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 126: Best Practices (Browser Protection)

    Customize a message to display on client computers that attempt to access a site you have blocked. To ensure that all computers are protected against web-based threats, configure policy options to enable browser protection via policy and prevent users from disabling browser protection on their computers. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 127: Frequently Asked Questions

    The client computer is not communicating with the SiteAdvisor server. A communication error icon (disconnected cables) appears on the SiteAdvisor button. Hold your cursor over the menu button to display the safety balloon, then click Troubleshooting to test the connection. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 128 Using Browser Protection and Web Filtering Frequently asked questions McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 129: Using Saas Email Protection

    Use the core features of SaaS email protection to safeguard your email communication and information integrity. SaaS email protection routes all inbound email through McAfee servers to scan for threats, then blocks viruses, worms, and phishing threats before they enter the network. SaaS email protection allows you to specify whether to deny or quarantine messages detected as spam.
  • Page 130: Additional Saas Email Protection Services

    Enables web-based email access, management, and use during planned or unplanned outages. • Retains all inbound and outbound email sent or received during the outage. • Synchronizes an accurate record of all outage-period message activity with your email servers. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 131: The Saas Email Protection Widget And Portal

    When you activate a subscription for SaaS email protection, a SaaS email protection widget is displayed on the Dashboard page of the SecurityCenter. The widget contains a link (Click here to configure) to the SaaS email protection portal. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 132: Account Activation And Setup

    Utilities page. Use these tasks at any time to view and customize SaaS email protection features: Access the SaaS email protection portal. Customize policy options. Check quarantines messages and adjust settings if needed. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 133: Activating And Setting Up Your Account

    All other domains should be designated as primary domains. • Technical contact email address — The email address where you want McAfee to send technical and support emails for your account. Click Continue.
  • Page 134: Configuring Policy Settings For Saas Email Protection

    • Direction — Select Inbound, or select Inbound and Outbound if you also use outbound email filtering. Click Search. For each message, check the type of threat, the sender, the recipient, and the subject. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 135: Reports And Statistics For Email Protection

    These guides include administrator and quick start guides for using the features in your account. • On the SaaS email protection portal, click Help to display context-sensitive information about the current page. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 136 Using SaaS Email Protection Getting more information McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 137: Using Email Server Protection Email Server Protection Features

    Detects packers and potentially unwanted programs — Detects packers that compress and encrypt the original code of an executable file. Also detects potentially unwanted programs. • Filters content — Scans the content in each email message's subject line, body, and attachment. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 138: Management Features

    Quarantine management — Allows you to specify a local database to be used as a repository for quarantining infected email messages and configure maintenance settings for it. Also allows you to specify McAfee Quarantine Manager 6.0, located on a different server, as a repository for quarantining infected email messages.
  • Page 139: The Installation And Setup Process

    On the Dashboard page, click Install Protection. Select Install email protection, then click Next. In the email server protection section, click the URL to download the compressed file containing the software and documentation. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 140: The Email Server Protection Widget And Management Console

    This link appears if you have not yet downloaded and installed the software. • View Details — Displays a report containing data about the protected email servers on your account. This link appears after you have downloaded and installed the software. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 141: Management Of Email Server Protection

    The SecurityCenter provides a centralized location for managing all the email servers in your account. Checking notifications and action items Use this task to check for new information and problems that require action from you. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 142: Viewing Detection And Status Information

    Viewing detection and status information Use this task to open the Email Server Protection report, which lists identification, status, and detection summary information for each protected email server in your account. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 143: Accessing The Management Console On The Server

    Explorer 6.0 and 7.0, Mozilla Firefox 2.0, and Netscape Navigator 9.0. In the management console, click buttons along the left side to access information: • Dashboard • Graphical Reports • Statistics & Information • Detected Items • • On-demand Scans Policy Manager McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 144: Where To Find More Information

    Online help (available by clicking Help in the management console) It is installed on the email server along with the software. Refer to these documents for information on installing, configuring, and managing email server protection. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 145: Using Vulnerability Scanning

    Collects and updates vulnerability data around-the-clock from hundreds of sources worldwide, ensuring its ability to detect the latest risks. • Meets the website security vulnerabilities audit requirements mandated by HIPAA, GRAMM-LEACH-BILEY, SARBANES-OXLEY, and other federal legislation. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 146: The Vulnerability Scanning Widget And Portal

    When you purchase a subscription for vulnerability scanning, the Vulnerability Scanning widget is displayed on the Dashboard page of the SecurityCenter. The widget contains a link (Click here to configure) to the vulnerability scanning portal. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 147: Accessing The Vulnerability Scanning Portal

    • Configure and perform scans. • Access scan results for information about detected vulnerabilities and remediation options. Click Logout in the top right corner to close the portal and return to the SecurityCenter. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 148: Overview Of Scanning Process

    Configure the devices you want to scan. This includes selecting the type of device, which determines the standard used for scanning. Configure the devices to accept the McAfee IP addresses where vulnerability scans originate. Create groups where devices can be placed. (Optional) Configure and initiate scans manually, or schedule them to occur at a later time.
  • Page 149: Types Of Scans

    Vulnerabilities can be assigned different levels of severity by the different standards. Because of this, it is possible for devices to be compliant with the McAfee SECURE standard but not the PCI standard, which has specific requirements developed for devices that process payment card data.
  • Page 150: Managing Scan Devices

    The network discovery tool identifies which IP addresses within a network (a specified range of IP addresses) are active. Use this task to identify the active IP addresses you need to scan within a range of IP addresses. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 151: Adding Devices To Scan

    Select this option if you are scanning devices involved with processing credit card information. Type a domain name or IP address. For domain names, "http://" is not required, but "www" is required if applicable. For example, to add the domain name http://www.mydomain.com, enter www.mydomain.com. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 152: Configuring Devices To Accept Scans

    If you selected OnDemand in step 6, no scan will be performed for the devices you have just added until you initiate one. If you selected a different option, McAfee will begin a scan within 24 hours and notify you by email when it is complete.
  • Page 153: Creating Device Groups

    • Select a device from the In Group list, then click Remove to remove the device from the group. Click Save to return to the Device Groups page. Repeat steps 3-5 for each group you want to reconfigure. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 154: Deleting Devices

    IP addresses are listed under Audit. (You can filter the listing by selecting a group from the top drop-down list.) • Networks are listed under Port Discovery. • Domains are listed under DNS Discovery. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 155: Scheduling Scans For Devices

    If you are configuring a Device Audit, for Audit Period on the General tab, select an entry from the drop-down list. Options are OnDemand, Daily, Weekly, Monthly, and Quarterly. Select other options as needed. Click Save. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 156: How Detections Are Reported

    To view: Under Audits, select Vulnerabilities, then select the name of a vulnerability to display details about it and options for remediation. Viewing scan results Use these tasks to view the results of vulnerability scans. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 157: Viewing Results For Audit Scans

    If the results for the last discovery scan show that one or more devices in the domain are not being audited, to add them click Continue at the bottom of the page under Provision Devices Not Currently Auditing. On the Add Devices page, select options adding the devices for scanning. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 158: Viewing Results For Network Discovery Scans

    Device means computer hardware, network, storage, input/output, or electronic control devices, or software installed on such devices. Domain means the systems accessible by the Internet that facilitate, provide, or describe services. This is often a website. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 159 • An IP address that is not configured on any device is typically treated like a firewall that drops packets. • A Class C subnet that drops packets on average takes 12 hours. McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 160: Error Messages

    What is the difference between PCI scans and McAfee SECURE scans? The scanning process for PCI and McAfee SECURE are the same. They differ in the severity levels they assign to vulnerabilities. For example, if a vulnerability is discovered and assigned a severity level of 2 by the McAfee SECURE standard, that device is considered McAfee SECURE compliant.
  • Page 161: Index

    (firewall protection) Avert Labs widgets on Dashboard page (SecurityCenter) defined administrative features logging on as administrator (client console) administrative website, See SecurityCenter website background tasks McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 162 SiteAdvisor menu selecting on SecurityCenter pages tracking Internet usage client software viewing browsing activity access to viewing safety balloons and icons Action menu viewing safety reports communication problems (browser protection) Web Filtering report McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 163 Detections report and configuration (email protection) detections, handling MX records scanning during on-demand scans policies McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 164 (SecurityCenter) browser protection, at client computer IP addresses for custom connections browser protection, by policy logo for reports (SecurityCenter) firewall protection policies (SecurityCenter) on-access scanning widgets on Dashboard page (SecurityCenter) spyware protection McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 165 SecurityCenter pages email protection sending to client computer users activating sending to group administrators activity, viewing enable archiving, overview browser protection, at client computer McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 166 SecurityCenter administrators, overview Firefox assigning computers blocking file downloads configuring firewall default troubleshooting illustrated Windows 7 managing Windows Vista overview Windows XP McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 167 (vulnerability scanning) McAfee Default policy dynamic (vulnerability scanning) McAfee SecurityCenter, See SecurityCenter website overview McAfee ServicePortal, accessing protected email servers, viewing memory, scanning IPV4 format menu, SiteAdvisor IPV6 format merge accounts McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 168 (email protection) from the client console configuring from Windows Explorer quarantine settings overview policies (firewall protection) Potentially Unwanted Program Viewer and Administrator configures firewall McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 169 CHAP or NTML when they appear (virus and spyware protection) updates and popups, See popup prompts purchase, subscriptions and licenses popups (browser protection) browsers and safety ratings portal (email protection) accessing Quarantine Viewer, using McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 170 SiteAdvisor website safety balloons and icons viewing site safety reports safety ratings Web Filtering authorized sites and website safety, content details browser protection and website safety, overview configuring website access and file downloads and McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 171 (browser protection) schedule, vulnerability scans and audits severity levels (vulnerability scanning) scheduled reports site patterns, browser protection search engines and browser protection SiteAdvisor menu searching of websites SiteAdvisor toolbar, displaying protection for Smart Recommendations McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 172 (email server protection, Microsoft Exchange) Rumor technology requirements for opening management console Temp folder and troubleshooting (firewall protection) troubleshooting firewall, Windows unable to connect to server Internet Explorer McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 173 Report mode groups, all reports, overview help, online scans, email, from Outlook policies scans, on-demand, from console policies, all scans, on-demand, from Windows Explorer protection status scans, scheduled, viewing subscription information McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 174 Windows Vista authorized sites, configuring fast user switching support authorized sites, overview firewall best practices IP addresses, IPv6 format blocking file downloads, by ratings McAfee Total Protection Service 5.1.5 Product Guide...
  • Page 175 Index Windows XP Windows XP (continued) fails to recognize virus protection updating computers where no user is logged on fast user switching support windows, open firewall McAfee Total Protection Service 5.1.5 Product Guide...

This manual is also suitable for:

Total protection service 5.1.5

Table of Contents