McAfee MTP08EMB3RUA - Total Protection - PC Product Manual page 4

Product guide
Hide thumbs Also See for MTP08EMB3RUA - Total Protection - PC:
Table of Contents

Advertisement

Contents
Protection status at a glance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
Management of client computers . . . . . . . . . . . . . . . . . . . . . . . . . . .
Management of computer groups . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Management of group administrators . . . . . . . . . . . . . . . . . . . . . . . . . . 48
Management of security policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Generation of security reports . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Managing your account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
Downloading tools and utilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
Getting assistance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
Frequently asked questions about the SecurityCenter . . . . . . . . . . . . . . . . . . . 66
4
How detections are handled . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Spyware protection mode and detections . . . . . . . . . . . . . . . . . . . . . . . . 70
Types of scans . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Scanning on client computers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
Configuring scanning policy options . . . . . . . . . . . . . . . . . . . . . . . . . . 76
Managing detections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
4
McAfee Total Protection Service 5.1.5 Product Guide
Accessing data on SecurityCenter pages . . . . . . . . . . . . . . . . . . . . .
Viewing protection at a glance . . . . . . . . . . . . . . . . . . . . . . . . . 42
Working with widgets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
Working with computers . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
Working with an individual computer . . . . . . . . . . . . . . . . . . . . . . . 46
Working with groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
Working with group administrators . . . . . . . . . . . . . . . . . . . . . . . . 50
McAfee Default policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
Working with policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
Scheduling reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
Adding your logo to reports . . . . . . . . . . . . . . . . . . . . . . . . . .
Computer Profiles report . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Duplicate Computers report . . . . . . . . . . . . . . . . . . . . . . . . . .
Configuring your account profile . . . . . . . . . . . . . . . . . . . . . . . . . 61
Signing up for email notifications . . . . . . . . . . . . . . . . . . . . . . . . 61
Viewing and updating subscription information . . . . . . . . . . . . . . . . . . . 62
Buying and renewing subscriptions and licenses . . . . . . . . . . . . . . . . . . 62
Locating or creating keys for your account . . . . . . . . . . . . . . . . . . . .
Merging accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Questions about reporting . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
Use learn mode to discover programs . . . . . . . . . . . . . . . . . . . . . .
On-access (automatic) scans . . . . . . . . . . . . . . . . . . . . . . . . . . 72
On-demand scans . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
Email scans . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
Spyware scans . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
Scanning on demand from the console . . . . . . . . . . . . . . . . . . . . . . 74
Scanning on demand from Windows Explorer . . . . . . . . . . . . . . . . . . .
Scanning email on client computers . . . . . . . . . . . . . . . . . . . . . . . 75
Viewing the progress of scheduled scans . . . . . . . . . . . . . . . . . . . . . 75
Enabling and disabling on-access scanning . . . . . . . . . . . . . . . . . . . .
Scheduling a scan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
Enabling optional types of virus scans . . . . . . . . . . . . . . . . . . . . . . 76
Excluding files and folders from virus scans . . . . . . . . . . . . . . . . . . . . 77
Selecting spyware scanning options . . . . . . . . . . . . . . . . . . . . . . . 78
Approving and unapproving programs in a policy . . . . . . . . . . . . . . . . . . 78
Viewing scan results on client computers . . . . . . . . . . . . . . . . . . . . . 79
39
43
56
58
60
63
64
69
70
71
75
76
80

Advertisement

Table of Contents
loading

This manual is also suitable for:

Total protection service 5.1.5

Table of Contents