202
Index
Set security level to Automatic ...............71
Set security level to Standard..................71
Set security level to Stealth .....................71
Setting up a managed network .............137
Setting up EasyNetwork ........................155
Setting up virus protection ...............31, 45
share .......................................................179
Share a file ..............................................162
shared secret ..........................................179
Sharing and sending files ......................161
Sharing printers .....................................167
shortcut ..................................................179
Show or hide an item on the network map
.............................................................139
Show or hide ignored problems .............19
Show or hide informational alerts..........22
Show or hide informational alerts when
gaming ..................................................23
...............................................................22
Shredder features ..................................130
Shredding files, folders, and disks ........131
smart drive .............................................179
SMTP ......................................................179
SSID ........................................................179
SSL ..........................................................180
standard e-mail account .......................180
Start instant messaging protection ........43
Starting Firewall.......................................63
Stop managing a computer's protection
status ...................................................144
Stop real-time virus protection ..............47
Stop sharing a file ..................................162
Stop sharing a printer............................168
Stop trusting computers on the network
.............................................................142
synchronize............................................180
system restore point ..............................180
SystemGuard..........................................180
T
temporary file ........................................180
TKIP................................................ 180, 183
Trace a computer from the Inbound
Events log ...........................................108
Trace a computer from the Intrusion
Detection Events log ..........................108
Trace a monitored IP address...............109
Tracing Internet traffic..........................107
Trojan, Trojan horse .............................180
trusted list ..............................................180
U
U3 ...........................................................181
Understanding Network Manager icons
.............................................................135
Understanding protection categories. 7, 9,
27
Understanding protection services........10
Understanding protection status ..... 7, 8, 9
Unlock Firewall instantly........................78
Updating SecurityCenter ........................13
URL.........................................................181
USB.........................................................181
USB drive ....................................... 179, 181
USB wireless adapter card ....................181
Using additional protection ...................41
Using McAfee Virtual Technician ........188
Using SecurityCenter ................................7
V
Verify your subscription .........................11
View details for an item ........................139
View global Internet port activity.........106
View global security event statistics.....106
View inbound events.............................105
View intrusion detection events...........105
View outbound events .................... 83, 105
Viewing events................................... 17, 27
virus........................................................181
VirusScan features...................................30
VPN.........................................................181
W
wardriver................................................181
watch file types ......................................181
watch locations......................................181
web bugs ................................................182
webmail.......................................... 173, 182
WEP ................................................ 175, 182
whitelist.......................................... 172, 182