McAfee MIS80E001RAI - Internet Security Suite 2006 User Manual

User guide
Table of Contents

Advertisement

Quick Links

User Guide

Advertisement

Table of Contents
loading

Summary of Contents for McAfee MIS80E001RAI - Internet Security Suite 2006

  • Page 1 User Guide...
  • Page 2 For any such software covered under the GPL, the source code is made available on this CD. If any Free Software licenses require that McAfee provide rights to use, copy or modify a software program that are broader than the rights granted in this agreement, then such rights shall take precedence over the rights and restrictions herein.
  • Page 3: Quick Start Card

    McAfee reserves the right to change Upgrade & Support Plans and policies at any time without notice. McAfee and its product names are registered trademarks of McAfee, Inc. and/or its affiliates in the US and/or other countries.
  • Page 4 Acrobat Reader installed; if Go to http://www.mcafee.com/ for pricing not, install it now from the McAfee product CD. of an additional year of filter updates. Insert your product CD into your CD-ROM McAfee Internet Security Suite updates for drive.
  • Page 5: Table Of Contents

    2 McAfee VirusScan ........
  • Page 6 Blue alerts ............80 4 McAfee Privacy Service ....... . . 81 Features .
  • Page 7 Viewing Saved Logs ........... . . 97 Erasing files permanently using McAfee Shredder ......97 Why Windows leaves file remnants .
  • Page 8 5 McAfee SpamKiller ........103...
  • Page 9 Reporting spam to McAfee ........
  • Page 10 Contents McAfee® Internet Security Suite® software...
  • Page 11: Introduction

    Internet connections. McAfee Internet Security Suite is a proven security solution that provides powerful protection for today's Internet users. McAfee Internet Security Suite comprises the following products:...
  • Page 12: Mcafee Internet Security Software

    It secures your personal information while providing greater control over your family's Internet experience. McAfee's Privacy Service ensures that you do not expose confidential information to online threats and protects you and your family from inappropriate online content.
  • Page 13: Supported E-Mail Programs

    Microsoft Windows Messenger 3.6 or later MSN Messenger 6.0 or later Using McAfee SecurityCenter McAfee SecurityCenter is your one-stop security shop, accessible from its icon in your Windows system tray or from your Windows desktop. With it, you can perform these useful tasks: Get free security analysis for your computer.
  • Page 14 Windows system tray. This area is usually in the lower-right corner of the Windows desktop and contains the clock. If one or more of the McAfee applications installed on your computer are disabled, the McAfee icon changes to black To open McAfee SecurityCenter: Right-click the McAfee icon in the Windows system tray.
  • Page 15: Removing Internet Security Suite Programs

    , and then click Start Control Panel (Windows XP). Click Add/Remove Programs Select the McAfee Uninstall Wizard, then one or more programs, and then click . To remove all the Internet Security products, click , then Uninstall Select All Uninstall To proceed with the removal, click If prompted, restart your computer.
  • Page 16 Introduction ® ® McAfee Internet Security Suite software...
  • Page 17: Mcafee Virusscan

    McAfee VirusScan Welcome to McAfee VirusScan. McAfee VirusScan is an anti-virus subscription service offering comprehensive, reliable, and up-to-date virus protection. Powered by award-winning McAfee scanning technology, VirusScan protects against viruses, worms, Trojan horses, suspect scripts, hybrid attacks, and other threats.
  • Page 18 McAfee VirusScan E-mail monitoring for worm-like activity WormStopper™ monitors suspect mass-mailing behaviors and stops viruses and worms from spreading through e-mail to other computers. Script monitoring for worm-like activity ScriptStopper™ monitors suspect script executions and stops viruses and worms from spreading through e-mail to other computers.
  • Page 19: Testing Virusscan

    Before you can test Scan, you must disable ActiveShield to prevent it from detecting the test files before Scan does, then download the test files. To download the test files: Disable ActiveShield: Right-click the McAfee icon, point to , then VirusScan...
  • Page 20 VSO Scan Folder Save Save As box. When you are finished downloading the files, close Internet Explorer. Enable ActiveShield: Right-click the McAfee icon, point to , then VirusScan click Enable To test Scan: Right-click the McAfee icon, point to...
  • Page 21: Using Mcafee Securitycenter

    Windows desktop and contains the clock. If one or more of the McAfee applications installed on your computer are disabled, the McAfee icon changes to black To open the McAfee SecurityCenter:...
  • Page 22 Windows starts. Enabling ActiveShield To enable ActiveShield for this Windows session only: Right-click the McAfee icon, point to , then click . The McAfee icon VirusScan...
  • Page 23: Configuring Activeshield Options

    Using ActiveShield Disabling ActiveShield To disable ActiveShield for this Windows session only: Right-click the McAfee icon, point to , then click VirusScan Disable Click to confirm. The McAfee icon changes to black If ActiveShield is still configured to start when Windows starts, your computer will be protected from threats again when you restart your computer.
  • Page 24 ActiveShield temporarily to install new files. When the Update prompts you to click , ActiveShield starts again. Wizard Finish To start ActiveShield automatically when Windows starts: Right-click the McAfee icon, point to , then click VirusScan Options dialog box opens (Figure 2-1 on page 23).
  • Page 25 By default, ActiveShield scans both inbound and outbound e-mail. However, for enhanced control, you can set ActiveShield to scan only inbound or outbound e-mail. To disable scanning of inbound or outbound e-mail: Right-click the McAfee icon, point to , and then click VirusScan Options...
  • Page 26 To set ActiveShield to scan sent e-mail messages for worm-like activity: Right-click the McAfee icon, point to , then click VirusScan...
  • Page 27 Alerting when 5 or more e-mails are sent within 30 seconds NOTE If you modify the number of recipients or seconds for monitoring sent e-mails, it might result in invalid detections. McAfee recommends that you click to retain the default setting. Otherwise, click to change the default setting to your setting.
  • Page 28 Use this option to get the most thorough scan possible. To set ActiveShield to scan all file types: Right-click the McAfee icon, point to , and then click VirusScan...
  • Page 29 The latest virus signature file ( file) determines which file types that ActiveShield will scan.To set ActiveShield to scan program files and documents only: Right-click the McAfee icon, point to , and then click VirusScan Options...
  • Page 30 To set ActiveShield to scan running scripts for worm-like activity: Right-click the McAfee icon, point to , then click VirusScan...
  • Page 31 Using ActiveShield Scanning for Potentially Unwanted Programs (PUPs) NOTE If McAfee AntiSpyware is installed on your computer, it manages all Potentially Unwanted Program activity. Open McAfee AntiSpyware to configure your options. If you set ActiveShield to use the default Scan Potentially Unwanted Programs...
  • Page 32: Understanding Security Alerts

    You can then choose how to manage detected files, detected e-mail, suspect scripts, potential worms, or PUPs, including whether to submit detected files to the McAfee AVERT labs for research. For added protection, whenever ActiveShield detects a suspect file, you are prompted to scan your entire computer immediately.
  • Page 33 Using ActiveShield Managing detected e-mail By default, e-mail scanning automatically tries to clean detected e-mail. An alert file included in the inbound message notifies you whether the e-mail was cleaned, quarantined, or deleted. Managing suspect scripts If ActiveShield detects a suspect script, you can find out more and then stop the script if you did not intend to initiate it: Click to view the name, location, and description...
  • Page 34 PUPs" for details. Managing trusted PUPs The programs that you add to the Trusted PUPs list will not be detected by McAfee VirusScan. If a PUP is detected and added to the Trusted PUPs list, you can later remove it from the list if necessary.
  • Page 35: Manually Scanning Your Computer

    Potentially Unwanted Program. If Scan cannot clean the file, you can quarantine or delete the file. Manually scanning for viruses and other threats To scan your computer: Right-click the McAfee icon, point to , then click VirusScan Scan...
  • Page 36 McAfee VirusScan The files in Figure 2-8 are the only files scanned if you deselect the Example: checkbox. The folders and their contents are not scanned. Scan subfolders To scan those folders and their contents, you must leave the checkbox selected.
  • Page 37 Manually scanning your computer — Use this option to detect Scan for Potentially Unwanted Programs spyware, adware, and other programs that gather and transmit your private data without your permission. NOTE Leave all options selected for the most thorough scan possible. This effectively scans every file in the drive or folder that you select, so allow plenty of time for the scan to complete.
  • Page 38: Automatically Scanning For Viruses And Other Threats

    Windows Scheduler to thoroughly check your computer for viruses and other threats at specified intervals. To schedule a scan: Right-click the McAfee icon, point to , then click VirusScan Options dialog box opens.
  • Page 39 Manually scanning your computer Figure 2-10. Scheduled Scan Options Select the checkbox to enable automatic Scan My Computer at a scheduled time scanning. Specify a schedule for automatic scanning: To accept the default schedule (8PM every Friday), click To edit the schedule: a.
  • Page 40: Understanding Threat Detections

    For most viruses, Trojans, and worms, Scan automatically tries to clean the file. You can then choose how to manage detected files, including whether to submit them to the McAfee AVERT labs for research. If Scan detects a potentially unwanted program, you can manually try to clean, quarantine, or delete it (AVERT submission is unavailable).
  • Page 41: Managing Quarantined Files

    Creating a Rescue Disk on page 43 for details. For more help, consult McAfee Customer Support at http://www.mcafeehelp.com/. Managing quarantined files The Quarantine feature encrypts and temporarily isolates suspect files in the quarantine directory until an appropriate action can be taken. Once cleaned, a quarantined file can then be restored to its original location.
  • Page 42 Delete If VirusScan cannot clean or delete the file, and if it is not a Potentially Unwanted Program, you can submit the file to the McAfee AntiVirus Emergency Response Team (AVERT ) for research: Update your virus signature files if they are more than two weeks old.
  • Page 43: Creating A Rescue Disk

    Scan to ensure that both the computer and the floppy disk are virus-free. (See Manually scanning for viruses and other threats on page 35 details.) Right-click the McAfee icon, point to , then click VirusScan Create Rescue Disk...
  • Page 44: Write-Protecting A Rescue Disk

    McAfee VirusScan When the message “Rescue disk created” appears, click , then close the dialog box. Create Rescue Disk Remove the Rescue Disk from the drive, write-protect it, and store it in a safe location. Write-protecting a Rescue Disk To write-protect a Rescue Disk: Turn the floppy disk label-side down (the metal circle should be visible).
  • Page 45: Reporting To The World Virus Map

    Figure 2-13. Virus Map Reporting Options Accept the default to anonymously send your virus Yes, I want to participate information to McAfee for inclusion in its World Virus Map of worldwide detection rates. Otherwise, select to avoid sending No, I don’t want to participate your information.
  • Page 46: Viewing The World Virus Map

    Viewing the World Virus Map Whether or not you participate in the World Virus Map, you can view the latest worldwide detection rates via the McAfee icon in your Windows system tray. To view the World Virus Map: Right-click the McAfee icon, point to...
  • Page 47: Updating Virusscan

    Automatically checking for updates McAfee SecurityCenter is automatically configured to check for updates for all of your McAfee services every four hours when you are connected to the Internet, then notify you with alerts and sounds. By default, SecurityCenter automatically downloads and installs any available updates.
  • Page 48 McAfee VirusScan Figure 2-15. Updates dialog box Log on to the web site if prompted. The installs the update Update Wizard automatically. Click when the update is finished installing. Finish NOTE In some cases, you will be prompted to restart your computer to complete the update.
  • Page 49: Mcafee Personal Firewall Plus

    McAfee Personal Firewall Plus Welcome to McAfee Personal Firewall Plus. McAfee Personal Firewall Plus software offers advanced protection for your computer and your personal data. Personal Firewall establishes a barrier between your computer and the Internet, silently monitoring Internet traffic for suspicious activities.
  • Page 50 IP addresses. Improved Usability McAfee Personal Firewall Plus includes a Setup Assistant and a User Tutorial to guide users in the setup and use of their firewall. Although the product is designed to use without any intervention, McAfee provides users with a wealth of resources to understand and appreciate what the firewall provides for them.
  • Page 51: Removing Other Firewalls

    When installed, McAfee Personal Firewall automatically disables Windows Firewall and sets itself as your default firewall. You then experience only McAfee Personal Firewall functionality and messaging. If you subsequently enable Windows Firewall via Windows Security Center or Windows Control Panel, letting both firewalls run on your computer might result in partial loss of logging in McAfee Firewall as well as duplicate status and alert messaging.
  • Page 52: Setting The Security Level

    To ensure that your computer is protected by at least one firewall, Windows Firewall is automatically re-enabled when McAfee Personal Firewall is uninstalled. If you disable McAfee Personal Firewall or set its security setting to without Open manually enabling Windows Firewall, all firewall protection will be removed except for previously blocked applications.
  • Page 53 Setting the security level — When an application requests a specific type of access to Tight Security the Internet (for example, Outbound Only Access), you can allow or disallow the application an Internet connection. If the application later requests Full Access, you can then grant Full Access or restrict it to Outbound Only access.
  • Page 54: Testing Mcafee Personal Firewall Plus

    Testing McAfee Personal Firewall Plus You can test your Personal Firewall installation for possible vulnerabilities to intrusion and suspicious activity. To test your Personal Firewall installation from the McAfee system tray icon: Right-click the McAfee icon in the Windows system tray, and select...
  • Page 55: About The Summary Page

    Windows desktop and contains the clock. If one or more of the McAfee applications installed on your computer are disabled, the McAfee icon changes to black To launch the McAfee SecurityCenter:...
  • Page 56 McAfee Personal Firewall Plus To open the Main Summary page in Personal Firewall: Right-click the McAfee icon in the Windows system tray, point to Personal , then select (Figure 3-1). Firewall View Summary Figure 3-1. Main Summary page Click the following to navigate to different Summary pages:...
  • Page 57 Click a link in Common Tasks to go to Personal Firewall pages where you can view firewall activity and perform tasks. To view the Application Summary page: Right-click the McAfee icon in the Windows system tray, point to Personal , then select Firewall View Summary.
  • Page 58 McAfee Personal Firewall Plus Item Description Active Active Applications displays the applications that are currently Applications running on your computer and accessing the Internet. Click an application to view which IP addresses the application is connecting Common Tasks Click a link in Common Tasks to go to Personal Firewall pages where you can view application status and perform application-related tasks.
  • Page 59 About the Summary page The HackerWatch Summary page provides the following information Item Description World Activity World Activity shows a world map identifying recently blocked activity monitored by HackerWatch.org. Click the map to open the Global Threat Analysis Map in HackerWatch.org. Event Tracking Event Tracking shows the number of inbound events submitted to HackerWatch.org.
  • Page 60: About The Internet Applications Page

    McAfee Personal Firewall Plus About the Internet Applications page Use the Internet Applications page to view the list of allowed and blocked applications. To launch the Internet Applications page: Right-click the McAfee icon in the Windows system tray, point to...
  • Page 61: Changing Application Rules

    About the Internet Applications page Changing application rules Personal Firewall lets you change access rules for applications. To change an application rule: Right-click the McAfee icon, point to , then select Personal Firewall Internet Applications In the list, right-click the application rule for an...
  • Page 62: About The Inbound Events Page

    McAfee Personal Firewall Plus About the Inbound Events page Use the Inbound Events page to view the Inbound Events log, generated when Personal Firewall blocks unsolicited Internet connections. To launch the Inbound Events page: Right-click the McAfee icon in the Windows system tray, point to...
  • Page 63: Understanding Events

    About the Inbound Events page Understanding events About IP addresses IP addresses are numbers: four numbers each between 0 and 255 to be precise. These numbers identify a specific place that traffic can be directed to on the Internet. IP address types Several IP addresses are unusual for various reasons: —...
  • Page 64 McAfee Personal Firewall Plus Personal Firewall allows traffic from these programs, so if you see events from 127.0.0.1, it is likely that the source IP address is spoofed, or faked. Spoofed packets are usually indicate that another computer is scanning yours for Trojans. Personal Firewall blocks such intrusion attempts, so your computer is safe.
  • Page 65: Showing Events In The Inbound Events Log

    Event Information Showing today's events Use this option to review the day’s events. To show today’s events: Right-click the McAfee icon in the Windows system tray, point to Personal , then select Firewall Inbound Events On the Inbound Events log, right-click an entry, then click...
  • Page 66 McAfee Personal Firewall Plus Showing events from a specific day Use this option to review events from a specific day. To show a day's events: Right-click the McAfee icon in the Windows system tray, point to Personal , then select Firewall...
  • Page 67: Responding To Inbound Events

    The Event Information column provides a description of the event and, if known, the common program or service that uses that port. To show events that share identical event information: Right-click the McAfee icon in the Windows system tray, point to Personal , and click...
  • Page 68 McAfee Personal Firewall Plus Reporting an event To report an event that you think was an attack on your computer: Right-click the McAfee icon in the Windows system tray, point to Personal , and select Firewall Inbound Events Click the event you want to report, then click...
  • Page 69 Verify that the IP address displayed in the Trust This Address dialog is correct, and click . The IP address is added to the Trusted IP Addresses list. To verify that the IP address was added: Right-click the McAfee icon in the Windows system tray, point to Personal , and select Firewall...
  • Page 70 McAfee Personal Firewall Plus : Date and time in which the Banned IP Address rule Make this rule expire on expires. Select the appropriate drop down menus to select the date and the time. : Optionally describe the new rule.
  • Page 71: Managing The Inbound Events Log

    You should archive your Inbound Events log periodically to prevent the Inbound Events log from growing too large. To archive the Inbound Events log: Right-click the McAfee icon in the Windows system tray, point to Personal , then select...
  • Page 72: About Alerts

    Save the Notepad file in a safe place. Deleting the selected event You can delete events from the Inbound Events log. To delete events from the Inbound Events log: Right-click the McAfee icon in the Windows system tray, point to Personal , then select Firewall Inbound Events Click the event's entry on the Inbound Events page that you want to delete.
  • Page 73: Red Alerts

    If a Trojan program alert appears (Figure 3-4), Personal Firewall automatically denies this program access to the Internet and recommends that you scan your computer for viruses. If McAfee VirusScan is not installed, you can launch McAfee SecurityCenter. User Guide...
  • Page 74 McAfee Personal Firewall Plus Figure 3-4. Internet Application Blocked alert View a brief description of the event, then choose from these options: Click to get details about the event through the Find Out More Information Inbound Events log (see About the Inbound Events page on page 62 for details).
  • Page 75 Click here to learn more application. This option appears on the alert only if Personal Firewall is configured to use Smart Recommendations. McAfee might not recognize the application trying to gain Internet access (Figure 3-6). Figure 3-6. Unrecognized Application alert...
  • Page 76 McAfee Personal Firewall Plus Therefore, McAfee cannot give you a recommendation on how to handle the application. You can report the application to McAfee by clicking Tell McAfee about . A web page appears and asks you for information related to the this program application.
  • Page 77 About alerts View a brief description of the event, then choose from these options: Click to allow the application an outbound and inbound Internet Grant Access connection. Click to grant the application a temporary Internet Grant Access Once connection. Access is limited to the time the application launches to the time it closes.
  • Page 78: Green Alerts

    McAfee Personal Firewall Plus Click to prohibit an Internet connection. Block All Access Click to view online Help about application access Help me choose permissions.Green alerts Green alerts Green alerts notify you of events in Personal Firewall, such as applications that have been automatically granted Internet access.
  • Page 79 About alerts Application Has Been Modified alert If you selected security in the Security Settings options, Personal Firewall Trusting automatically grants Internet access for all modified applications. View a brief description of the event, then choose from these options: Click to get details about the event through the View the Application Log Internet Applications Log (see...
  • Page 80: Blue Alerts

    McAfee Personal Firewall Plus Blue alerts Blue alerts contain information, but require no response from you. — This alert appears when Personal Firewall Connection Attempt Blocked blocks unwanted Internet or network traffic. (Trusting, Standard, or Tight Security) Connection Attempt Blocked alert...
  • Page 81: Mcafee Privacy Service

    McAfee Privacy Service Thank you for purchasing McAfee® Privacy Service™. McAfee Privacy Service software offers advanced protection for you, your family, your personal data, and your computer. Features This release of McAfee Privacy Service includes the following features: Internet time usage rules - Specify days and times when users can access the Internet.
  • Page 82: Setting Up Privacy Service

    To configure a pre-installed version of Privacy Service: If you have not done so already, launch the Setup Assistant using one of the following methods: Right-click the McAfee icon in the Windows system tray, point to Privacy , and then select...
  • Page 83: Retrieving The Administrator Password

    Enter the answer to the security question that appears, and then click . A message appears containing your password. If you forget the Password answer to the security question, you must remove McAfee Privacy Service from Safe Mode (Windows 2000 and Windows XP only). Removing Privacy Service with Safe Mode...
  • Page 84: The Startup User

    Windows system tray. This area is usually in the lower-right corner of the Windows desktop and contains the clock. If one or more of the McAfee applications installed on your computer are disabled, the McAfee icon changes to black ®...
  • Page 85: Launching Mcafee Privacy Service

    After you install McAfee Privacy Service, the McAfee icon appears in the Windows system tray, which is located near the system clock. From the McAfee icon, you can access McAfee Privacy Service, McAfee SecurityCenter, and other McAfee products installed on your computer.
  • Page 86: Removing And Re-Installing Privacy Service

    Removing and Re-installing Privacy Service You must be logged in to Privacy Service as the Administrator to un-install the product. If this McAfee product is pre-installed on your computer, see your PC manufacturer's documentation for information about removing and re-installing Privacy Service.
  • Page 87: Removing Privacy Service

    . Your computer Close restarts to complete the un-installation process. Installing Privacy Service To install Privacy Service: Go to the McAfee Web site and navigate to the Privacy Service page. Click the link on the Privacy Service page. Download Click on any messages that appear asking if you want to download files from the McAfee web site.
  • Page 88: Setting The Password

    —Allows web sites to read the cookies they send to your Accept all cookies computer. NOTE Some web sites, to work properly, require that cookies are enabled. Privacy Service accepts cookies from McAfee at all times. ® ® McAfee Internet Security Suite software...
  • Page 89: Setting The Internet Time Limits

    Privacy Service database. An Administrator can either lookup existing keywords or specify new keywords to associate with certain age levels. To create keyword Web site permissions: Right-click the McAfee icon in the Windows system tray, point to Privacy , then select Service...
  • Page 90: Changing Passwords

    The age level, to which the word was assigned, and those that appear below it, are allowed to access Web sites where the word exists. To modify existing Web site permissions: Right-click the McAfee icon in the Windows system tray, point to Privacy , then select...
  • Page 91: Changing A User's Information

    Changing a user’s information Enter the same password in the field, and then click Confirm password Apply Click in the confirmation dialog box. NOTE An Administrator can change a user’s password without knowing the user’s current password. Changing a user’s information Select the user whose information you are changing and click Edit Select...
  • Page 92: Changing The Age Group

    Privacy Service displays a message telling the user that they are not allowed to use the Internet at this time. Click Apply On the Time Limits page, click In the McAfee Privacy Service McAfee Privacy Service confirmation dialog, click ® ® McAfee...
  • Page 93: Changing The Startup User

    Changing the Startup user Changing the Startup user The Administrator can change the Startup user at any time. If a Startup user already exists, you do not have to deselect them as a Startup user. Select the user that you want to designate as the Startup user, and then click Edit Select User Info...
  • Page 94: Blocking Information

    McAfee Privacy Service In the field, enter the URL of the web site that you want to allow, and http:// then click . The web site appears in the list. Allowed Web Sites Blocking information The Administrator can prevent other users from sending specific personal information over the Internet (the Administrator can still send this information).
  • Page 95: Blocking Web Bugs

    —Blocks pop-ups while you are using the Block Pop-Ups on this computer Internet. Click , and then click in the confirmation dialog box. Apply To disable pop-up blocking, right-click the web page, point to McAfee Pop-Up , and deselect Blocker Enable Pop-up Blocker User Guide...
  • Page 96: Allowing Cookies From Specific Web Sites

    McAfee Privacy Service Allowing cookies from specific Web sites If you block cookies or require to be prompted before they are accepted, and find that certain web sites do not function properly, then configure Privacy Service to allow the site to read its cookies.
  • Page 97: Viewing Saved Logs

    Privacy Service database settings, click . To restore your settings, Backup click Restore Erasing files permanently using McAfee Shredder McAfee Shredder protects your privacy by quickly and safely erasing unwanted files. Deleted files can be recovered from your computer even after you empty your Recycle Bin.
  • Page 98: Why Windows Leaves File Remnants

    Send To McAfee Shredder Emptying the Windows Recycle Bin If files are in your Recycle Bin, McAfee Shredder offers a more secure method of emptying your Recycle Bin. To shred the contents of the Recycle Bin: On your Windows desktop, right-click the Recycle Bin.
  • Page 99: Backing Up The Privacy Service Database

    Backing up the Privacy Service database Add McAfee Shredder to your Send To menu Place a Shredder icon on your Windows desktop. To customize Shredder settings, open McAfee Shredder, click , and then Properties follow the on-screen instructions. Backing up the Privacy Service database You can restore the Privacy Service database two ways.
  • Page 100: Changing Your Password

    Type your password in the field. Password Click , and then click in the McAfee Privacy Service confirmation Restore dialog. These instructions do not apply to the Administrator. You can change your password and user name. We recommend that you change your password after the Administrator gives it to you.
  • Page 101: Clearing Your Cache

    This option is available only if the Administrator allows you to accept or reject cookies as they are intercepted. If you access web sites that require cookies, you can allow those sites permission to read cookies. Right-click the McAfee icon, point to , and then select McAfee Privacy Service Options...
  • Page 102: Rejecting Cookies

    This option is available only if the Administrator allows you to accept or reject cookies as they are intercepted. If you access web sites that do not require cookies, you can reject the cookies without being prompted. Right-click the McAfee icon, point to , and then select McAfee Privacy Service Options...
  • Page 103: Mcafee Spamkiller

    McAfee SpamKiller Welcome to McAfee SpamKiller. McAfee SpamKiller software helps stop spam from entering your e-mail Inbox. With it, you get the following features: User options Block spam using filters, and quarantine spam outside of your Inbox View blocked and accepted messages Monitor and filter multiple e-mail accounts Import friends’...
  • Page 104: Features

    Click to open the online Support page for McAfee, which provides Support hot topics on SpamKiller and other McAfee products, answers to frequently asked questions, and more. You must be connected to the Internet to access the Support page. Click...
  • Page 105: Understanding The Summary Page

    Understanding the Summary page Understanding the Summary page Click the tab to open the Summary page (Figure 5-1). Summary - indicates if filtering is enabled, when a Overview of your SpamKiller status Friends List was last updated, and the number of spam messages you received today.
  • Page 106: Using Mcafee Securitycenter

    Windows system tray (Windows XP notification area). If one or more of the McAfee applications installed on your computer are disabled, the McAfee icon changes to black: To open the McAfee SecurityCenter: Right-click the McAfee icon...
  • Page 107: Disabling Spamkiller

    Disabling SpamKiller When you install SpamKiller, the McAfee icon appears on your system tray located near your system clock. From the McAfee icon, you can access SpamKiller, McAfee SecurityCenter, and other McAfee products installed on your computer. Disabling SpamKiller You can disable SpamKiller and prevent e-mail from being filtered.
  • Page 108: Adding An E-Mail Account

    MSN/Hotmail e-mail Select Account as a POP3 account in SpamKiller, point your e-mail client to SpamKiller by changing the incoming e-mail server. For example, if your incoming e-mail server is “mail.mcafee.com”, change it to “localhost”. ® ®...
  • Page 109: Deleting E-Mail Accounts

    Deleting e-mail accounts Deleting e-mail accounts Delete an e-mail account from SpamKiller if you no longer want SpamKiller to filter it. Deleting an e-mail account from SpamKiller Click the tab, and then select . The Settings E-mail Accounts E-mail Accounts dialog box appears and displays all e-mail accounts added to SpamKiller.
  • Page 110 McAfee SpamKiller - user name you use to access the account. Also known as User name Account Name. - password you use to access the account. Password - name of the server that sends outgoing mail. Click Outgoing e-mail More to edit authentication requirements for the outgoing server.
  • Page 111 Editing e-mail account properties - length of time SpamKiller waits to receive e-mail before Server timeout timing out and stopping. Increase the server time-out value if you have problems receiving mail. Your e-mail connection might be slow; therefore, increasing the server time-out value allows SpamKiller to wait longer before timing out.
  • Page 112: Msn/Hotmail Accounts

    McAfee SpamKiller MSN/Hotmail accounts Editing MSN/Hotmail accounts Click the tab, and then click Settings E-mail Accounts dialog box appears and displays all e-mail accounts E-mail Accounts added to SpamKiller. NOTE If multiple users were added to SpamKiller, the list displays the e-mail accounts of the user who is currently logged on to SpamKiller.
  • Page 113: Mapi Accounts

    Editing e-mail account properties Click the tab to specify how SpamKiller dials an Internet Connection connection so that it can check your Inbox for new messages to filter. - SpamKiller does not automatically dial a Never dial a connection connection for you. You must first manually start your dial-up connection. - when an Internet connection is not available, Dial when needed SpamKiller automatically attempts to connect using your default dial-up...
  • Page 114 McAfee SpamKiller Editing MAPI accounts Click the tab, and then click . The Settings E-mail Accounts E-mail Accounts dialog box appears and displays all e-mail accounts added to SpamKiller. NOTE If multiple users were added to SpamKiller, the list displays the e-mail accounts of the user who is currently logged on to SpamKiller.
  • Page 115: Adding Users

    View message text of blocked messages View message text of accepted messages Manage Global Filters and the Global Friends List Report spam to McAfee Send complaints and error messages Manage complaints and error messages (create, edit, and delete message templates)
  • Page 116: User Passwords And Protecting Children From Spam

    McAfee SpamKiller You must have Windows 2000 or Windows XP on your computer. The users you are adding or managing must have Windows user accounts. User passwords and protecting children from spam Creating a user password enhances the privacy level. A user’s personal settings, Friends List, and Accepted E-mail list cannot be accessed by another user without the log on password.
  • Page 117: Logging On To Spamkiller In A Multi-User Environment

    Adding users Editing SpamKiller user profile Click the tab, and then click . A list of SpamKiller users appears. Settings Users Select a user, and then click Edit Type a new name and password. Deleting a SpamKiller user profile WARNING When you remove a user profile, you also remove the user’s e-mail accounts from SpamKiller.
  • Page 118 McAfee SpamKiller You can add friends to a Friends List to ensure their e-mail is not blocked. The Friends page displays names and addresses that you added to the Friends List. The Friends page also shows the date you added a friend and the total number of messages received from that friend.
  • Page 119: Opening A Friends List

    Opening a Friends List Opening a Friends List To open a Friends List, click the tab. The Friends page appears Friends (Figure 5-3). Click the , or tab. The Global Friends List E-mail Address Domains Mailing List appears. To view your Personal Friends List, click the down arrow on one of the tabs, and then select Personal Friends List...
  • Page 120: Importing An Address Book By Automatic Import

    McAfee SpamKiller Netscape Communicator (version 6 and earlier versions if exported as an LDIF file) Qualcomm Eudora (version 5 and later) IncrediMail Xe MSN/Hotmail Any program that can export its address book as a plain text file Importing an address book by automatic import You can update your Personal Friends List regularly by creating a schedule for importing addresses from address books.
  • Page 121: Editing Address Book Information

    Importing address books Click . A confirmation page lists the number of addresses that SpamKiller Next added. Click . The addresses appear in the Global Friends List or your Personal Finish Friends List. Editing address book information Edit information for an address book that was imported automatically. Click the tab, and then click Settings...
  • Page 122: Adding Friends

    McAfee SpamKiller Adding friends To ensure that you receive all e-mail from friends, add your friends’ names and addresses to a Friends List. You can add friends from the Friends page, the Blocked E-mail page, the Accepted E-mail page, and from Microsoft Outlook or Outlook Express.
  • Page 123: Adding Friends From The Friends Page

    Editing friends Adding friends from the Friends page Click the tab, and then click . The dialog Friends Add a Friend Friend Properties box appears. In the box, type the address to add to the Friends List. Address Type the name of your friend in the box.
  • Page 124: Deleting Friends

    McAfee SpamKiller Edit the appropriate information, and then click Deleting friends Remove addresses you no longer want in a Friends List. Click the tab, and then click the , or Friends E-mail Addresses Domains Mailing tab. Lists The Global Friends List appears. To view your Personal Friends List, click the...
  • Page 125: Blocked E-Mail Page

    Blocked E-mail page Blocked E-mail page Click the tab in the Messages page to view blocked messages. Blocked E-mail NOTE You can also access blocked messages in Microsoft Outlook by selecting the SpamKiller menu, and then clicking View Blocked Messages Blocked messages are messages that SpamKiller identified as spam, removed from your Inbox, and placed in the Blocked E-mail page.
  • Page 126 McAfee SpamKiller Error message sent - an error message was sent to the reply address in the spam message. Complaint and error messages sent - both a complaint and error message were sent. For more information on where blocked messages are, see...
  • Page 127: Accepted E-Mail Page

    Accepted E-mail page Accepted E-mail page Click the tab in the Messages page to view accepted messages. Accepted E-mail The Accepted E-mail page displays all Inbox messages in all of your e-mail accounts. However, for MAPI accounts, the Accepted E-mail page does not contain internal e-mail.
  • Page 128: Tasks For Blocked E-Mail And Accepted E-Mail

    Add a friend to a Friends List. - create a filter. Add a filter - inform McAfee of specific spam messages you receive. Report to McAfee - send a complaint about spam to the administrator of the Send a complaint sender’s domain or to another e-mail address you type.
  • Page 129: Rescuing Messages

    Rescuing messages Rescuing messages If the Blocked E-mail page or the SpamKiller folder in Microsoft Outlook and Outlook Express contains legitimate mail, you can put those messages back in your Inbox. From the Blocked E-Mail page Click the tab, and then click the tab.
  • Page 130: From Microsoft Outlook

    McAfee SpamKiller From Microsoft Outlook In Microsoft Outlook, messages from members of an Exchange server are considered safe and are not filtered by SpamKiller. Only messages from external sources are filtered. Open your Microsoft Outlook or Outlook Express Inbox. Select a message, and then click .
  • Page 131: Modifying How Spamkiller Processes Spam Messages

    (e-mails soliciting you to provide personal information to a known or potential scam Web site). The McAfee AntiPhishing filter helps protect you from Web sites that are blacklisted (confirmed phishing or related scam Web sites), or graylisted (contain some dangerous content or links to blacklisted Web sites).
  • Page 132: Adding Friends To A Friends List

    McAfee SpamKiller - places a link on the redirection page for Allow access to graylisted Web sites graylisted sites. Clicking this link takes you to the Web site. When you are finished, click Adding friends to a Friends List Adding friends from the Blocked E-mail or Accepted E-mail page on page 122.
  • Page 133 Adding filters - allows SpamKiller to detect common deliberate Match variations misspellings used by spammers. For example, the word “common” might be misspelled as “c0mm0n” to evade filters. - allows you to specify character patterns Regular Expressions (RegEx) used in filter conditions. To test a character pattern, click Test RegEx - this option only appears for conditions in which you typed Case-sensitive...
  • Page 134: Regular Expressions

    McAfee SpamKiller Regular expressions Regular expressions are only available for the following filter conditions: subject The message text At least one of the following phrases These special characters and sequences can be used as regular expressions when defining filter conditions. For example:...
  • Page 135 Adding filters Matches either x or y. For example, “z|wood“ matches “z“ or “wood“. “(z|w)oo“ matches “zoo“ or “wood“. The n is a non negative integer. Matches exactly n times. For example, “o{2}“ does not match the “o“ in “Bob,“ but matches the first two o's in “foooood“. {n,} The n is a non negative integer.
  • Page 136 McAfee SpamKiller Matches a non-digit character. Equivalent to [^0-9]. Matches a form-feed character. Matches a new line character. Matches a carriage return character. Matches any white space including space, tab, form-feed, etc. Equivalent to “[ \f\n\r\t\v]“. Matches any nonwhite space character. Equivalent to “[^ \f\n\r\t\v]“.
  • Page 137: Reporting Spam To Mcafee

    For example, “\x41“ matches “A“. “\x041“ is equivalent to “\x04“ & “1“. Allows ASCII codes to be used in regular expressions. Reporting spam to McAfee You can report spam to McAfee, where they analyze it to create filter updates. Click the tab, and then click the tab.
  • Page 138: Sending An Error Message Manually

    This section only applies to Microsoft Windows 2000 and XP users. Click and select Start Type SERVICES.MSC and click Right-click the McAfee SpamKiller Server and select . The server service Start starts. SpamKiller server is blocked by firewalls or internet filtering programs If the SpamKiller Server service is already started and running, follow these steps.
  • Page 139: Cannot Connect To The E-Mail Server

    Continue what I was doing Verify that you are connected to the Internet by surfing to a site. Verifying the POP3 server address for SpamKiller Right-click the McAfee icon in the system tray (lower right hand corner), point , and select SpamKiller...
  • Page 140 McAfee SpamKiller ® ® McAfee Internet Security Suite software...
  • Page 141: Index

    Index Application Has Been Modified Application Requests Internet Access Accepted E-mail Application Requests Server Access adding to a Friends List Connection Attempt Blocked icons in the accepted messages list for detected e-mail sending error messages for detected files tasks for potential worms Accepted E-mail page for PUPs ActiveShield...
  • Page 142 Friends List deleting inbound instant message attachments exporting auto-cleaning from 0.0.0.0 scanning from 127.0.0.1 Internet applications from computers on your LAN about from private IP addresses allowing and blocking HackerWatch.org advice changing application rules loopback McAfee® Internet Security Suite® software...
  • Page 143 Quick Start Card McAfee Security Center McAfee SecurityCenter Messages page regular expressions Microsoft Outlook reporting an event reporting spam to McAfee Rescue Disk new features creating updating using options write-protecting allowing cookies rescuing messages...
  • Page 144 Accepted E-mail page editing user profiles Blocked E-mail page logging on to SpamKiller disabling filtering switching users enabling filtering user types Startup user using a Rescue Disk submitting suspect files to AVERT McAfee® Internet Security Suite® software...
  • Page 145 Index utilities viruses alerts allowing suspect scripts cleaning deleting deleting detected files detecting detecting with ActiveShield quarantining quarantining detected files removing PUPs reporting automatically stopping potential worms stopping suspect scripts VirusScan reporting viruses automatically scanning via Microsoft Outlook toolbar scanning via Windows Explorer scheduling scans testing updating automatically...

Table of Contents