McAfee TSA00M005PAA - Total Protection Service Product Manual
McAfee TSA00M005PAA - Total Protection Service Product Manual

McAfee TSA00M005PAA - Total Protection Service Product Manual

Processor guide
Hide thumbs Also See for TSA00M005PAA - Total Protection Service:
Table of Contents

Advertisement

McAfee Total Protection Service
Product Guide

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the TSA00M005PAA - Total Protection Service and is the answer not in the manual?

Questions and answers

Summary of Contents for McAfee TSA00M005PAA - Total Protection Service

  • Page 1 McAfee Total Protection Service Product Guide...
  • Page 2 EXCHANGE), MCAFEE, NETSHIELD, PORTALSHIELD, PREVENTSYS, SECURITYALLIANCE, SITEADVISOR, TOTAL PROTECTION, VIRUSSCAN, WEBSHIELD are registered trademarks or trademarks of McAfee, Inc. and/or its affiliates in the US and/or other countries. McAfee Red in connection with security is distinctive of McAfee brand products. All other registered and unregistered trademarks herein are the sole property of their respective owners.
  • Page 3: Table Of Contents

    Uninstalling the client software ...................... 27 Frequently asked questions ........................28 Error messages ............................28 Using the SecurityCenter ..................30 The SecurityCenter ..........................30 Logging on to the SecurityCenter ....................31 Accessing data on SecurityCenter pages ..................32 McAfee Total Protection Service Product Guide...
  • Page 4 Frequently asked questions about the SecurityCenter ................61 Questions about reporting ......................61 Questions about adding, renewing, and moving licenses ..............62 Using Virus and Spyware Protection ................63 How detections are handled ........................64 McAfee Total Protection Service Product Guide...
  • Page 5 Connection type and detections of incoming communications ..............83 Custom connections ........................83 Firewall protection mode and detections of unknown applications .............. 85 Use learn mode to discover Internet applications ................86 The role of IP addresses ......................... 86 McAfee Total Protection Service Product Guide...
  • Page 6 Using the SiteAdvisor menu ......................105 Safety reports provide details ........................ 105 Viewing safety reports ........................ 107 Information that browser protection sends to McAfee ................107 Installing browser protection during policy updates ................108 Web filtering features ........................... 108 Enabling and disabling browser protection via policy ................108...
  • Page 7 How detections are reported ........................ 131 Viewing scan results ..........................132 Viewing results for audit scans ....................132 Viewing results for DNS discovery on domains ................133 Viewing results for network discovery scans ................. 133 McAfee Total Protection Service Product Guide...
  • Page 8: Introducing Total Protection Service

    This section provides an overview of the product and its features. Contents How Total Protection Service works Types of protection Core product strengths New features for this release The role of the client software Updates to the client software Management with the SecurityCenter McAfee Total Protection Service Product Guide...
  • Page 9: How Total Protection Service Works

    Client software runs on each computer where it is installed. The client software up dates itself — automatically and silently — by downloading the latest detection definition (DAT) files from your account’s administrative website, the McAfee Security Center. DAT files define the threats that the client software detects.
  • Page 10: Core Product Strengths

    McAfee Avert Labs, a research division of McAfee. Whenever Avert Labs releases an ® outbreak detection definition (DAT) file, computers on your account receives it promptly.
  • Page 11: New Features For This Release

    Select the summary and activity reports (known as widgets ) that appear Customize the SecurityCenter home page on the Dashboard page. Click and drag to reposition and resize widgets. Get real-time evaluation for unrecognized Artemis technology sends unrecognized detections to McAfee Avert threat detections Labs for evaluation. Schedule reports Customize the data that appears in reports, then automatically generate and email these reports at regular intervals.
  • Page 12: Updates To The Client Software

    • Updates to the security data maintained on the SecurityCenter website and used in administrative reports. At the same time, the client software sends information about its detections and protection status, to update the security data maintained on the SecurityCenter website and used in administrative reports. McAfee Total Protection Service Product Guide...
  • Page 13: Overview Of Update Methods

    3 Internet Independent Updating (IIU) enables any computer on the network to get information from the update site, even if that computer does not have an Internet connection, by communicating with the update site through a network computer that is configured as a relay server. McAfee Total Protection Service Product Guide...
  • Page 14: Simple Updates Through Direct Connections

    2 The computer without an Internet connection downloads updates directly from the update site through the relay server. You can specify which computers function as relay servers when you install the client software or at a later time. See the installation guide for more information. McAfee Total Protection Service Product Guide...
  • Page 15: Management With The Securitycenter

    These include reports on protection coverage (such as computers where protection is installed and enabled) and activity (such as the number of detections, emails, and website visits). The type, size, and placement of widgets can be customized. McAfee Total Protection Service Product Guide...
  • Page 16: Create User Groups

    To create groups, use the Computers tab on the SecurityCenter website. The following example shows how an administrator might configure policies for client computers in three different groups. You should configure policies for your users to meet your own company’s needs. McAfee Total Protection Service Product Guide...
  • Page 17: Customize Policies

    After installation, Total Protection Service protects client computers from threats immediately by using the security settings configured in the McAfee Default policy. However, you might want to change the way some features are implemented for some or all of the computers on your account.
  • Page 18 Administrator checks the security status for the Sales Team group in reports on the SecurityCenter. The administrator adjusts the Sales policy. The modified policy is downloaded automatically to client computers in the Sales Team group the next time they check for updates. McAfee Total Protection Service Product Guide...
  • Page 19: Check Reports

    Use them to evaluate the current policy options for your account and adjust them as needed. You can also schedule these reports to run at regular intervals and be delivered to you or other specified persons as an email attachment. McAfee Total Protection Service Product Guide...
  • Page 20: Using The Client Software

    (for example, when downloads are occurring) and perform manual updates. • Icon and protection status summary, which allows access to a limited set of features. • Icon and full console, which allows access to all features. This is the default setting. McAfee Total Protection Service Product Guide...
  • Page 21: About The Icon

    One of these conditions exists: • Your Total Protection Service subscription is expired. Renew it or contact your administrator. • Your pre-installed or trial subscription is not activated. • Firewall protection is disabled. McAfee Total Protection Service Product Guide...
  • Page 22: About The Console

    • Double-click the Total Protection Service icon in the system tray. • Click the icon, then select Open Console. Click Start | Programs | McAfee | Managed Services | Total Protection Service. The basic console displays the status of the protection features installed on the computer.
  • Page 23 Outbreak updates When an outbreak is identified by McAfee Avert Labs, they issue an outbreak DAT, which is a special detection definition (DAT) file marked as Medium or High importance. It is specially encoded to inform the first computer receiving it to share the update immediately with other client computers on the network.
  • Page 24: Terminal Server Support

    Specifying when computers check for updates For virus and spyware scans to detect all the latest threats, the detection definition (DAT) files must be kept up-to-date. DAT files are updated by McAfee Avert Labs whenever new threats are discovered. Use this task to select how often client computers check for updates to software components and DAT files.
  • Page 25: Disabling Updates For Non-Logged On Users

    If installed incorrectly, virus and spyware protection does not detect the virus or interrupt the download process. In this case, use Windows Explorer to delete the EICAR test file from the client computer, then reinstall Total Protection Service and test the new installation. McAfee Total Protection Service Product Guide...
  • Page 26: Changing The Language For The Software

    • When upgrades to product components, such as the scanning engine, are scheduled to end or will end within 30 days. • When updates to detection definition (DAT) files have ended or will end within 30 days. Task For option definitions, click ? in the interface. McAfee Total Protection Service Product Guide...
  • Page 27: Configuring What Users See

    1 Close the Microsoft Outlook and Internet Explorer applications. 2 In the Windows Control Panel, open Add/Remove Programs. 3 Select the types of protection you want to uninstall, then click Remove. • McAfee Virus and Spyware Protection • McAfee Firewall Protection • McAfee Browser Protection...
  • Page 28: Frequently Asked Questions

    • Empty the Internet Explorer cache and adjust the security level settings to Medium or Medium-high. • Empty the Internet Explorer cache. (See your browser’s documentation for instructions.) • Adjust your corporate firewall or proxy settings. McAfee Total Protection Service Product Guide...
  • Page 29 • Updates might fail if the Temp folder does not exist on the client computer. If you delete the folder inadvertently, restart the computer to re-create the folder automatically, or manually create a Temp folder in the Program Files\McAfee\Managed VirusScan folder. Activate your software.
  • Page 30: Using The Securitycenter

    Status emails contain a link to your McAfee SecurityCenter website, where you can view detailed reports and instructions for resolving problems.
  • Page 31: Logging On To The Securitycenter

    SecurityCenter. (Not available for all accounts.) Task 1 Paste or type the URL into your browser. 2 Type your login credentials. • Email address: The email address that you used to sign up for Total Protection Service. McAfee Total Protection Service Product Guide...
  • Page 32: Accessing Data On Securitycenter Pages

    Click the number of entries to display, or select a page number from the Go to page drop-down list. Select computers to manage Select the checkbox for individual computers, or select the checkbox in the heading to select all computers. McAfee Total Protection Service Product Guide...
  • Page 33: Protection Status At A Glance

    • Check and update your subscriptions and licenses. • Select, resize, and reposition the widgets that appear on the page. • Access associated protection portals by clicking a link (available only when your account includes email protection or vulnerability scanning). McAfee Total Protection Service Product Guide...
  • Page 34: Viewing Protection At A Glance

    3 Do any of the following: To... Do this... View instructions to resolve an action item Click the button at the end of the text. Action items are security issues that need your immediate attention. McAfee Total Protection Service Product Guide...
  • Page 35: Working With Widgets

    In a widget, click a color in the pie chart that shows the status of client computers in your account. View details about protection coverage In a widget, click a color in the pie chart that shows the status of client computers in your account. McAfee Total Protection Service Product Guide...
  • Page 36: Management Of Client Computers

    NOTE: The Computers page lists up to 5000 computers. For larger accounts, we recommend organizing your computers into groups of no more than 100 computers to optimize SecurityCenter performance. McAfee Total Protection Service Product Guide...
  • Page 37: Working With Computers

    Type the full or partial name of a computer in the Find Computers box and click Search. NOTE: The computer search feature does not recognize wildcard characters, so type letters or numbers only. Site administrators can search the entire account; group McAfee Total Protection Service Product Guide...
  • Page 38: Working With An Individual Computer

    Policy list. View detections for a computer Click a quantity under Detections to open the Detections List, then click a detection name to view detailed information from the McAfee Avert ® Labs Threat Library.
  • Page 39: Management Of Computer Groups

    (defined in policies). Groups are particularly helpful in larger organizations or companies that are widely distributed geographically. Placing similar computers into a single group enables you to view and manage security issues for the group separately from the other computers in your account. McAfee Total Protection Service Product Guide...
  • Page 40: Working With Groups

    Under Computers, click a number to display the Computers page showing all the computers in the group. Rename a group Under Action, select Rename, specify a new name for the existing group, then click Save. McAfee Total Protection Service Product Guide...
  • Page 41: Management Of Active Directory Groups

    Importing Active Directory groups Use this task to import Active Directory groups from your network into the SecurityCenter. Before you begin You must download the Active Directory synchronization utility before you can perform this task. McAfee Total Protection Service Product Guide...
  • Page 42: Installing On Active Directory Groups

    When you run the Push Install utility, you select the Active Directory groups, the software to install, a policy to assign, and whether to scan the computer for threats when installation is complete. Click the help link ( ? ) in the utility for online assistance. McAfee Total Protection Service Product Guide...
  • Page 43: Synchronizing Active Directory Groups

    • Perform one of these tasks. • On the Utilities page, click the Active Directory Synchronization tab, then click Active Directory Structure to open a page showing the Active Directory tree for your account. McAfee Total Protection Service Product Guide...
  • Page 44: Management Of Group Administrators

    Group administrators have fewer access rights than the site administrator. While the site administrator can access all security information for all client computers in the account, group administrators can access information only for client computers in the groups they are assigned to. McAfee Total Protection Service Product Guide...
  • Page 45: Working With Group Administrators

    2 Click the Group Administrators tab, then do any of the following: To... Do this... McAfee Total Protection Service Product Guide Add a group administrator In the Group Administrators section, select Add. On the Manage Group Administrators page, select Create...
  • Page 46: Management Of Security Policies

    How can I manage policies? The Policies page displays all your policies. Use this page to create, copy, modify, and delete policies for your account. If you have not created any policies, only the McAfee Default policy is displayed. McAfee Total Protection Service Product Guide...
  • Page 47: Mcafee Default Policy

    You cannot rename or modify the McAfee Default policy. When you add computers to your account, the McAfee Default policy is assigned to them. When you delete a policy that is assigned to one or more groups, the McAfee Default policy is assigned to those groups automatically.
  • Page 48 Hide the splash screen Disabled: The McAfee Total Protection Service splash screen is displayed when a computer is powered on and the client software starts running. Using the SecurityCenter Display support notifications on client computers Enabled: Notification dialog boxes warn client computer...
  • Page 49 This feature is not supported on Firefox browsers. Block phishing pages Enabled: Do not allow access to pages with phishing McAfee Total Protection Service Product Guide content, even if they are located on a website with a green overall safety rating.
  • Page 50 Disabled: Do not disable browser protection on computers this policy using this policy. Allow users to enable or disable browser protection Disabled: Do not allow browser protection to be disabled at the client computer. McAfee Total Protection Service Product Guide...
  • Page 51: Working With Policies

    If you delete a policy that is assigned to one or more groups, the default policy you have selected for your account (or the McAfee Default policy) is assigned to the groups in its place. You cannot delete the McAfee Default policy.
  • Page 52 A summary of browsing activity on your account. Shows the types of sites that client computers attempted to access by content rating and category. Includes successful, warned, and blocked access attempts. (Available only when web filtering policy options are McAfee Total Protection Service Product Guide...
  • Page 53: Scheduling Reports

    • Monthly on — Send the information each month, on the selected day. 4 Type one or more email addresses to receive the report. Separate multiple addressees with commas. 5 Type a subject and a message for the email. 6 Click Save. McAfee Total Protection Service Product Guide...
  • Page 54: Adding Your Logo To Reports

    Browser version Specify computers running all versions of Internet Explorer or only those running a Browser version Specify computers running all versions of Internet Explorer or only those running a selected version. selected version. McAfee Total Protection Service Product Guide...
  • Page 55: Duplicate Computers Report

    Click a computer name to display the Computer Details page, which displays information about the computer, its service components, and its detections. information about the computer, its service components, and its detections. information about the computer, its service components, and its detections. McAfee Total Protection Service Product Guide...
  • Page 56: Managing Your Account

    3 Type or select information as needed. • Your password for logging on to the SecurityCenter. • Your administrator email address. • Contact information. • Language for account correspondence and notifications. 4 Click Save. McAfee Total Protection Service Product Guide...
  • Page 57: Signing Up For Email Notifications

    • Email address • Company name • First name or Last name Click Submit. Display a list of subscriptions that are no longer current Select View cancelled subscriptions. McAfee Total Protection Service Product Guide...
  • Page 58: Buying And Renewing Subscriptions And Licenses

    CD label. See the installation guide for activation instructions. Task For option definitions, click ? in the interface. 1 On the My Account page, click the Accounts & Keys tab. McAfee Total Protection Service Product Guide...
  • Page 59: Merging Accounts

    NOTE: Information on using the utilities related to installation is available in the installation guide, available from the Help page. Task For option definitions, click ? in the interface. 1 Click the Utilities tab. McAfee Total Protection Service Product Guide...
  • Page 60: Getting Assistance

    • McAfee ProtectionPilot Migration Assistant — Downloads a wizard that guides you through the steps for migrating computers in a McAfee ProtectionPilot account to a Total Protection Service account. A link to documentation is also provided.
  • Page 61: Frequently Asked Questions About The Securitycenter

    NOTE: Sample reports are available in all product languages. Select the language from the Global Sites pull-down list in the upper-right corner of the page. McAfee Total Protection Service Product Guide...
  • Page 62: Questions About Adding, Renewing, And Moving Licenses

    2 For Groups, select All, then select the old computer in the listing and click Delete. 3 Install the software on the reformatted computer. The new computer appears in your reports after it uploads its status to the SecurityCenter. This usually takes about 20 minutes. McAfee Total Protection Service Product Guide...
  • Page 63: Using Virus And Spyware Protection

    Spyware protection mode and detections Types of scans Scanning on client computers Configuring scanning policy options Managing detections Reports for virus and spyware protection Best practices (virus and spyware protection) Frequently asked questions Error messages McAfee Total Protection Service Product Guide...
  • Page 64: How Detections Are Handled

    To prevent popup prompts from appearing on client computers when potentially unwanted programs are detected, and for highest security, we recommend using Protect mode. Mode Behavior of virus and spyware protection McAfee Total Protection Service Product Guide Report • Users are not prompted about detections.
  • Page 65: Use Learn Mode To Discover Programs

    On-access (automatic) scans On-access scans are those that occur on client computers whenever users access files (for example, open a file or run a program). McAfee Total Protection Service Product Guide...
  • Page 66: On-Demand Scans

    • Whether files are scanned for spyware. • The types of virus and spyware threats to detect. • Whether unrecognized detections are sent to McAfee Avert Labs for investigation. • Whether to enable on-access scanning (if it is disabled) whenever computers check for updates.
  • Page 67: Email Scans

    At the start of an on-demand scan, all previous detections of potentially unwanted programs are cleared from the Potentially Unwanted Program Viewer. For on-access scans, previous detections remain in the Potentially Unwanted Program Viewer. McAfee Total Protection Service Product Guide...
  • Page 68: Scanning On Client Computers

    Scanning on demand from Windows Explorer Use this task to perform a manual scan from Microsoft Windows Explorer on a client computer. Task 1 In Windows Explorer, right-click any drive or folder, then select Scan Now. McAfee Total Protection Service Product Guide...
  • Page 69: Scanning Email On Client Computers

    Enter your administrator credentials by using the Admin Login feature on the client computer. Task 1 Click the Total Protection Service icon in the system tray, then select Open Console. 2 From the Action Menu, select Product Details. McAfee Total Protection Service Product Guide...
  • Page 70: Configuring Scanning Policy Options

    For option definitions, click ? in the interface. 1 On the Policies page, click Add Policy (or click Edit to modify an existing policy). 2 Click Virus & Spyware Protection, then click the Advanced Settings tab. McAfee Total Protection Service Product Guide...
  • Page 71: Excluding Files And Folders From Virus Scans

    Detect code starting to run from data in reserved memory and prevent that code from running. Virus and spyware protection protects against buffer overflow in more than 30 most commonly used Windows-based programs. McAfee updates this list as it adds buffer overflow protection for additional programs. CAUTION: Buffer overflow protection does not stop data from being written.
  • Page 72: Selecting Spyware Scanning Options

    Approve all the programs listed. Block Block the selected program. Block All Block all the programs listed. 4 Click Save. (For a new policy, click Next, select additional options for the policy, then click Save.) McAfee Total Protection Service Product Guide...
  • Page 73: Managing Detections

    Deleted The item could not be cleaned; it was deleted instead. A copy was saved in a quarantine folder, in a proprietary binary format, where it can be accessed only with the Quarantine Viewer. McAfee Total Protection Service Product Guide...
  • Page 74: Managing Potentially Unwanted Programs On Client Computers

    30 days. Use this task from a client computer to view and manage quarantined items in the Quarantine Viewer. You must be logged on as an administrator to access this task. McAfee Total Protection Service Product Guide...
  • Page 75: Viewing User-Approved Programs And Applications

    6 Select Get more information on the threats detected to open a browser window and visit the McAfee Avert Labs Threat Library. 7 Click Back to close the Quarantine Viewer and return to the console. Viewing user-approved programs and applications Use this task to see which applications users have approved to run on their computers.
  • Page 76: Viewing Threats Detected On The Account

    • From the Detections List, click the name of a detection to display detailed information from the McAfee Avert Labs Threat Library. View details about a computer Click a computer name to display the Computer Details page, which displays where a detection occurred information about the computer, its service components, and its detections.
  • Page 77: Viewing Unrecognized Programs Detected On The Account

    View details about detections Click the name of a potentially unwanted program to display detailed information from the McAfee Avert Labs Threat Library. View details about a computer Click a computer name to display the Computer Details page, which displays where a detection occurred information about the computer, its service components, and its detections.
  • Page 78: Detections Report

    • From the Detections List, click the name of a detection to display detailed information from the McAfee Avert Labs Threat Library. View details about a computer Click a computer name to display the Computer Details page, which displays where a detection occurred information about the computer, its service components, and its detections.
  • Page 79: Unrecognized Programs Report

    • From the Detections List, click the name of a detection to display detailed information from the McAfee Avert Labs Threat Library. View details about a computer Click a computer name to display the Computer Details page, which displays Using Virus and Spyware Protection where a detection occurred information about the computer, its service components, and its detections.
  • Page 80: Best Practices (Virus And Spyware Protection)

    Specifying excluded files and folders from scanning can be useful if you know a particular type of file is not vulnerable to attack, or a particular folder is safe. If you use a program to McAfee Total Protection Service Product Guide...
  • Page 81: Error Messages

    No. However, you can create a new policy and add them. When you click Add Policy on the Policies page of the SecurityCenter, the new policy is prepopulated with the McAfee Default policy settings. Specify a name for the new policy, save it, and then add approved programs as needed.
  • Page 82: Using Firewall Protection

    NOTE: To ensure the highest level of protection for your network, McAfee recommends that an administrator configure the firewall protection settings in one or more policies, which are then assigned to client computers. When an administrator sets firewall protection, it is important that the applications and communications that are important to your users are allowed before deploying the policy.
  • Page 83: Connection Type And Detections Of Incoming Communications

    Trusted and untrusted connection types let you specify whether to allow or block communications originating within a network. Configure a custom connection type when you want to be more specific about where communications originate. When you set up a custom connection, you can designate: McAfee Total Protection Service Product Guide...
  • Page 84 NOTE: Custom settings configured on the SecurityCenter are ignored on client computers if firewall protection mode is set to Prompt. In Prompt mode, settings configured by users override administrator settings. McAfee Total Protection Service Product Guide...
  • Page 85: Firewall Protection Mode And Detections Of Unknown Applications

    If the policy is changed from Prompt mode to Protect mode or Report mode, firewall protection saves user settings for allowed applications. If the policy is then changed back to Prompt mode, these settings are reinstated. McAfee Total Protection Service Product Guide...
  • Page 86: Use Learn Mode To Discover Internet Applications

    • Disable or remove a port for a system service. NOTE: Select a port for system services only if you are certain it must be open. You will rarely need to open a port. We recommend that you disable unused system services. McAfee Total Protection Service Product Guide...
  • Page 87: Standard Assignments For System Service Ports

    IP addresses, and ports, and blocking those that could cause harm. There are two methods of establishing firewall protection: • The administrator configures firewall settings in a Total Protection Service policy. • Each client computer user configures firewall settings for their computer. McAfee Total Protection Service Product Guide...
  • Page 88 Using Firewall Protection Firewall configuration For the highest level of security, McAfee recommends that administrators configure firewall settings. If you allow users to configure the settings, it is important to educate them about threats and strategies for avoiding risk. Configuring firewall features enables you, the administrator, to control which applications and communications are allowed on your network.
  • Page 89: Interaction Between User And Administrator Policy Settings

    For option definitions, click ? in the interface. 1 On the Policies page, click Add Policy (or click Edit to modify an existing policy). 2 Select Firewall Protection, then click the General Settings tab. McAfee Total Protection Service Product Guide...
  • Page 90: Configuring Options For Internet Applications

    Use this SecurityCenter task to configure the way firewall protection responds to detections of Internet applications by configuring these options: • Whether firewall protection checks the list of Internet applications that McAfee has determined to be safe at the www.hackerwatch.org website.
  • Page 91: Tracking Blocked Communications

    1 On the Policies page, click Add Policy (or click Edit to modify an existing policy). 2 Select Firewall Protection, then click the General Settings tab. 3 Under Connection Type, select Custom settings, then click edit. McAfee Total Protection Service Product Guide...
  • Page 92: Configuring Ip Addresses

    1 On the Policies page, click Add Policy (or click Edit to modify an existing policy). 2 Select Firewall Protection, then click the General Settings tab. 3 Under Connection Type, select Custom settings, then click edit. McAfee Total Protection Service Product Guide To do this... Perform these steps...
  • Page 93: Installing And Enabling Firewall Protection At The Policy Level

    Installing and enabling firewall protection at the policy level Use these tasks to install or enable firewall protection automatically for all computers using the policy. Tasks Installing firewall protection during policy updates Enabling and disabling firewall protection McAfee Total Protection Service Product Guide...
  • Page 94: Installing Firewall Protection During Policy Updates

    2 Select Firewall Protection, then click the General Settings tab. 3 Under Firewall Status, select On or Off. 4 Click Save. (For a new policy, click Next, select additional options for the policy, then Save.) click McAfee Total Protection Service Product Guide...
  • Page 95: Managing Detections

    View details about detections Click the name of a potentially unwanted program to display detailed information from the McAfee Avert Labs Threat Library. View details about a computer Click a computer name to display the Computer Details page, which displays where a detection occurred information about the computer, its service components, and its detections.
  • Page 96: Viewing Blocked Communications

    View details about a computer Click a computer name to display the Computer Details page, which displays information about the computer, its service components, and its detections. McAfee Total Protection Service Product Guide...
  • Page 97: Reports For Firewall Protection

    Use the Inbound Events Blocked by Firewall report to view a list of communications that firewall protection prevented from reaching client computers. For the purposes of this report, each attempt to communicate is called an event . McAfee Total Protection Service Product Guide...
  • Page 98: Best Practices (Firewall Protection)

    3 Use McAfee’s recommendations for commonly used, safe Internet applications. When this option is enabled, applications rated safe on McAfee’s www.hackerwatch.org site are approved automatically, minimizing the need for you or users to approve applications manually.
  • Page 99: Frequently Asked Questions

    No. However, you can create a new policy and add them. When you click Add Policy on the Policies page of the SecurityCenter, the new policy is prepopulated with the McAfee Default policy settings. Specify a name for the new policy, save it, and then add allowed Internet applications as needed.
  • Page 100: Questions About General Firewall Protection

    When I re-enabled firewall protection, why was Internet Explorer no longer blocked? Firewall protection uses Internet Explorer to update product components. Whenever you enable firewall protection, Internet Explorer is given full access to check for updates. McAfee Total Protection Service Product Guide...
  • Page 101: Using Browser Protection And Web Filtering

    How safety ratings are compiled Safety icons and balloons protect during searches SiteAdvisor menu protects while browsing Safety reports provide details Information that browser protection sends to McAfee Installing browser protection during policy updates Web filtering features Enabling and disabling browser protection via policy...
  • Page 102: How Safety Ratings Are Compiled

    Web filtering features are described in more detail later in this section. How safety ratings are compiled A McAfee team derives safety ratings by testing a variety of criteria for each site and evaluating the results to detect common threats.
  • Page 103: Safety Icons And Balloons Protect During Searches

    Communication problems are indicated by a gray SiteAdvisor menu button with disconnected cables. Before you begin Be sure that the option for showing safety balloons is enabled. This option is available on the SiteAdvisor menu. McAfee Total Protection Service Product Guide...
  • Page 104: Siteadvisor Menu Protects While Browsing

    • In Internet Explorer, users can display or hide the menu button by using the View | Toolbars | McAfee SiteAdvisor menu option. This does not affect the functional status (enabled or disabled) of the browser protection client software.
  • Page 105: Using The Siteadvisor Menu

    Users can supplement the color-coded safety information for a site by viewing its detailed safety report. These reports describe specific threats discovered by testing and include feedback submitted by site owners and users. Safety reports for sites are delivered from the McAfee SiteAdvisor server and provide the following information: Item...
  • Page 106 We don't allow sites to pay to be rated or to change or improve their ratings. Reviewer comments What our volunteer reviewers have to say about this website. These comments are posted unedited. McAfee Total Protection Service Product Guide...
  • Page 107: Viewing Safety Reports

    Using Browser Protection and Web Filtering Information that browser protection sends to McAfee Viewing safety reports Use this task to view safety reports to obtain more information about a site’s safety rating. Task • Do any of the following to view a safety report for a site: From this location...
  • Page 108: Installing Browser Protection During Policy Updates

    Save.) Web filtering features If you purchased a version of McAfee SaaS Endpoint Protection that includes the web filtering module, the Policies page in the SecurityCenter displays an expanded set of policy options labeled Browser Protection & Web Filtering.
  • Page 109: Enabling And Disabling Protection At The Client Computer

    • For each yellow, red, or unrated site, specify whether to allow, warn, or block the site. • For each yellow, red, or unrated download file, specify whether to allow, warn, or block the download. This enables a greater level of granularity in protecting McAfee Total Protection Service Product Guide...
  • Page 110 To ensure users can access specific sites that are important to your business, no matter how they are rated, add them to the Exceptions list as an authorized site. For authorized sites, the browser protection service ignores the safety rating. McAfee Total Protection Service Product Guide...
  • Page 111: Blocking Or Warning Site Access Based On Safety Ratings

    • Warn — Display a warning when users attempt to download a file with the specified rating. • Allow — Allow downloads of files with the specified rating. 4 Click Save. (For a new policy, click Next, select additional options for the policy, then click Save.) McAfee Total Protection Service Product Guide...
  • Page 112: Blocking Phishing Pages

    Web filtering allows the browser protection service to retrieve content classifications for a site. These are stored on the server maintained by McAfee where site safety ratings information is also stored. Use policy options to allow, warn, or block access to sites based on the type of content they contain.
  • Page 113: Blocking Or Warning Site Access Based On Content

    • Prohibited sites that users are never allowed to access. Add prohibited sites to block access to sites that are not related to job performance or do not conform to company security standards. McAfee Total Protection Service Product Guide...
  • Page 114: How Site Patterns Work

    This is the domain. The domain consists of two parts: www.mcafee.com • Protocol. In this case: http:// • Internet domain. In this case: www.mcafee.com Domain information is matched from the end. A matching URL’s domain must end with the site pattern’s domain. The protocol can vary.
  • Page 115: Adding Authorized And Prohibited Sites

    You might use the message to explain why the site is blocked. The message appears on client computers in the language configured for the client software, if you have created the message in that language. McAfee Total Protection Service Product Guide...
  • Page 116: Viewing Browsing Activity

    Click a computer name to display the Computer Details page, which computer displays information about the computer, its service components, and its detections. See also Information that browser protection sends to McAfee on page 107 Web Filtering report on page 117 McAfee Total Protection Service Product Guide...
  • Page 117: Web Filtering Report

    See also Viewing browsing activity on page 116 Information that browser protection sends to McAfee on page 107 Best practices (browser protection) To develop an effective strategy for guarding against web-based threats, we recommend that you proactively track browsing activity on your network and configure policy options appropriate for your users.
  • Page 118: Frequently Asked Questions

    • The client computer is not communicating with the SiteAdvisor server. A communication error icon (disconnected cables) appears on the SiteAdvisor button. Hold your cursor over the menu button to display the safety balloon, then click Troubleshooting to test the connection. McAfee Total Protection Service Product Guide...
  • Page 119: Using The Saas Vulnerability Scanning Service

    • Collects and updates vulnerability data around-the-clock from hundreds of sources worldwide, ensuring its ability to detect the latest risks. • Meets the website security vulnerabilities audit requirements mandated by HIPAA, GRAMM- LEACH-BILEY, SARBANES-OXLEY, and other federal legislation. McAfee Total Protection Service Product Guide...
  • Page 120: Certification Programs

    Trustmark certification program ® ™ Adds the McAfee SECURE trustmark to your website as proof that it meets the rigorous certification requirements for compliance with the McAfee SECURE data security standard. This program requires daily scanning of your McAfee SECURE devices.
  • Page 121: The Saas Vulnerability Scanning Widget And Portal

    The portal provides tools for adding the IP addresses to scan, performing scans, checking scan results, and accessing historical data for scans. If you subscribe to a certification program, access tools and reports for certification on the portal. McAfee Total Protection Service Product Guide...
  • Page 122: Accessing The Saas Vulnerability Scanning Portal

    3 Configure the devices you want to scan. This includes selecting the type of device, which determines the standard used for scanning. Configure the devices to accept the IP addresses (maintained by McAfee) where vulnerability scans originate. Create groups where devices can be placed. (Optional) Configure and initiate scans manually, or schedule them to occur at a later time.
  • Page 123: Overview Of The Certification Process

    Add devices to scan and configure scanning options. For Service Level, select Devices McAfee SECURE. The Scan Frequency defaults to Daily, per the requirements for certification. You can schedule additional scans as needed.
  • Page 124: Types Of Scans

    • PCI standard — Complies with credit card issuers by meeting the vulnerability scanning requirements of the Payment Card Industry (PCI) data security standard (DSS). Devices that process payment card information must be scanned and show compliance with this standard quarterly. Used for the PCI certification program. McAfee Total Protection Service Product Guide...
  • Page 125: Managing Scan Devices

    Vulnerabilities can be assigned different levels of severity by the different standards. Because of this, it is possible for devices to be compliant with the McAfee SECURE standard but not the PCI standard, which has specific requirements developed for devices that process payment card data.
  • Page 126: Discovering Ip Addresses In A Domain

    1 Open the SaaS vulnerability scanning portal (click the link in the SaaS Vulnerability Scanning/PCI Certification widget on the Dashboard page of the SecurityCenter). 2 In the portal, click the Security tab to display the Security Dashboard page. 3 Under Discovery, select Networks. McAfee Total Protection Service Product Guide...
  • Page 127: Adding Devices To Scan

    Run scans every day. The Devices McAfee SECURE service level supports this option. Weekly Run scans once a week. The Devices McAfee SECURE service level supports this option. Monthly Run scans once a month. The Devices McAfee SECURE service level supports this option.
  • Page 128: Configuring Devices To Accept Scans

    If you selected OnDemand in step 7, no scan is performed for the devices you have just added until you initiate one. If you selected a different option, McAfee begins a scan within 24 hours and notifies you by email when it is complete.
  • Page 129: Changing Device Groups

    • On the Device Groups page, click the name of the group containing the device, then on the Devices page, click the device name. A page listing details about the selected device is displayed. McAfee Total Protection Service Product Guide...
  • Page 130: Performing Scans

    6 If you are configuring an audit, select the type of audit from the drop-down list. • Hack Simulation — Runs the standard device audit. • Denial of Service — Adds extra tests. McAfee Total Protection Service Product Guide...
  • Page 131: Scheduling Scans For Devices

    There you can view scan results, detailed patch recommendations applicable to your specific system configuration, historical audit data, and printable audit reports. To access scan results, click the Security tab to display the Security Dashboard page. McAfee Total Protection Service Product Guide...
  • Page 132: Viewing Scan Results

    1 Open the SaaS vulnerability scanning portal (click the link in the SaaS Vulnerability Scanning/PCI Certification widget on the Dashboard page of the SecurityCenter). 2 In the portal, click the Security tab to display the Security Dashboard page. McAfee Total Protection Service Product Guide...
  • Page 133: Viewing Results For Dns Discovery On Domains

    6 On the Add Devices page, select options adding the devices for scanning. Viewing results for network discovery scans Use this task to view the discovery status for networks in your account and the results of discovery scans performed. McAfee Total Protection Service Product Guide...
  • Page 134 A listing of networks for which results of discovery scans are available. Select the type of report and the networks to report on, then click View to display a report comparing the results of the latest scan with the previous scan. McAfee Total Protection Service Product Guide...

Table of Contents