McAfee MIS09EMB3RAA - Internet Security 2009 User Manual

User guide
Table of Contents

Advertisement

Quick Links

User Guide

Advertisement

Table of Contents
loading

Summary of Contents for McAfee MIS09EMB3RAA - Internet Security 2009

  • Page 1 User Guide...
  • Page 3: Table Of Contents

    Parental Controls features ..................142 Protecting your children ..................143 Protecting information on the Web ..............161 Protecting passwords.................... 163 McAfee Backup and Restore ..................167 Backup and Restore features ................168 Archiving files ......................169 Working with archived files .................. 177 McAfee QuickClean ......................
  • Page 4 McAfee EasyNetwork...................... 221 EasyNetwork features ................... 222 Setting up EasyNetwork..................223 Sharing and sending files..................229 Sharing printers..................... 235 Reference......................... 238 Glossary About McAfee License ........................253 Copyright ....................... 254 Customer and Technical Support.................. 255 Using McAfee Virtual Technician ................ 256 Index...
  • Page 5: Mcafee Internet Security

    Internet traffic for suspicious activity; guard your family’s privacy; rate risky Web sites; and more. In this chapter McAfee SecurityCenter ..........5 McAfee VirusScan ............29 McAfee Personal Firewall ...........61 McAfee Anti-Spam ............115 McAfee Parental Controls...........141 McAfee Backup and Restore........167 McAfee QuickClean.............183 McAfee Shredder............197...
  • Page 7: Mcafee Securitycenter

    H A P T E R McAfee SecurityCenter McAfee SecurityCenter allows you to monitor your computer's security status, know instantly whether your computer's virus, spyware, e-mail, and firewall protection services are up-to-date, and act on potential security vulnerabilities. It provides the navigational tools and controls you need to coordinate and manage all areas of your computer's protection.
  • Page 8: Securitycenter Features

    SecurityCenter automatically downloads and installs updates for Automated updates and your programs. When a new version of a McAfee program is upgrades available, it is automatically delivered to your computer as long as your subscription is valid, ensuring that you always have up-to-date protection.
  • Page 9: Using Securitycenter

    (page 8) Understanding protection status (page 9). Then, you can Understanding protection categories review your McAfee account information and verifying the validity of your subscription. In this chapter Understanding protection status.......8 Understanding protection categories......9 Understanding protection services ......10 Managing your subscriptions........11...
  • Page 10: Understanding Protection Status

    McAfee Internet Security Understanding protection status Your computer's protection status is shown in the protection status area on the SecurityCenter Home pane. It indicates whether your computer is fully protected against the latest security threats and can be influenced by things like external security attacks, other security programs, and programs that access the Internet.
  • Page 11: Understanding Protection Categories

    Chapter 3 McAfee Internet Security Understanding protection categories SecurityCenter's protection services are divided into four categories: Computer & Files, Internet & Network, E-mail & IM, and Parental Controls. These categories help you to browse and configure the security services protecting your computer.
  • Page 12: Understanding Protection Services

    Protection services are the various security components that you configure to protect your computer and files. Protection services directly correspond to McAfee programs. For example, when you install VirusScan, the following protection services become available: Virus Protection, Spyware Protection, SystemGuards, and Script Scanning.
  • Page 13: Managing Your Subscriptions

    Chapter 3 McAfee Internet Security Managing your subscriptions Each McAfee protection product that you purchase comes with a subscription that lets you use the product on a certain number of computers for a certain period of time. The length of your subscription varies according to your purchase, but usually starts when you activate your product.
  • Page 14 McAfee Internet Security Renew your subscription Shortly before your subscription is about to expire, you'll see a link in SecurityCenter prompting you to renew. We'll also notify you periodically about pending expiration with alerts. On the SecurityCenter Home pane, under SecurityCenter Information, click Renew.
  • Page 15: Updating Securitycenter

    You can also disable automatic updating. Note: If you installed your McAfee product from a CD, you must activate within 15 days or your products will not receive critical updates or perform scans.
  • Page 16 McAfee Internet Security Configure automatic updates By default, SecurityCenter automatically checks for and installs updates every four hours when your computer is connected to the Internet. If you want to change this default behavior, you can configure SecurityCenter to automatically download updates and then notify you when the updates are ready to be installed or to notify you before downloading the updates.
  • Page 17 Chapter 4 McAfee Internet Security 1. Under Common Tasks, click Home. 2. On the right pane, under SecurityCenter Information, click Configure. On the SecurityCenter Configuration pane, under Automatic updates are enabled, click Off. In the confirmation dialog box, click Yes.
  • Page 18: Fixing Or Ignoring Protection Problems

    If you need help diagnosing your protection problems, you can run McAfee Virtual Technician. For more information about McAfee Virtual Technician, see the McAfee Virtual Technician help. In this chapter Fixing protection problems ........17...
  • Page 19: Fixing Protection Problems

    Update your protection manually. (DATs) are out-of-date. For more information, see the VirusScan help. A program is not installed. Install the program from the McAfee Web site or CD. A program is missing Reinstall the program from the components. McAfee Web site or CD.
  • Page 20 McAfee Internet Security Fix protection problems manually If one or more protection problems persist after you try to fix them automatically, you can fix the problems manually. Under Common Tasks, click Home. On the SecurityCenter Home pane, click the protection category in which SecurityCenter reports the problem.
  • Page 21: Ignoring Protection Problems

    Chapter 4 McAfee Internet Security Ignoring protection problems If SecurityCenter detects a non-critical problem, you can either fix or ignore it. Other non-critical problems (for example, if Anti-Spam or Parental Controls are not installed) are automatically ignored. Ignored problems are not shown in the protection category information area on the SecurityCenter Home pane, unless your computer's protection status is green.
  • Page 22 McAfee Internet Security Click OK. Tip: You can also ignore a problem by clicking the Ignore link beside the reported problem in the protection category information area.
  • Page 23: Working With Alerts

    Some alerts also contain links to additional information about the event. These links let you launch McAfee's global Web site or send information to McAfee for troubleshooting. There are three types of alerts: red, yellow, and green.
  • Page 24: Showing And Hiding Informational Alerts

    McAfee Internet Security Showing and hiding informational alerts Informational alerts notify you when events occur that do not pose threats to your computer's security. For example, if you have set up Firewall Protection, an informational alert appears by default whenever a program on your computer is granted access to the Internet.
  • Page 25 Chapter 5 McAfee Internet Security Show or hide informational alerts when gaming You can hide informational alerts when you are playing a game in full-screen mode on your computer. When you finish the game and exit full-screen mode, SecurityCenter starts displaying informational alerts again.
  • Page 26: Configuring Alert Options

    Hide the splash screen at startup By default, the McAfee splash screen appears briefly when Windows starts, notifying you that SecurityCenter is protecting your computer. However, you can hide the splash screen if you do not want it to appear.
  • Page 27 Chapter 5 McAfee Internet Security Hide virus outbreak alerts You can hide alerts that notify you about virus outbreaks and other security threats in the online community. Open the Alert Options pane. How? 1. Under Common Tasks, click Home. 2. On the right pane, under SecurityCenter Information, click Configure.
  • Page 29: Viewing Events

    H A P T E R Viewing events An event is an action or configuration change that occurs within a protection category and its related protection services. Different protection services record different types of events. For example, SecurityCenter records an event if a protection service is enabled or disabled;...
  • Page 31: Mcafee Virusscan

    Note: SecurityCenter reports critical and non-critical protection problems as soon as it detects them. If you need help diagnosing your protection problems, you can run McAfee Virtual Technician. In this chapter VirusScan features............30 Scanning your computer ..........31 Working with scan results...........35...
  • Page 32: Virusscan Features

    McAfee Internet Security VirusScan features Defend yourself and your computer from the latest security threats, Comprehensive virus including viruses, Trojans, tracking cookies, spyware, adware, and protection other potentially unwanted programs. Protection extends beyond the files and folders and on your desktop, targeting threats from different points of entry—including e-mail, instant messages, and...
  • Page 33: Scanning Your Computer

    H A P T E R Scanning your computer Even before you start SecurityCenter for the first time, VirusScan's real-time virus protection starts protecting your computer from potentially harmful viruses, Trojans, and other security threats. Unless you disable real-time virus protection, VirusScan constantly monitors your computer for virus activity, scanning files each time you or your computer access them, using the real-time scanning options that you set.
  • Page 34 McAfee Internet Security To... Do this... Start Real-time scanning 1. Open the Computer & Files to constantly monitor Configuration pane. your computer for virus How? activity, scanning files each time you or your 1. On the left pane, click computer access them Advanced Menu.
  • Page 35: View Scan Results

    Chapter 8 McAfee Internet Security To... Do this... Start a Scheduled Scan 1. Open the Scheduled Scan pane. that periodically scans How? your computer for threats 1. Under Common Tasks, click Home. 2. On the SecurityCenter Home pane, click Computer &...
  • Page 36 McAfee Internet Security To... Do this... View scan results in the View scan results in the Scan completed alert alert. View more information View scan details Click in the Scan about scan results completed alert. View a quick summary of...
  • Page 37: Working With Scan Results

    H A P T E R Working with scan results If VirusScan detects a security threat while running a scan, it tries to handle the threat automatically according to the threat type. For example, If VirusScan detects a virus, Trojan, or tracking cookie on your computer, it tries to clean the infected file.
  • Page 38: Work With Quarantined Files

    McAfee Internet Security 1. Double-click the Scan completed icon in the notification area at the far right of your taskbar. 2. On the Scan pane, click Details. In the scan results list, click Viruses and Trojans. Note: To work with the files that VirusScan has quarantined, see (page 36).
  • Page 39 Chapter 9 McAfee Internet Security To remove the infected file from your computer, click Remove. Click to confirm your selected option. Tip: You can restore or remove multiple files at the same time. Work with quarantined programs and cookies When VirusScan quarantines potentially unwanted programs or...
  • Page 40: Scan Types

    McAfee Internet Security Scan types VirusScan provides a complete set of scanning options for virus protection, including real-time scanning (which constantly monitors your PC for threat activity), manual scanning from Windows Explorer, and the ability to run a full, quick, custom scan from SecurityCenter, or customize when scheduled scans will occur.
  • Page 41 Chapter 9 McAfee Internet Security Manual Scan allows you to quickly check for threats in files, folders, and drives on the fly from Windows Explorer. Schedule scan Scheduled scans thoroughly check your computer for viruses and other threats any day and time of the week. Scheduled scans always check your entire computer using your default scan options.
  • Page 43: Using Additional Protection

    H A P T E R Using additional protection In addition to real-time virus protection, VirusScan provides advanced protection against scripts, spyware, and potentially harmful e-mail and instant message attachments. By default, script scanning, spyware, e-mail, and instant messaging protection are turned on and protecting your computer. Script scanning protection Script scanning protection detects potentially harmful scripts and prevents them from running on your computer or web...
  • Page 44: Start Script Scanning Protection

    McAfee Internet Security Start script scanning protection Turn on script scanning protection to detect potentially harmful scripts and prevent them from running on your computer. Script scanning protection alerts you when a script tries to create, copy, or delete files on your computer, or make changes to your Windows registry.
  • Page 45 Chapter 10 McAfee Internet Security 1. On the left pane, click Advanced Menu. 2. Click Configure. 3. On the Configure pane, click E-mail & Under E-mail protection, click On. Note: Although you can turn off e-mail protection at any time, doing so leaves your computer vulnerable to e-mail threats.
  • Page 47: Setting Up Virus Protection

    H A P T E R Setting up virus protection You can set different options for scheduled, custom, and real-time scanning. For example, because real-time protection continuously monitors your computer, you might select a certain set of basic scanning options, reserving a more comprehensive set of scanning options for manual, on-demand protection.
  • Page 48: Setting Real-Time Scan Options

    McAfee Internet Security Setting real-time scan options When you start real-time virus protection, VirusScan uses a default set of options to scan files; however, you can change the default options to suit your needs. To change real-time scanning options, you must make decisions about what VirusScan checks for during a scan, as well as the locations and file types it scans.
  • Page 49 Chapter 11 McAfee Internet Security To... Do this... Detect cookies Scan and remove Select tracking cookies Detect viruses and other Scan network drives Select potential threats on drives that are connected to your network Protect your computer from Enable buffer overflow...
  • Page 50: Setting Custom Scan Options

    McAfee Internet Security Setting custom scan options Custom virus protection lets you scan files on demand. When you start a custom scan, VirusScan checks your computer for viruses and other potentially harmful items using a more comprehensive set of scanning options. To change custom scanning options, you must make decisions about what VirusScan checks for during a scan.
  • Page 51 Chapter 11 McAfee Internet Security 1. Under Common Tasks, click Home. 2. On the SecurityCenter Home pane, click Computer & Files. 3. In the Computer & Files information area, click Configure. 4. On the Computer & Files Configuration pane, ensure that virus protection is enabled, and click Advanced.
  • Page 52 McAfee Internet Security To... Do this... Scan critical system files (My) Computer Clear the check Critical box, and then select the System Files check box.
  • Page 53: Scheduling A Scan

    Chapter 11 McAfee Internet Security Scheduling a scan Schedule scans to thoroughly check your computer for viruses and other threats any day and time of the week. Scheduled scans always check your entire computer using the default scan options. By default, VirusScan performs a scheduled scan once a week.
  • Page 54: Using Systemguards Options

    McAfee Internet Security Using SystemGuards options SystemGuards monitor, log, report, and manage potentially unauthorized changes made to the Windows registry or critical system files on your computer. Unauthorized registry and file changes can harm your computer, compromise its security, and damage valuable system files.
  • Page 55 Chapter 11 McAfee Internet Security Like Program and Windows SystemGuards, Browser SystemGuards detect potentially unauthorized changes to your computer's registry and other critical files that are essential to Windows. Browser SystemGuards, however, monitor changes to important registry items and files like Internet Explorer add-ons, Internet Explorer URLs, and Internet Explorer security zones.
  • Page 56 McAfee Internet Security Browser SystemGuards Under I want to, do one of the following: To detect, log, and report unauthorized registry and file changes associated with Program, Windows, and Browsers SystemGuards, click Show alerts. To detect and log unauthorized registry and file changes...
  • Page 57 Chapter 11 McAfee Internet Security Windows SystemGuards technology helps prevent your computer from sending and receiving unauthorized or personal information over the Internet. It also helps stop suspect programs that can bring unwanted changes to the appearance and behavior of the programs that are important to you and your family.
  • Page 58 McAfee Internet Security SystemGuard Detects... Windows Spyware, adware, and other potentially Messenger unwanted programs that can make registry Service changes to the Windows messenger service, allowing unsolicited ads and remotely run programs on your computer. Windows Spyware, adware, and other potentially Win.ini File...
  • Page 59 Chapter 11 McAfee Internet Security SystemGuard Detects... Internet Explorer Spyware, adware, and other potentially Restrictions unwanted programs that can make registry changes to Internet Explorer restrictions, affecting browser settings and options. Internet Explorer Spyware, adware, and other potentially Security Zones...
  • Page 60: Using Trusted Lists

    McAfee Internet Security Using trusted lists If VirusScan detects a file or registry change (SystemGuard), program, or buffer overflow, it prompts you to trust or remove it. If you trust the item and indicate that you do not want to receive...
  • Page 61 Chapter 11 McAfee Internet Security Click OK. Note: For more information about trusted list types, see About trusted lists types (page 59). About trusted lists types SystemGuards on the Trusted Lists pane represent previously unauthorized registry and file changes that VirusScan has detected but that you have chosen to allow from an alert of from the Scan results pane.
  • Page 62 McAfee Internet Security Option Description Browser Browser SystemGuards on the Trusted Lists pane SystemGuards represent previously unauthorized registry and file changes that VirusScan has detected, but that you have chosen to allow from an alert or from the Scan Results pane.
  • Page 63: Mcafee Personal Firewall

    Internet traffic for suspicious activities. Note: SecurityCenter reports critical and non-critical protection problems as soon as it detects them. If you need help diagnosing your protection problems, you can run McAfee Virtual Technician. In this chapter Personal Firewall features ..........62 Starting Firewall ............63...
  • Page 64: Personal Firewall Features

    McAfee Internet Security Personal Firewall features Guard against intrusion and suspicious activity using Firewall's Standard and custom default or customizable protection settings. protection levels Receive recommendations, dynamically, to help you decide Real-time whether programs should be allowed Internet access or network recommendations traffic should be trusted.
  • Page 65: Starting Firewall

    You can enable Firewall to protect your computer from intrusion and unwanted network traffic, as well as manage inbound and outbound Internet connections. On the McAfee SecurityCenter pane, click Internet & Network, and then click Configure. On the Internet & Network Configuration pane, under Firewall protection is disabled, click On.
  • Page 66: Stop Firewall Protection

    When Firewall is disabled, you cannot manage inbound or outbound Internet connections. On the McAfee SecurityCenter pane, click Internet & Network, and then click Configure. On the Internet & Network Configuration pane, under Firewall protection is enabled, click Off.
  • Page 67: Working With Alerts

    H A P T E R Working with alerts Firewall employs an array of alerts to help you manage your security. These alerts can be grouped into three basic types: Red alert Yellow alert Green alert Alerts can also contain information to help you decide how to handle alerts or get information about programs running on your computer.
  • Page 68: About Alerts

    Web site to get information about a program that Firewall has detected on your computer. Tell McAfee about this program: Send information to McAfee about an unknown file that Firewall has detected on your computer. McAfee recommends: Advice about handling alerts. For example, an alert can recommend that you allow access for a program.
  • Page 69: Managing Informational Alerts

    Display alerts while gaming You can allow Firewall informational alerts to be displayed when it detects intrusion attempts or suspicious activity during full-screen gameplay. On the McAfee SecurityCenter pane, click Advanced Menu. Click Configure. On the SecurityCenter Configuration pane, under Alerts, click Advanced.
  • Page 71: Configuring Firewall Protection

    H A P T E R Configuring Firewall protection Firewall offers a number of methods to manage your security and to tailor the way you want to respond to security events and alerts. After you install Firewall for the first time, your computer's protection security level is set to Automatic and your programs are allowed outgoing-only Internet access.
  • Page 72: Managing Firewall Security Levels

    McAfee Internet Security Managing Firewall security levels Firewall's security levels control the degree to which you want to manage and respond to alerts. These alerts appear when it detects unwanted network traffic and inbound and outbound Internet connections. By default, Firewall's security level is set to Automatic, with outgoing-only access.
  • Page 73 You can set the Firewall security level to Stealth to block all inbound network connections, except open ports, to hide your computer's presence on the Internet. On the McAfee SecurityCenter pane, click Internet & Network, then click Configure. On the Internet & Network Configuration pane, under Firewall protection is enabled, click Advanced.
  • Page 74 McAfee Internet Security Click OK. Note: Allow Outgoing-Only Access is the default option.
  • Page 75 You can enable Smart Recommendations for Firewall to automatically allow or block programs, and alert you about unrecognized and potentially dangerous programs. On the McAfee SecurityCenter pane, click Internet & Network, then click Configure. On the Internet & Network Configuration pane, under Firewall protection is enabled, click Advanced.
  • Page 76 Firewall detects a new program that is suspicious or is known to be a possible threat, it automatically blocks the program from accessing the Internet. On the McAfee SecurityCenter pane, click Internet & Network, then click Configure. On the Internet & Network Configuration pane, under Firewall protection is enabled, click Advanced.
  • Page 77: Optimizing Firewall Security

    Internet access during startup. Firewall displays relevant alerts for programs that had requested Internet access, which you can allow or block. On the McAfee SecurityCenter pane, click Internet & Network, then click Configure.
  • Page 78 Configure ping request settings You can allow or prevent detection of your computer on the network by other computer users. On the McAfee SecurityCenter pane, click Internet & Network, then click Configure. On the Internet & Network Configuration pane, under Firewall protection is enabled, click Advanced.
  • Page 79 Denial of Service attacks or exploits; however, you can disable automatic detection for one or more attacks or scans. On the McAfee SecurityCenter pane, click Internet & Network, then click Configure. On the Internet & Network Configuration pane, under Firewall protection is enabled, click Advanced.
  • Page 80: Locking And Restoring Firewall

    Lockdown Firewall instantly You can lockdown Firewall to instantly block all network traffic between your computer and any network, including the Internet. On the McAfee SecurityCenter pane, under Common Tasks, click Lockdown Firewall.
  • Page 81 Program Permissions pane, removes trusted and banned IP addresses, and restores system services, event log settings, and intrusion detection. On the McAfee SecurityCenter pane, click Restore Firewall Defaults. On the Restore Firewall Protection Defaults pane, click Restore Defaults.
  • Page 83: Managing Programs And Permissions

    H A P T E R Managing programs and permissions Firewall allows you to manage and create access permissions for existing and new programs that require inbound and outbound Internet access. Firewall lets you control full or outbound-only access for programs. You can also block access for programs. In this chapter Allowing Internet access for programs ......82 Allowing outbound-only access for programs ..84...
  • Page 84 Allow full access for a program You can allow an existing blocked program on your computer to have full inbound and outbound Internet access. On the McAfee SecurityCenter pane, click Internet & Network, then click Configure. On the Internet & Network Configuration pane, under Firewall protection is enabled, click Advanced.
  • Page 85 Allow full access from the Recent Events log You can allow an existing blocked program that appears in the Recent Events log to have full inbound and outbound Internet access. On the McAfee SecurityCenter pane, click Advanced Menu. Click Reports &...
  • Page 86 Firewall lets you configure program permissions to allow outbound-only Internet access. Allow outbound-only access for a program You can allow a program to have outbound-only Internet access. On the McAfee SecurityCenter pane, click Internet & Network, then click Configure. On the Internet & Network Configuration pane, under Firewall protection is enabled, click Advanced.
  • Page 87 Internet to function properly. Block access for a program You can block a program from having inbound and outbound Internet access. On the McAfee SecurityCenter pane, click Internet & Network, then click Configure. On the Internet & Network Configuration pane, under Firewall protection is enabled, click Advanced.
  • Page 88 McAfee Internet Security Block access from the Recent Events log You can block a program that appears in the Recent Events log from having inbound and outbound Internet access. On the McAfee SecurityCenter pane, click Advanced Menu. Click Reports &...
  • Page 89 Remove a program permission You can remove a program from having any inbound or outbound Internet access. On the McAfee SecurityCenter pane, click Internet & Network, then click Configure. On the Internet & Network Configuration pane, under Firewall protection is enabled, click Advanced.
  • Page 90: Learning About Programs

    More. Get program information from the Outbound Events log From the Outbound Events log, you can get program information from McAfee's HackerWatch Web site to decide which programs to allow or block inbound and outbound Internet access. Note: Ensure that you are connected to the Internet so that your...
  • Page 91: Managing Computer Connections

    If a trusted computer is infected with a worm or other mechanism, your computer can be vulnerable to infection. Also, McAfee recommends that the computer you trust is protected by a firewall and an up-to-date antivirus program.
  • Page 92 If a trusted computer is infected with a worm or other mechanism, your computer can be vulnerable to infection. Also, McAfee recommends that the computer you trust is protected by a firewall and an up-to-date antivirus program.
  • Page 93 Add a computer from the Inbound Events log You can add a trusted or standard computer connection and its associated IP address from the Inbound Events log. On the McAfee SecurityCenter pane, on the Common Tasks pane, click Advanced Menu.
  • Page 94 McAfee Internet Security Edit a computer connection You can edit a trusted, standard, or public computer connection and its associated IP address. On the McAfee SecurityCenter pane, click Internet & Network, then click Configure. On the Internet & Network Configuration pane, under Firewall protection is enabled, click Advanced.
  • Page 95 Chapter 18 McAfee Internet Security Remove a computer connection You can remove a trusted, standard, or public computer connection and its associated IP address. On the McAfee SecurityCenter pane, click Internet & Network, then click Configure. On the Internet & Network Configuration pane, under Firewall protection is enabled, click Advanced.
  • Page 96 Note: Ensure that you do not block important IP addresses, such as your DNS or DHCP server, or other ISP-related servers. On the McAfee SecurityCenter pane, click Internet & Network, then click Configure. On the Internet & Network Configuration pane, under Firewall protection is enabled, click Advanced.
  • Page 97 Chapter 18 McAfee Internet Security Edit a banned computer connection You can edit a banned computer connection and its associated IP address. On the McAfee SecurityCenter pane, click Internet & Network, then click Configure. On the Internet & Network Configuration pane, under Firewall protection is enabled, click Advanced.
  • Page 98 Add an IP address to your Banned IPs list if you want to block all inbound Internet traffic from that IP address, regardless of whether your System Services ports are opened or closed. On the McAfee SecurityCenter pane, under Common Tasks, click Advanced Menu.
  • Page 99: Managing System Services

    H A P T E R Managing system services To work properly, certain programs (including web servers and file-sharing server programs) must accept unsolicited connections from other computers through designated system service ports. Typically, Firewall closes these system service ports because they represent the most likely source of insecurities in your system.
  • Page 100: Configuring System Service Ports

    McAfee Internet Security Configuring system service ports System service ports can be configured to allow or block remote network access to a service on your computer. These system service ports can be opened or closed for computers listed as Trusted, Standard, or Public in your Networks list.
  • Page 101 An open system service port can make your computer vulnerable to Internet security threats; therefore, only open a port if necessary. On the McAfee SecurityCenter pane, click Internet & Network, then click Configure. On the Internet & Network Configuration pane, under Firewall protection is enabled, click Advanced.
  • Page 102 You can configure a new network service port on your computer that you can open or close to allow or block remote access on your computer. On the McAfee SecurityCenter pane, click Internet & Network, then click Configure. On the Internet & Network Configuration pane, under Firewall protection is enabled, click Advanced.
  • Page 103 Note: If port information is entered incorrectly, the system service fails. On the McAfee SecurityCenter pane, click Internet & Network, then click Configure. On the Internet & Network Configuration pane, under Firewall protection is enabled, click Advanced.
  • Page 104 You can remove an existing system service port from your computer. After removal, remote computers can no longer access the network service on your computer. On the McAfee SecurityCenter pane, click Internet & Network, then click Configure. On the Internet & Network Configuration pane, under Firewall protection is enabled, click Advanced.
  • Page 105: Logging, Monitoring, And Analysis

    H A P T E R Logging, monitoring, and analysis Firewall provides extensive and easy-to-read logging, monitoring, and analysis for Internet events and traffic. Understanding Internet traffic and events helps you manage your Internet connections. In this chapter Event Logging ..............104 Working with Statistics ..........106 Tracing Internet traffic..........107 Monitoring Internet traffic .........110...
  • Page 106: Event Logging

    McAfee Internet Security Event Logging Firewall allows you to enable or disable event logging and, when enabled, which event types to log. Event logging allows you to view recent inbound, outbound events and intrusion events. Configure event log settings You can specify and configure the types of Firewall events to log.
  • Page 107 Chapter 20 McAfee Internet Security View inbound events If logging is enabled, you can view inbound events. Inbound Events include the date and time, source IP address, host name, and information and event type. Ensure the Advanced menu is enabled. On the Common Tasks pane, click Reports &...
  • Page 108: Working With Statistics

    McAfee Internet Security Working with Statistics Firewall leverages McAfee's HackerWatch security Web site to provide you with statistics about global Internet security events and port activity. View global security event statistics HackerWatch tracks worldwide Internet security events, which you can view from SecurityCenter. Information tracked lists incidents reported to HackerWatch in the last 24 hours, 7 days, and 30 days.
  • Page 109: Tracing Internet Traffic

    Chapter 20 McAfee Internet Security Tracing Internet traffic Firewall offers a number of options for tracing Internet traffic. These options let you geographically trace a network computer, obtain domain and network information, and trace computers from the Inbound Events and Intrusion Detection Events logs.
  • Page 110 McAfee Internet Security Trace a computer from the Inbound Events log From the Inbound Events pane, you can trace an IP address that appears in the Inbound Events log. Ensure the Advanced menu is enabled. On the Common Tasks pane, click Reports &...
  • Page 111 Chapter 20 McAfee Internet Security Trace a monitored IP address You can trace a monitored IP address to obtain a geographical view which shows the most probable route of data taken from the source computer to yours. In addition, you can obtain registration and network information about the IP address.
  • Page 112: Monitoring Internet Traffic

    McAfee Internet Security Monitoring Internet traffic Firewall provides a number of methods to monitor your Internet traffic, including the following: Traffic Analysis graph: Displays recent inbound and outbound Internet traffic. Traffic Usage graph: Displays the percentage of bandwidth used by the most active programs during the past 24 hour period.
  • Page 113 Chapter 20 McAfee Internet Security Analyze inbound and outbound traffic The Traffic Analysis graph is a numerical and graphical representation of inbound and outbound Internet traffic. Also, the Traffic Monitor displays programs that use the most network connections on your computer and the IP addresses that the programs access.
  • Page 114 McAfee Internet Security Note: To view the most up-to-date statistics, click Refresh under Active Programs.
  • Page 115: Learning About Internet Security

    H A P T E R Learning about Internet security Firewall leverages McAfee's security Web site, HackerWatch, to provide up-to-date information about programs and global Internet activity. HackerWatch also provides an HTML tutorial about Firewall. In this chapter Launch the HackerWatch tutorial......114...
  • Page 116: Launch The Hackerwatch Tutorial

    McAfee Internet Security Launch the HackerWatch tutorial To learn about Firewall, you can access the HackerWatch tutorial from SecurityCenter. Ensure that the Advanced Menu is enabled, and then click Tools. On the Tools pane, click HackerWatch. Under HackerWatch Resources, click View Tutorial.
  • Page 117: Mcafee Anti-Spam

    (e-mail soliciting you to provide personal information to a potentially fraudulent Web site). Anti-Spam then filters the spam e-mail and moves it to the McAfee Anti-Spam folder. If your friends sometimes send you legitimate e-mail that may appear as spam, you can ensure that it is not filtered by adding their e-mail addresses to Anti-Spam's friends list.
  • Page 118 McAfee Internet Security In this chapter Anti-Spam features .............117 Configuring spam detection........119 Filtering e-mail ............127 Setting up friends ............129 Setting up your Webmail accounts ......133 Working with filtered e-mail ........137 Configuring phishing protection .......139...
  • Page 119: Anti-Spam Features

    McAfee for analysis. Identify potential phishing (fraudulent) websites that solicit Phishing filtering personal information. Mark unsolicited email as spam and move it to your McAfee Customized spam Anti-Spam folder, or mark legitimate email as not spam and move it processing to your Inbox.
  • Page 121: Configuring Spam Detection

    H A P T E R Configuring spam detection Anti-Spam allows you to customize how spam is detected. You can filter messages more aggressively, specify what to look for in a message, and look for specific character sets when analyzing spam.
  • Page 122: Setting Filtering Options

    McAfee Internet Security Setting filtering options Adjust Anti-Spam's filtering options if you want to filter messages more aggressively, specify how you want to process spam, and look for specific character sets when analyzing spam. Filtering level The filtering level dictates how aggressively your e-mail is filtered.
  • Page 123 Specify the location Put spam email in this folder In the list, where to put spam select a folder. The default folder is McAfee and phish e-mail Anti-Spam. Change the subject Mark the subject of the spam email line of the spam...
  • Page 124 McAfee Internet Security To... Do this... Change the subject Mark the subject of the phish email line of phish e-mail with , specify a tag to add to the subject line of phish e-mail. The default tag is [PHISH]. Specify the largest...
  • Page 125: Using Personal Filters

    Regular expressions (RegEx) are special characters and sequences that can also be used in personal filters; however, McAfee only recommends using regular expressions if you are an advanced user. If you are not familiar with regular expressions, or you want...
  • Page 126 McAfee Internet Security Edit a personal filter Edit existing filters to fine-tune which messages are identified as spam. Open the Spam Protection pane. How? 1. On the SecurityCenter Home pane, click E-mail & IM. 2. In the E-mail & IM information area, click Configure.
  • Page 127: Disable Spam Protection

    Chapter 23 McAfee Internet Security To... Do this... Specify the words or Words or phrases , type what to look for in phrases in your an e-mail. For example, if you specify filter mortgage , all e-mail that contains this word are filtered.
  • Page 129: Filtering E-Mail

    (the tag [SPAM] or [PHISH] appears in the subject line of the message), and moves the message to the McAfee Anti-Spam folder. You can mark e-mail as spam or not spam from the Anti-Spam toolbar, change the location where spam messages are moved, or change the tag that appears in the subject line.
  • Page 130 McAfee Internet Security Disable the Anti-Spam toolbar If you are using Outlook, Outlook Express, Windows Mail, Eudora, or Thunderbird, you can disable the Anti-Spam toolbar. Open the Spam Protection pane. How? 1. On the SecurityCenter Home pane, click E-mail & IM.
  • Page 131: Setting Up Friends

    H A P T E R Setting up friends Because of Anti-Spam's improved filter which recognizes and allows legitimate e-mail messages, it is rare that you need to add your friends' e-mail address to your friends list, whether you add them manually or import your address books.
  • Page 132: Setting Up Friends Manually

    McAfee Internet Security Setting up friends manually You manually update your list of friends by editing the entries one-by-one. For example, if you receive an e-mail from a friend whose address is not in your address book, you can manually add their e-mail address right away.
  • Page 133 Chapter 25 McAfee Internet Security Add a domain Add an entire domain if you want to add every user on that domain to your friends list. For example, if you add the company.com domain, none of the e-mail from that organization is filtered.
  • Page 134 McAfee Internet Security Edit a domain If the information for a domain changes, you can update your friends list to ensure that Anti-Spam does not mark the messages from that domain as spam. Open the Spam Protection pane. How? 1. On the SecurityCenter Home pane, click E-mail &...
  • Page 135: Setting Up Your Webmail Accounts

    H A P T E R Setting up your Webmail accounts If you use a browser to read your e-mail messages, you must configure Anti-Spam to connect to your account and filter your messages. To add your Webmail account to Anti-Spam, simply add the account information provided by your e-mail provider.
  • Page 136: Edit A Webmail Account

    McAfee Internet Security 1. On the SecurityCenter Home pane, click E-mail & IM. 2. In the E-mail & IM information area, click Configure. 3. On the E-mail & IM Configuration pane, under Spam protection is enabled, click Advanced. On the Spam Protection pane, click Webmail Accounts.
  • Page 137: Remove A Webmail Account

    Chapter 26 McAfee Internet Security Remove a Webmail account Remove a Webmail account if you no longer want to filter its e-mail for spam. For example, if your account is not active any more or you are experiencing problems, you can remove the account while you troubleshoot the issue.
  • Page 138 McAfee Internet Security Checking options Option Description Check every Anti-Spam checks this account for spam at the interval (number of minutes) you specify. The interval must be between 5 and 3600 minutes. Check on startup Anti-Spam checks this account every time you restart the computer.
  • Page 139: Working With Filtered E-Mail

    Working with filtered e-mail At times, some spam may not be detected. When this happens, you can report spam to McAfee, where it is analyzed to create filter updates. If you are using a Webmail account, you can view, export, and delete your filtered e-mail messages.
  • Page 140: View, Export, Or Delete Filtered Webmail

    McAfee Internet Security Note: When you report an e-mail as not spam, and send the entire e-mail to McAfee, the e-mail message is not encrypted. View, export, or delete filtered Webmail You can view, export, or delete messages that have been filtered in your Webmail account.
  • Page 141: Configuring Phishing Protection

    If there are Web sites that you do not want to filter, add them to the Phishing whitelist. You can also edit or remove Web sites from the whitelist. You do not need to add sites such as Google®, Yahoo, or McAfee, because these Web sites are not considered fraudulent. Note:...
  • Page 142: Edit Sites In Your Whitelist

    Web site you want to remove, and then click Remove. Disable phishing protection If you already have phishing software that is not from McAfee and there is a conflict, you can disable Anti-Spam phishing protection. On the SecurityCenter Home pane, click Internet &...
  • Page 143: Mcafee Parental Controls

    Parental Controls help. Note: SecurityCenter reports critical and non-critical protection problems as soon as it detects them. If you need help diagnosing your protection problems, you can run McAfee Virtual Technician. In this chapter Parental Controls features ..........142 Protecting your children..........143 Protecting information on the Web ......161...
  • Page 144: Parental Controls Features

    McAfee Internet Security Parental Controls features Filter potentially inappropriate images, enable age-appropriate Parental Controls searching, configure a user's age (which determines what content will be blocked), and set Web browsing time limits (the days and times that a user can access the Web) for SecurityCenter users.
  • Page 145: Protecting Your Children

    To configure Parental Controls to protect your children, you must log into your computer as a Windows administrator. If you upgraded from an older version of this McAfee product and are still using McAfee users, you must also make sure you're logged in as a McAfee administrator.
  • Page 147: In This Chapter

    To configure users, you must log into your computer as a Windows administrator. If you upgraded from an older version of this McAfee product and are still using McAfee users, you must also make sure you're logged in as a McAfee administrator.
  • Page 148 Computer Management in Windows. You can then set up Parental Controls protection for those users in SecurityCenter. If you upgraded from a previous version of SecurityCenter that used McAfee users, see (page 147). Working with McAfee users...
  • Page 149 McAfee users; however, McAfee recommends that you switch to Windows users. Once you switch to Windows users, you can never switch back to McAfee users. If you continue using McAfee users, you can add, edit, or remove users and change or retrieve the McAfee administrator's password.
  • Page 150 Parental Controls protection. Click Create. Edit a McAfee user's account information You can change a McAfee user's password, account type, or automatic login ability. Log in to SecurityCenter as the Administrator user. Open the Users Settings pane.
  • Page 151 Remove. Change the McAfee administrator's password If you have trouble remembering the McAfee administrator password or suspect that it is compromised, you can change it. Log in to SecurityCenter as the Administrator user.
  • Page 152: Enabling Age Appropriate Searching

    McAfee Internet Security Enabling age appropriate searching Some popular search engines (like Yahoo! and Google) offer "safe searching"—a search setting that prevents potentially inappropriate search results from appearing in their result lists. These search engines usually let you choose how restrictive you want safe search filtering to be, but also let you or any other user turn it off at any time.
  • Page 153 Chapter 31 McAfee Internet Security 1. On the SecurityCenter Home pane, click Parental Controls. 2. In the Parental Controls information section, click Configure. 3. On the Parental Controls Configuration pane, click Advanced. 4. On the Parental Controls pane, click Users Settings.
  • Page 154: Filtering Potentially Inappropriate Web Images

    If you want to block potentially inappropriate images from appearing when a particular user browses the Web, you can enable image filtering. Each potentially inappropriate Web image is automatically replaced with a static McAfee image. Open the Users Settings pane. How? 1.
  • Page 155: Setting The Content Rating Group

    Chapter 31 McAfee Internet Security Setting the content rating group A user can belong to one of the following content rating groups: Young child Child Younger teen Older teen Adult Parental Controls rates (blocks or allows) Web content based on the group to which a user belongs.
  • Page 156: Setting Web Browsing Time Limits

    Web browsing to specific times or days or prohibit Web browsing entirely. If a child tries to browse the Web during a prohibited period, McAfee notifies the child that they cannot do so. If you prohibit Web browsing entirely, the child can log in to and use...
  • Page 157: Filtering Web Sites

    Web site, a message indicates that the site cannot be accessed because it is blocked by McAfee. You allow a Web site if McAfee has blocked it by default but you want to let your children access it. For more information about...
  • Page 158 Allow a Web site You allow a Web site to make sure that it is not blocked for any users. If you allow a Web site that McAfee has blocked by default, you override the default setting. Open the Parental Controls pane.
  • Page 159 Chapter 31 McAfee Internet Security Remove a filtered Web site You can remove a filtered Web site if you no longer want to block or allow it. Open the Parental Controls pane. How? 1. On the SecurityCenter Home pane, click Parental Controls.
  • Page 160: Filtering Web Sites Using Keywords

    Although McAfee does not recommend doing so, you can disable keyword filtering at any time. Open the Parental Controls pane.
  • Page 161 Chapter 31 McAfee Internet Security 1. On the SecurityCenter Home pane, click Parental Controls. 2. In the Parental Controls information section, click Configure. 3. On the Parental Controls Configuration pane, ensure that Parental Controls are enabled, and then click Advanced.
  • Page 163: Protecting Information On The Web

    H A P T E R Protecting information on the Web You can prevent your personal information (such as name, address, credit card numbers, and bank account numbers) from being transmitted over the Web by adding it to a protected information area.
  • Page 164: Protecting Personal Information

    Prevent your personal information (such as name, address, credit card numbers, and bank account numbers) from being transmitted over the Web by blocking it. If McAfee detects personal information contained in something (for example, a form field or file) about to be sent across the Web, the following...
  • Page 165: Protecting Passwords

    H A P T E R Protecting passwords The Password Vault is a secure storage area for your personal passwords. It allows you to store your passwords with confidence so that no other user (even an Administrator) can access them. In this chapter Setting up the Password Vault........164...
  • Page 166: Setting Up The Password Vault

    McAfee Internet Security Setting up the Password Vault Before you start using the Password Vault, you must set up a Password Vault password. Only users who know this password can access your Password Vault. If you forget your Password Vault password, you can reset it; however, all of the passwords that were previously stored in your Password Vault are then deleted.
  • Page 167 Chapter 33 McAfee Internet Security 1. Under Common Tasks, click Home. 2. On the SecurityCenter Home pane, click Internet & Network. 3. In the Internet & Network information section, click Configure. 4. On the Internet & Network Configuration pane, click...
  • Page 168 McAfee Internet Security 1. Under Common Tasks, click Home. 2. On the SecurityCenter Home pane, click Internet & Network. 3. In the Internet & Network information section, click Configure. 4. On the Internet & Network Configuration pane, click Advanced under Password Vault.
  • Page 169: Mcafee Backup And Restore

    H A P T E R McAfee Backup and Restore Use McAfee® Backup and Restore to avoid accidental loss of your data by archiving your files to CD, DVD, USB drive, external hard drive, or network drive. Local archiving allows you to archive (back up) your personal data to CD, DVD, USB drive, external hard drive, or network drive.
  • Page 170: Backup And Restore Features

    McAfee Internet Security Backup and Restore features Protect your data by archiving files and folders to CD, DVD, USB Local scheduled archiving drive, external hard drive, or network drive. After you initiate the first archive, incremental archives occur automatically for you.
  • Page 171: Archiving Files

    H A P T E R Archiving files You can use McAfee Backup and Restore to archive a copy of the files on your computer to CD, DVD, USB drive, external hard drive, or network drive. Archiving your files in this way makes it easy for you to retrieve information in case of accidental data loss or damage.
  • Page 172: Enabling And Disabling Local Archive

    McAfee Internet Security Enabling and disabling local archive The first time you launch Backup and Restore, you decide whether to enable or disable local archive, depending on how you want to use Backup and Restore. Once you sign in and start using Backup and Restore, you can enable or disable local archiving at any time.
  • Page 173: Setting Archive Options

    Compressed files are compressed into a form that minimizes the space required to store or transmit it. Although McAfee does not recommend doing so, you can disable encryption or compression at any time.
  • Page 174 McAfee Internet Security Include a location in the archive You can set two types of watch locations for archiving: top-level folders and subfolders, and top-level folders only. If you set a top-level folders and subfolders location, Backup and Restore monitors the contents of the folder and its subfolders for changes.
  • Page 175 Chapter 35 McAfee Internet Security 1. Click the Local Archive tab. 2. In the left pane, click Settings. Click File Types. Expand the file types lists, and select the check boxes beside the file types that you want to archive.
  • Page 176 2. In the left pane, click Settings. Click Advanced Settings. Clear the Enable encryption to increase security check box. Clear the Enable compression to reduce storage space check box. Click OK. Note: McAfee recommends that you do not disable encryption and compression when archiving your files.
  • Page 177: Running Full And Quick Archives

    Chapter 35 McAfee Internet Security Running full and quick archives You can run two types of archive: full or quick. When you run a full archive, you archive a complete set of data based on the watch file types and locations that you have set up. When you run a quick archive, you archive only those watched files that have changed since the last full or quick archive.
  • Page 178 McAfee Internet Security Select the check box beside the day on which you want to run the full archive. Click a value in the list to specify the time at which you want to run the full archive. To run a quick archive on a daily or hourly basis, click one of...
  • Page 179: Working With Archived Files

    H A P T E R Working with archived files After you archive some files, you can use Backup and Restore to work with them. Your archived files are presented to you in a traditional explorer view which allows you to locate them easily. As your archive grows, you might want to sort the files or search for them.
  • Page 180: Using The Local Archive Explorer

    McAfee Internet Security Using the local archive explorer The local archive explorer allows you to view and manipulate the files that you have archived locally. You can view each file's name, type, location, size, state (archived, not archived, or archive in progress), and the date on which each file was last archived.
  • Page 181 Chapter 36 McAfee Internet Security Click Search. Note: If you do not know the approximate size or date of the last archive, click Unknown. Open an archived file You can examine the content of an archived file by opening it directly in the local archive explorer.
  • Page 182: Restoring Archived Files

    McAfee Internet Security Restoring archived files If a watch file becomes corrupt, is missing, or is mistakenly deleted, you can restore a copy of it from a local archive. For this reason, it is important to ensure that you archive your files regularly.
  • Page 183 Chapter 36 McAfee Internet Security Restore an older version of a file from a local archive If you want to restore an older version of an archived file, you can locate it and add it to the Missing Files list. Then, you can restore...
  • Page 184: Managing Archives

    McAfee Internet Security Managing archives You can view a summary of information about your full and quick archives at any time. For example, you can view information about the amount of data currently being watched, the amount of data that has been archived, and the amount of data that is currently being watched but has not yet been archived.
  • Page 185: Mcafee Quickclean

    Active-X files, and system restore point files. QuickClean also protects your privacy by using the McAfee Shredder component to securely and permanently delete items that may contain sensitive, personal information, such as your name and address. For information about shredding files, see McAfee Shredder.
  • Page 186: Quickclean Features

    McAfee Internet Security QuickClean features Delete unnecessary files safely and efficiently using various File Cleaner cleaners. By deleting these files, you increase the space on your computer's hard drive and improve its performance.
  • Page 187: Cleaning Your Computer

    H A P T E R Cleaning your computer QuickClean deletes files that can create clutter on your computer. It empties your Recycle Bin and deletes temporary files, shortcuts, lost file fragments, registry files, cached files, cookies, browser history files, sent and deleted email, recently-used files, Active-X files, and system restore point files.
  • Page 188 McAfee Internet Security Name Function Cookie Cleaner Deletes cookies. These files are usually stored as temporary files. A cookie is a small file containing information, usually including a user name and the current date and time, stored on the computer of a person browsing the web.
  • Page 189: In This Chapter

    If any files or items were locked during cleanup, you may be prompted to restart your computer. Click to close the prompt. Click Finish. Note: Files deleted with Shredder cannot be recovered. For information about shredding files, see McAfee Shredder.
  • Page 191: Defragmenting Your Computer

    In this chapter Defragment your computer........189 Defragment your computer You can defragment your computer to improve file and folder access and retrieval. On the McAfee SecurityCenter pane, under Common Tasks, click Maintain Computer.
  • Page 193: Scheduling A Task

    When finished, under QuickClean Summary, you can view the date and time when your task is scheduled to run again. Open the Task Scheduler pane. How? 1. On the McAfee SecurityCenter, under Common Tasks, click Maintain Computer.
  • Page 194: Modify A Quickclean Task

    Click Finish. Note: Files deleted with Shredder cannot be recovered. For information about shredding files, see McAfee Shredder. Modify a QuickClean task You can modify a scheduled QuickClean task to change the cleaners it uses or the frequency with which it automatically runs on your computer.
  • Page 195: Delete A Quickclean Task

    Click Finish. Note: Files deleted with Shredder cannot be recovered. For information about shredding files, see McAfee Shredder. Delete a QuickClean task You can delete a scheduled QuickClean task if you no longer want it to run automatically.
  • Page 196: Modify A Disk Defragmenter Task

    McAfee Internet Security 1. On the McAfee SecurityCenter, under Common Tasks, click Maintain Computer. 2. Under Task Scheduler, click Start. In the Select operation to schedule list, click Disk Defragmenter. Type a name for your task in the Task name box, and then click Create.
  • Page 197: Delete A Disk Defragmenter Task

    Chapter 40 McAfee Internet Security Delete a Disk Defragmenter task You can delete a scheduled Disk Defragmenter task if you no longer want it to run automatically. Open the Task Scheduler pane. How? 1. On the McAfee SecurityCenter, under Common Tasks, click Maintain Computer.
  • Page 199: Mcafee Shredder

    H A P T E R McAfee Shredder McAfee Shredder deletes (or shreds) items permanently from your computer's hard drive. Even when you manually delete files and folders, empty your Recycle Bin, or delete your Temporary Internet Files folder, you can still recover this information using computer forensic tools.
  • Page 200: Shredder Features

    McAfee Internet Security Shredder features Remove items from your computer's hard drive so that their Permanently delete files associated information cannot be recovered. It protects your privacy and folders by safely and permanently deleting files and folders, items in your...
  • Page 201: Shredding Files, Folders, And Disks

    You can shred files and folders from your computer's hard drive, including items in your Recycle Bin and in your Temporary Internet Files folder. Open Shredder. How? 1. On the McAfee SecurityCenter pane, under Common Tasks, click Advanced Menu. 2. On the left pane, click Tools.
  • Page 202: Shred An Entire Disk

    You can shred the entire contents of a disk at once. Only removable drives, such as external hard drives, writeable CDs, and floppy disks can be shredded. Open Shredder. How? 1. On the McAfee SecurityCenter pane, under Common Tasks, click Advanced Menu.
  • Page 203: Mcafee Network Manager

    If you've installed McAfee Total Protection, Network Manager can also monitor your network for Intruders (computers or devices that you don't recognize or trust) that try to connect to it.
  • Page 204: Network Manager Features

    Network monitoring If it is available, let Network Manager monitor your networks and notify you when Friends or Intruders connect. Network monitoring is only available if you've purchased McAfee Total Protection.
  • Page 205: Understanding Network Manager Icons

    Chapter 42 McAfee Internet Security Understanding Network Manager icons The following table describes the icons commonly used on the Network Manager network map. Icon Description Represents an online, managed computer Represents an offline, managed computer Represents an unmanaged computer that has...
  • Page 207: Setting Up A Managed Network

    H A P T E R Setting up a managed network To set up a managed network, trust the network (if you haven't already) and add members (computers) to the network. Before a computer can be remotely managed, or granted permission to remotely manage other computers on the network, it must become a trusted member of the network.
  • Page 208: Working With The Network Map

    On the Basic or Advanced Menu, click Manage Network. Note: If you haven't already trusted the network (using McAfee Personal Firewall), you are prompted to do so the first time that you access the network map.
  • Page 209 Chapter 43 McAfee Internet Security Rename the network By default, the name of the network includes the name of the first computer that connects to the network and has SecurityCenter installed. If you prefer to use a different name, you can change it.
  • Page 210: Joining The Managed Network

    When a computer joins the network, it is prompted to expose its McAfee protection status to other computers on the network. If a computer agrees to expose its protection status, it becomes a managed member of the network.
  • Page 211 Chapter 43 McAfee Internet Security Invite a computer to join the managed network If a computer is added to the managed network, or another unmanaged computer exists on the network, you can invite that computer to join the managed network. Only computers with administrative permissions on the network can invite other computers to join.
  • Page 212 McAfee Internet Security Stop trusting computers on the network If you trusted other computers on the network by mistake, you can stop trusting them. Click Stop trusting computers on this network under want Note: Stop trusting computers on this network...
  • Page 213: Managing The Network Remotely

    H A P T E R Managing the network remotely After you set up your managed network, you can remotely manage the computers and devices that make up your network. You can manage the status and permission levels of the computers and devices and fix most security vulnerabilities remotely.
  • Page 214: Managing Status And Permissions

    A managed network has managed and unmanaged members. Managed members allow other computers on the network to manage their McAfee protection status; unmanaged members do not. Unmanaged members are usually guest computers that want to access other network features (for example, send files or share printers).
  • Page 215 Note: If the device is a Wireless Network Security protected wireless router or access point, you must use McAfee Wireless Network Security to configure the device's security settings. Modify a device's display properties When you modify a device's display properties, you can change the device's display name on the network map and specify whether the device is a wireless router.
  • Page 216: Fixing Security Vulnerabilities

    McAfee Internet Security Fixing security vulnerabilities Managed computers with administrative permissions can manage the McAfee protection status of other managed computers on the network and fix reported security vulnerabilities remotely. For example, if a managed computer's McAfee protection status indicates that VirusScan is disabled, another managed computer with administrative permissions can enable VirusScan remotely.
  • Page 217 Have your McAfee login information handy—this is the e-mail address and password used the first time the McAfee software was activated. In a browser, go to the McAfee Web site, log in, and click Account. Find the product you want to install, click its Download button, and then follow the on-screen instructions.
  • Page 219: Monitoring Your Networks

    H A P T E R Monitoring your networks If you have McAfee Total Protection installed, Network Manager also monitors your networks for intruders. Each time an unknown computer or device connects to your network, you'll be notified about it so you can decide whether that computer or device is a Friend or an Intruder.
  • Page 220: Mark As Friend

    McAfee Internet Security Mark as Friend Mark a computer or device on your network as a Friend only if you recognize and trust it. When you mark a computer or device as a Friend, you can also decide whether or not you want to be notified each time it connects to the network.
  • Page 221: Stop Monitoring Networks

    Don't show alerts for Friends that I usually want to be notified about Don't remind me when unknown PCs or devices are detected Don't alert me when McAfee has finished detecting new Friends Click OK. Stop monitoring networks If you disable network monitoring, we can no longer alert you if intruders connect to your home network or any other network that you connect to.
  • Page 223: Mcafee Easynetwork

    EasyNetwork help. Note: SecurityCenter reports critical and non-critical protection problems as soon as it detects them. If you need help diagnosing your protection problems, you can run McAfee Virtual Technician. In this chapter EasyNetwork features ..........222 Setting up EasyNetwork..........223...
  • Page 224: Easynetwork Features

    McAfee Internet Security EasyNetwork features Easily share files with other computers on your network. When you File sharing share files, you grant other computers read-only access to those files. Only computers that have full or administrative access to your managed network (members) can share or access files shared by other members.
  • Page 225: Setting Up Easynetwork

    Open EasyNetwork You can open EasyNetwork from your Windows Start menu or by clicking its desktop icon. On the Start menu, point to Programs, point to McAfee, and then click McAfee EasyNetwork. Tip: You can also open EasyNetwork by double-clicking the...
  • Page 226: Joining A Managed Network

    Note: After you join, if you have other McAfee networking programs installed (for example, Network Manager), the computer is also recognized as a managed computer in those programs. The permission level that is assigned to a computer in EasyNetwork applies to all McAfee networking programs.
  • Page 227 Chapter 47 McAfee Internet Security Join the network When a computer connects to a trusted network for the first time after installing EasyNetwork, a message appears asking whether to join the managed network. If the computer agrees to join, a request is sent to all the other computers on the network that have administrative access.
  • Page 228 McAfee Internet Security Click Allow administrative access to managed network programs to allow the computer access to the network with administrative permissions. It also allows the computer to grant access to other computers that want to join the managed network.
  • Page 229 Chapter 47 McAfee Internet Security Rename the network By default, the network name includes the name of the first computer that joined; however, you can change the network name at any time. When you rename the network, you change the network description displayed in EasyNetwork.
  • Page 230: Leaving A Managed Network

    McAfee Internet Security Leaving a managed network If you join a managed network but then decide that you do not want to be a member, you can leave the network. After you leave the managed network, you can always rejoin; however, you must be granted permission again.
  • Page 231: Sharing And Sending Files

    H A P T E R Sharing and sending files EasyNetwork makes it easy to share and send files among other computers on the network. When you share files, you grant other computers read-only access to them. Only computers that are members of the managed network (full or administrative access) can share or access files shared by other member computers.
  • Page 232: Sharing Files

    McAfee Internet Security Sharing files Only computers that are members of the managed network (full or administrative access) can share or access files shared by other member computers. If you share a folder, all the files contained in that folder and its subfolders are shared; however, subsequent files added to the folder are not automatically shared.
  • Page 233 Chapter 48 McAfee Internet Security Copy a shared file You copy a shared file so that you still have it when it's not shared any more. You can copy a shared file from any computer on your managed network. Drag a file from the Shared Files window in EasyNetwork to a location in Windows Explorer or to the Windows desktop.
  • Page 234 McAfee Internet Security Type of file Type Description Search all shared file types. Document Search all shared documents. Image Search all shared image files. Video Search all shared video files. Audio Search all shared audio files. Compressed Search all compressed files (for example, .zip...
  • Page 235: Sending Files To Other Computers

    Chapter 48 McAfee Internet Security Sending files to other computers You can send files to other computers that are members of the managed network. Before sending a file, EasyNetwork confirms that the computer receiving the file has enough disk space available.
  • Page 236 McAfee Internet Security Receive notification when a file is sent You can receive a notification message when another computer on the managed network sends you a file. If EasyNetwork is not running, the notification message appears in the notification area at the far right of your taskbar.
  • Page 237: Sharing Printers

    H A P T E R Sharing printers After you join a managed network, EasyNetwork shares the local printers attached to your computer and uses the printer's name as the shared printer name. EasyNetwork also detects printers shared by other computers on your network and allows you to configure and use them.
  • Page 238: Working With Shared Printers

    McAfee Internet Security Working with shared printers EasyNetwork detects the printers that are shared by the computers on the network. If EasyNetwork detects a remote printer that is not connected to your computer, the Available network printers link appears in the Shared Files window when you open EasyNetwork for the first time.
  • Page 239 Chapter 49 McAfee Internet Security...
  • Page 240: Reference

    McAfee Internet Security Reference The Glossary of Terms lists and defines the most commonly used security terminology found in McAfee products.
  • Page 241: Glossary

    Glossary 802.11 A set of standards for transmitting data across a wireless network. 802.11 is commonly known as Wi-Fi. 802.11a An extension to 802.11 that transmits data at up to 54 Mbps in the 5GHz band. Although the transmission speed is faster than 802.11b, the distance covered is much less. 802.11b An extension to 802.11 that transmits data at up to 11 Mbps in the 2.4 GHz band.
  • Page 242 McAfee Internet Security bandwidth The amount of data (throughput) that can be transmitted in a fixed period of time. blacklist In Anti-Spam, a list of email addresses you do not want to receive messages from because you believe the messages will be spam. In anti-phishing, a list of websites that are considered fraudulent.
  • Page 243 A type of brute-force attack that uses common words to try to discover a password. Domain Name System. A database system that translates an IP address, such as 11.2.3.44, into a domain name, such as www.mcafee.com. domain A local subnetwork or a descriptor for sites on the Internet. On a local area network (LAN), a domain is a subnetwork made up of client and server computers controlled by one security database.
  • Page 244 McAfee Internet Security encryption A method of encoding information so that unauthorized parties cannot access it. When the data is encoded, the process uses a “key” and mathematical algorithms. Encrypted information cannot be decrypted without the proper key. Viruses sometimes use encryption in an attempt to escape detection.
  • Page 245 Glossary IP address Internet Protocol address. An address used to identify a computer or device on a TCP/IP network. The format of an IP address is a 32-bit numeric address written as four numbers separated by periods. Each number can be 0 to 255 (for example, 192.168.1.100). IP spoofing Forging the IP addresses in an IP packet.
  • Page 246 McAfee Internet Security network A collection of IP-based systems (such as routers, switches, servers, and firewalls) that are grouped as a logical unit. For example, a “Finance Network” might include all of the servers, routers, and systems that service a finance department. See also home network (page 242).
  • Page 247 Glossary plain text Text that is not encrypted. See also encryption (page 241). plugin, plug-in A small software program that adds features to or enhances a larger piece of software. For example, plug-ins permit a web browser to access and execute files embedded in HTML documents that are in formats the browser normally would not recognize, such as animation, video, and audio files.
  • Page 248 McAfee Internet Security proxy server A firewall component that manages Internet traffic to and from a local area network (LAN). A proxy server can improve performance by supplying frequently requested data, such as a popular web page, and can filter and discard requests that the owner does not consider appropriate, such as requests for unauthorized access to proprietary files.
  • Page 249 Glossary rootkit A collection of tools (programs) that grant a user administrator-level access to a computer or computer network. Rootkits might include spyware and other potentially unwanted programs that can create additional security or privacy risks to your computer data and personal information.
  • Page 250 You can also create and name your own restore points at any time. SystemGuard McAfee alerts that detect unauthorized changes to your computer and notify you when they occur. temporary file A file, created in memory or on disk by the operating system or some other program, to be used during a session and then discarded.
  • Page 251 Glossary You: Simplified, Smarter, Mobile. A platform for running Windows 2000 or Windows XP programs directly from a USB drive. The U3 initiative was founded in 2004 by M-Systems and SanDisk and allows users to run U3 programs on a Windows computer without installing or storing data or settings on the computer.
  • Page 252 McAfee Internet Security web bugs Small graphics files that can embed themselves in your HTML pages and allow an unauthorized source to set cookies on your computer. These cookies can then transmit information to the unauthorized source. Web bugs are also called “web beacons,” “pixel tags,”...
  • Page 253 Glossary worm A virus that spreads by creating duplicates of itself on other drives, systems, or networks. A mass-mailing worm is one that requires a user’s intervention to spread, e.g., opening an attachment or executing a downloaded file. Most of today’s email viruses are worms. A self-propagating worm does not need user intervention to propagate.
  • Page 255: About Mcafee

    About McAfee McAfee, Inc., headquartered in Santa Clara, California and the global leader in Intrusion Prevention and Security Risk Management, delivers proactive and proven solutions and services that secure systems and networks around the world. With its unmatched security expertise and commitment to...
  • Page 256: Copyright

    McAfee Internet Security Copyright Copyright © 2008 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means without the written permission of McAfee, Inc.
  • Page 257: Customer And Technical Support

    McAfee Virtual Technician. For more information about McAfee Virtual Technician, see the McAfee Virtual Technician help. If you purchased your security software from a partner or provider other than McAfee, open a Web browser, and go to . Then, under Partner Links, select your www.mcafeehelp.com partner or provider to access McAfee Virtual Technician.
  • Page 258: Using Mcafee Virtual Technician

    Tasks, click McAfee Virtual Technician. Follow the on-screen instructions to download and run Virtual Technician. Consult the following tables for the McAfee Support and Download sites in your country or region, including User Guides. Support and Downloads Country/Region McAfee Support...
  • Page 259 Chapter 50 About McAfee Czech Republic www.mcafeenapoveda.co cz.mcafee.com/root/do wnloads.asp Denmark www.mcafeehjaelp.com dk.mcafee.com/root/do wnloads.asp Finland www.mcafeehelp.com fi.mcafee.com/root/do wnloads.asp France www.mcafeeaide.com fr.mcafee.com/root/do wnloads.asp Germany www.mcafeehilfe.com de.mcafee.com/root/do wnloads.asp Greece www.mcafeehelp.com el.mcafee.com/root/do wnloads.asp Hungary www.mcafeehelp.com hu.mcafee.com/root/do wnloads.asp Italy www.mcafeeaiuto.com it.mcafee.com/root/do wnloads.asp Japan www.mcafeehelp.jp jp.mcafee.com/root/do wnloads.asp...
  • Page 260 McAfee Internet Security United States www.mcafeehelp.com us.mcafee.com/root/do wnloads.asp McAfee Total Protection User Guides Country/Regi McAfee User Guides Australia download.mcafee.com/products/manuals/en-au/MTP_us erguide_2008.pdf Brazil download.mcafee.com/products/manuals/pt-br/MTP_us erguide_2008.pdf Canada download.mcafee.com/products/manuals/en-ca/MTP_us (English) erguide_2008.pdf Canada download.mcafee.com/products/manuals/fr-ca/MTP_use (French) rguide_2008.pdf China download.mcafee.com/products/manuals/zh-cn/MTP_us (Simplified erguide_2008.pdf Chinese) Czech download.mcafee.com/products/manuals/cz/MTP_userg Republic uide_2008.pdf Denmark download.mcafee.com/products/manuals/dk/MTP_userg...
  • Page 261 Sweden download.mcafee.com/products/manuals/sv/MTP_userg uide_2008.pdf Taiwan download.mcafee.com/products/manuals/zh-tw/MTP_us erguide_2008.pdf Turkey download.mcafee.com/products/manuals/tr/MTP_userg uide_2008.pdf United download.mcafee.com/products/manuals/en-uk/MTP_us Kingdom erguide_2008.pdf United States download.mcafee.com/products/manuals/en-us/MTP_us erguide_2008.pdf McAfee Internet Security User Guides Country/Regi McAfee User Guides Australia download.mcafee.com/products/manuals/en-au/MIS_us erguide_2008.pdf Brazil download.mcafee.com/products/manuals/pt-br/MIS_use rguide_2008.pdf Canada download.mcafee.com/products/manuals/en-ca/MIS_use (English) rguide_2008.pdf Canada download.mcafee.com/products/manuals/fr-ca/MIS_user (French) guide_2008.pdf China download.mcafee.com/products/manuals/zh-cn/MIS_use...
  • Page 262 McAfee Internet Security Finland download.mcafee.com/products/manuals/fi/MIS_usergu ide_2008.pdf France download.mcafee.com/products/manuals/fr/MIS_usergu ide_2008.pdf Germany download.mcafee.com/products/manuals/de/MIS_userg uide_2008.pdf Greece download.mcafee.com/products/manuals/el/MIS_usergu ide_2008.pdf Hungary download.mcafee.com/products/manuals/hu/MIS_userg uide_2008.pdf Italy download.mcafee.com/products/manuals/it/MIS_usergu ide_2008.pdf Japan download.mcafee.com/products/manuals/ja/MIS_usergu ide_2008.pdf Korea download.mcafee.com/products/manuals/ko/MIS_userg uide_2008.pdf Mexico download.mcafee.com/products/manuals/es-mx/MIS_us erguide_2008.pdf Netherlands download.mcafee.com/products/manuals/nl/MIS_usergu ide_2008.pdf Norway download.mcafee.com/products/manuals/no/MIS_userg uide_2008.pdf Poland download.mcafee.com/products/manuals/pl/MIS_usergu ide_2008.pdf Portugal download.mcafee.com/products/manuals/pt/MIS_userg...
  • Page 263 Chapter 50 About McAfee McAfee VirusScan Plus User Guides Country/Regi McAfee User Guides Australia download.mcafee.com/products/manuals/en-au/VSP_us erguide_2008.pdf Brazil download.mcafee.com/products/manuals/pt-br/VSP_use rguide_2008.pdf Canada download.mcafee.com/products/manuals/en-ca/VSP_use (English) rguide_2008.pdf Canada download.mcafee.com/products/manuals/fr-ca/VSP_user (French) guide_2008.pdf China download.mcafee.com/products/manuals/zh-cn/VSP_use (Simplified rguide_2008.pdf Chinese) Czech download.mcafee.com/products/manuals/cz/VSP_userg Republic uide_2008.pdf Denmark download.mcafee.com/products/manuals/dk/VSP_userg uide_2008.pdf Finland download.mcafee.com/products/manuals/fi/VSP_usergu...
  • Page 264 Sweden download.mcafee.com/products/manuals/sv/VSP_usergu ide_2008.pdf Taiwan download.mcafee.com/products/manuals/zh-tw/VSP_us erguide_2008.pdf Turkey download.mcafee.com/products/manuals/tr/VSP_usergu ide_2008.pdf United download.mcafee.com/products/manuals/en-uk/VSP_us Kingdom erguide_2008.pdf United States download.mcafee.com/products/manuals/en-us/VSP_use rguide_2008.pdf McAfee VirusScan User Guides Country/Regi McAfee User Guides Australia download.mcafee.com/products/manuals/en-au/VS_user guide_2008.pdf Brazil download.mcafee.com/products/manuals/pt-br/VS_user guide_2008.pdf Canada download.mcafee.com/products/manuals/en-ca/VS_user (English) guide_2008.pdf Canada download.mcafee.com/products/manuals/fr-ca/VS_user (French) guide_2008.pdf China download.mcafee.com/products/manuals/zh-cn/VS_user...
  • Page 265 Chapter 50 About McAfee France download.mcafee.com/products/manuals/fr/VS_usergui de_2008.pdf Germany download.mcafee.com/products/manuals/de/VS_usergui de_2008.pdf Greece download.mcafee.com/products/manuals/el/VS_usergui de.2008.pdf Hungary download.mcafee.com/products/manuals/hu/VS_usergu ide.2008.pdf Italy download.mcafee.com/products/manuals/it/VS_usergui de_2008.pdf Japan download.mcafee.com/products/manuals/ja/VS_usergui de_2008.pdf Korea download.mcafee.com/products/manuals/ko/VS_usergui de_2008.pdf Mexico download.mcafee.com/products/manuals/es-mx/VS_user guide_2008.pdf Netherlands download.mcafee.com/products/manuals/nl/VS_usergui de_2008.pdf Norway download.mcafee.com/products/manuals/no/VS_usergu ide_2008.pdf Poland download.mcafee.com/products/manuals/pl/VS_usergui de_2008.pdf Portugal download.mcafee.com/products/manuals/pt/VS_usergui de_2008.pdf Russia download.mcafee.com/products/manuals/ru/VS_usergui...
  • Page 266 McAfee Internet Security Consult the following table for the McAfee Threat Center and Virus Information sites in your country or region. Country/Regi Security Headquarters Virus Information Australia www.mcafee.com/us/threat_ce au.mcafee.com/virusIn nter Brazil www.mcafee.com/us/threat_ce br.mcafee.com/virusIn nter Canada www.mcafee.com/us/threat_cent ca.mcafee.com/virusIn (English) Canada www.mcafee.com/us/threat_cent ca.mcafee.com/virusIn...
  • Page 267 Chapter 50 About McAfee Norway www.mcafee.com/us/threat_cent no.mcafee.com/virusIn Poland www.mcafee.com/us/threat_cent pl.mcafee.com/virusInf Portugal www.mcafee.com/us/threat_cent pt.mcafee.com/virusIn Russia www.mcafee.com/us/threat_ce ru.mcafee.com/virusIn nter Slovakia www.mcafee.com/us/threat_ce sk.mcafee.com/virusInf nter Spain www.mcafee.com/us/threat_cent es.mcafee.com/virusInf Sweden www.mcafee.com/us/threat_cent se.mcafee.com/virusInf Taiwan www.mcafee.com/us/threat_cent tw.mcafee.com/virusIn Turkey www.mcafee.com/us/threat_cent tr.mcafee.com/virusInf United www.mcafee.com/us/threat_cent uk.mcafee.com/virusIn Kingdom United States www.mcafee.com/us/threat_cent us.mcafee.com/virusIn...
  • Page 268 McAfee Internet Security Germany www.hackerwatch.org/?lang=de Greece www.hackerwatch.org/?lang=el Hungary www.hackerwatch.org/?lang=hu Italy www.hackerwatch.org/?lang=it Japan www.hackerwatch.org/?lang=jp Korea www.hackerwatch.org/?lang=ko Mexico www.hackerwatch.org/?lang=es-mx Netherlands www.hackerwatch.org/?lang=nl Norway www.hackerwatch.org/?lang=no Poland www.hackerwatch.org/?lang=pl Portugal www.hackerwatch.org/?lang=pt-pt Russia www.hackerwatch.org/?lang=ru Slovakia www.hackerwatch.org/?lang=sk Spain www.hackerwatch.org/?lang=es Sweden www.hackerwatch.org/?lang=sv Taiwan www.hackerwatch.org/?lang=zh-tw Turkey www.hackerwatch.org/?lang=tr United www.hackerwatch.org Kingdom United States www.hackerwatch.org...
  • Page 269: Index

    Ban a computer from the Inbound Events access point (AP) ........239 log............96 Access the network map .......206 Ban a computer from the Intrusion Access your McAfee account ....11 Detection Events log ......96 Activate your product......11 bandwidth..........240 ActiveX control........239 Banning computer connections.....94 Add a banned computer connection ..94...
  • Page 270 Index client ............240 Edit a McAfee user's account information compression ..........240 .............148 Configure a new system service port ...100 Edit a personal filter ......124 Configure automatic updates ....14 Edit a Webmail account......134 Configure event log settings ....104 Edit sites in your whitelist.....140 Configure Firewall Protection Status email..........
  • Page 271 Mark as Friend........218 Include a location in the archive ..172 Mark as Intruder........218 Install an available network printer ..236 McAfee Anti-Spam ........115 Install McAfee security software on McAfee Backup and Restore....167 remote computers......215 McAfee EasyNetwork ......221 integrated gateway ........242 McAfee Internet Security ......3 Interrupt an automatic archive ....176...
  • Page 272 Index password ..........244 Renew your subscription ......12 password vault ........244 Report e-mail messages to McAfee ..137 PCI wireless adapter card......244 Reset your Password Vault password ..166 Personal Firewall features.......62 Restore an older version of a file from a phishing..........244 local archive ........181 plain text..........245...
  • Page 273 Specify a personal filter ....123, 124 USB wireless adapter card ....249 SSID ............247 Using additional protection ....41 SSL ............248 Using McAfee Virtual Technician ..256 standard e-mail account .......248 Using personal filters ......123 Start e-mail protection ......42 Using SecurityCenter ........7 Start firewall protection ......63 Using SystemGuards options ....52...
  • Page 274 Work with viruses and Trojans ....35 Working with alerts ..... 14, 21, 65 Working with archived files ....177 Working with filtered e-mail....137 Working with McAfee users ..146, 147 Working with scan results .......35 Working with shared printers ....236 Working with Statistics......106 Working with the network map ....206...

This manual is also suitable for:

Internet security

Table of Contents