User Guide
Page 2
... NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO MCAFEE OR THE PLACE OF PURCHASE FOR A FULL REFUND. Cryptographic software written by Robert Nordier, Copyright © 1996-7 Robert Nordier. Some software programs that are licensed (or sublicensed) to the user under the GNU General Public License (GPL) or other similar Free Software licenses which is distributed to use, copy or modify a software program...
... NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO MCAFEE OR THE PLACE OF PURCHASE FOR A FULL REFUND. Cryptographic software written by Robert Nordier, Copyright © 1996-7 Robert Nordier. Some software programs that are licensed (or sublicensed) to the user under the GNU General Public License (GPL) or other similar Free Software licenses which is distributed to use, copy or modify a software program...
User Guide
Page 4
... view the User Guides on your Windows desktop, and click Search. 3 Locate the Manuals folder, and double-click the User Guide .PDF you want to quickly reach our qualified support engineers through the Internet, at http://www.mcafeehelp.com/. options. Registration ensures that you receive timely and knowledgeable technical assistance, plus the following benefits: FREE electronic support Virus definition (.DAT) file updates for one year after installation when you purchase VirusScan software...
... view the User Guides on your Windows desktop, and click Search. 3 Locate the Manuals folder, and double-click the User Guide .PDF you want to quickly reach our qualified support engineers through the Internet, at http://www.mcafeehelp.com/. options. Registration ensures that you receive timely and knowledgeable technical assistance, plus the following benefits: FREE electronic support Virus definition (.DAT) file updates for one year after installation when you purchase VirusScan software...
User Guide
Page 5
... 1 Introduction 11 McAfee Internet Security software 12 System requirements 12 Supported e-mail programs 13 Toolbar plug-in requirements 13 Supported instant messaging programs 13 Using McAfee SecurityCenter 13 Removing Internet Security Suite programs 15 2 McAfee VirusScan 17 New features 17 Testing VirusScan 19 Testing ActiveShield 19 Testing Scan 19 Using McAfee SecurityCenter 21 Using ActiveShield 21 Enabling or disabling ActiveShield 21 Configuring ActiveShield options 23 Understanding security alerts 32 Manually scanning your computer 35 Manually scanning for viruses...
... 1 Introduction 11 McAfee Internet Security software 12 System requirements 12 Supported e-mail programs 13 Toolbar plug-in requirements 13 Supported instant messaging programs 13 Using McAfee SecurityCenter 13 Removing Internet Security Suite programs 15 2 McAfee VirusScan 17 New features 17 Testing VirusScan 19 Testing ActiveShield 19 Testing Scan 19 Using McAfee SecurityCenter 21 Using ActiveShield 21 Enabling or disabling ActiveShield 21 Configuring ActiveShield options 23 Understanding security alerts 32 Manually scanning your computer 35 Manually scanning for viruses...
User Guide
Page 6
... Events log 71 About alerts 72 Red alerts 73 Green alerts 78 Blue alerts 80 4 McAfee Privacy Service 81 Features 81 The Administrator 81 Setting up Privacy Service 82 Setting up a Pre-installed version of Privacy Service 82 Retrieving the Administrator Password 83 Removing Privacy Service with Safe Mode 83 The Startup user 84 Configuring the Administrator as Startup User 84 Using McAfee SecurityCenter 84 Launching McAfee Privacy Service 85 vi McAfee® Internet Security Suite® software
... Events log 71 About alerts 72 Red alerts 73 Green alerts 78 Blue alerts 80 4 McAfee Privacy Service 81 Features 81 The Administrator 81 Setting up Privacy Service 82 Setting up a Pre-installed version of Privacy Service 82 Retrieving the Administrator Password 83 Removing Privacy Service with Safe Mode 83 The Startup user 84 Configuring the Administrator as Startup User 84 Using McAfee SecurityCenter 84 Launching McAfee Privacy Service 85 vi McAfee® Internet Security Suite® software
User Guide
Page 8
Contents Emptying the Windows Recycle Bin 98 Customizing Shredder settings 98 Backing up the Privacy Service database 99 Restoring the Backup Database 99 Changing your password 100 Changing your user name 100 Clearing your cache 101 Accepting cookies 101 If you need to remove a web site from this list 101 Rejecting cookies 102 If you need to remove a web site from this list 102 5 McAfee SpamKiller 103 User options 103 Filtering 103...
Contents Emptying the Windows Recycle Bin 98 Customizing Shredder settings 98 Backing up the Privacy Service database 99 Restoring the Backup Database 99 Changing your password 100 Changing your user name 100 Clearing your cache 101 Accepting cookies 101 If you need to remove a web site from this list 101 Rejecting cookies 102 If you need to remove a web site from this list 102 5 McAfee SpamKiller 103 User options 103 Filtering 103...
User Guide
Page 20
... will see how Scan handles possible threats. For each link to see these links: eicar.com contains a line of the page. If so, Scan is the same file, but with a different file name, for details. 20 McAfee® Internet Security Suite®software You can try to delete or quarantine detected files to download its file. eicar.com.txt (optional) is working properly. b Click the VSO Scan Folder to highlight it...
... will see how Scan handles possible threats. For each link to see these links: eicar.com contains a line of the page. If so, Scan is the same file, but with a different file name, for details. 20 McAfee® Internet Security Suite®software You can try to delete or quarantine detected files to download its file. eicar.com.txt (optional) is working properly. b Click the VSO Scan Folder to highlight it...
User Guide
Page 28
... to scan all files If you set ActiveShield to use it scans every file type that your computer uses, as your protection, you cannot disable auto-cleaning of instant message attachments is enabled, VirusScan automatically scans and attempts to use the default All files (recommended) option, it . Use this option is enabled via the Scan inbound instant message attachments option (Figure 2-1 on page 29). 3 Click All files (recommended), then click OK. 28 McAfee® Internet Security Suite®software
... to scan all files If you set ActiveShield to use it scans every file type that your computer uses, as your protection, you cannot disable auto-cleaning of instant message attachments is enabled, VirusScan automatically scans and attempts to use the default All files (recommended) option, it . Use this option is enabled via the Scan inbound instant message attachments option (Figure 2-1 on page 29). 3 Click All files (recommended), then click OK. 28 McAfee® Internet Security Suite®software
User Guide
Page 30
... tab 30 McAfee® Internet Security Suite®software While VirusScan cleans viruses and other threats, ScriptStopperTM prevents Trojan horses from running scripts that results in the creation, copying, or deletion of files, or the opening of your Windows registry If you set ActiveShield to scan running scripts for worm-like activity: 1 Right-click the McAfee icon, point to use the default Enable ScriptStopper (recommended) option in the Advanced Options dialog box...
... tab 30 McAfee® Internet Security Suite®software While VirusScan cleans viruses and other threats, ScriptStopperTM prevents Trojan horses from running scripts that results in the creation, copying, or deletion of files, or the opening of your Windows registry If you set ActiveShield to scan running scripts for worm-like activity: 1 Right-click the McAfee icon, point to use the default Enable ScriptStopper (recommended) option in the Advanced Options dialog box...
User Guide
Page 33
Using ActiveShield Managing detected e-mail By default, e-mail scanning automatically tries to prevent the suspect script from your message queue. User Guide 33 Click Stop this e-mail to prevent the suspect e-mail from being sent and delete it : Click Find out more and then stop the e-mail activity if you can find out more information to view the name, location, and description of the...
Using ActiveShield Managing detected e-mail By default, e-mail scanning automatically tries to prevent the suspect script from your message queue. User Guide 33 Click Stop this e-mail to prevent the suspect e-mail from being sent and delete it : Click Find out more and then stop the e-mail activity if you can find out more information to view the name, location, and description of the...
User Guide
Page 36
... a normal scan. 36 McAfee® Internet Security Suite®software Deselect this option to find the newest viruses that Scan gives a false indication. Scan for new unknown viruses - Nevertheless, if a heuristic scan detects a virus, you should treat it with the same caution that you must leave the checkbox selected. The folders and their contents, you would treat a file that .ZIP file into another .ZIP file in Figure...
... a normal scan. 36 McAfee® Internet Security Suite®software Deselect this option to find the newest viruses that Scan gives a false indication. Scan for new unknown viruses - Nevertheless, if a heuristic scan detects a virus, you should treat it with the same caution that you must leave the checkbox selected. The folders and their contents, you would treat a file that .ZIP file into another .ZIP file in Figure...
User Guide
Page 52
.... To configure security settings: 1 Right-click the McAfee icon in its security setting to the desired level. You can enable Windows Firewall logging. Full Access allows the application the ability to both send data and receive unsolicited data on your computer is protected by moving the slider to Open without manually enabling Windows Firewall, all firewall protection will be removed except for previously blocked applications. All Internet connections on non-system ports. Windows Firewall...
.... To configure security settings: 1 Right-click the McAfee icon in its security setting to the desired level. You can enable Windows Firewall logging. Full Access allows the application the ability to both send data and receive unsolicited data on your computer is protected by moving the slider to Open without manually enabling Windows Firewall, all firewall protection will be removed except for previously blocked applications. All Internet connections on non-system ports. Windows Firewall...
User Guide
Page 53
... either change the application's permissions to Allow Full Access or delete the Blocked permission rule from the Internet Applications list. 4 Select additional security settings: NOTE If your computer as an administrator. IDS checks each packet that some games or streaming media do not work. For example, if Personal Firewall sees ICMP packets, it to your computer runs Windows XP and multiple XP users have been added, these to a "signature" database...
... either change the application's permissions to Allow Full Access or delete the Blocked permission rule from the Internet Applications list. 4 Select additional security settings: NOTE If your computer as an administrator. IDS checks each packet that some games or streaming media do not work. For example, if Personal Firewall sees ICMP packets, it to your computer runs Windows XP and multiple XP users have been added, these to a "signature" database...
User Guide
Page 63
... example, 0.0.0.0 is spoofed, or faked. These are also referred to be used for various reasons: Non-routable IP addresses - The other situation occurs when the source IP is a null IP address. About the Inbound Events page Understanding events About IP addresses IP addresses are numbers: four numbers each between components. These numbers identify a specific place that traffic can configure many personal E-mail or Web servers...
... example, 0.0.0.0 is spoofed, or faked. These are also referred to be used for various reasons: Non-routable IP addresses - The other situation occurs when the source IP is a null IP address. About the Inbound Events page Understanding events About IP addresses IP addresses are numbers: four numbers each between components. These numbers identify a specific place that traffic can configure many personal E-mail or Web servers...
User Guide
Page 73
... default) or Display Smart Recommendations only from accessing the Internet. Application Requests Server Access - For recommendations to the Internet and recommends that an application, previously allowed to the Internet. For example, if a Trojan program alert appears, McAfee automatically denies this program access to access the Internet has requested Internet access as McAfee services) to keep them up-to-date. IMPORTANT You must grant access to applications that requires your computer for online product updates...
... default) or Display Smart Recommendations only from accessing the Internet. Application Requests Server Access - For recommendations to the Internet and recommends that an application, previously allowed to the Internet. For example, if a Trojan program alert appears, McAfee automatically denies this program access to access the Internet has requested Internet access as McAfee services) to keep them up-to-date. IMPORTANT You must grant access to applications that requires your computer for online product updates...
User Guide
Page 77
... the time the application launches to the time it closes. About alerts View a brief description of the event, then choose from these options: Click Grant Access Once to allow the application temporary Internet access. Figure 3-8. Application Requests Server Access alert If you selected Tight security in the Security Settings options, Personal Firewall displays an alert (Figure 3-8) when it closes. User Guide 77 Click Block All Access to grant the application a temporary Internet connection. Access is...
... the time the application launches to the time it closes. About alerts View a brief description of the event, then choose from these options: Click Grant Access Once to allow the application temporary Internet access. Figure 3-8. Application Requests Server Access alert If you selected Tight security in the Security Settings options, Personal Firewall displays an alert (Figure 3-8) when it closes. User Guide 77 Click Block All Access to grant the application a temporary Internet connection. Access is...
User Guide
Page 82
... enabled to create the Administrator, manage global settings, enter personal information, and add users. Keep your PC includes a pre-installed copy of Privacy Service If Privacy Service is provided. Remember your Administrator password and security answer so that you cannot use Privacy Service and the Internet. Privacy Service always accepts cookies from McAfee.com. From the Windows Start menu, point to set up the product. Setting up a Pre-installed version of Privacy Service, some steps described in the Windows system tray, point...
... enabled to create the Administrator, manage global settings, enter personal information, and add users. Keep your PC includes a pre-installed copy of Privacy Service If Privacy Service is provided. Remember your Administrator password and security answer so that you cannot use Privacy Service and the Internet. Privacy Service always accepts cookies from McAfee.com. From the Windows Start menu, point to set up the product. Setting up a Pre-installed version of Privacy Service, some steps described in the Windows system tray, point...
User Guide
Page 90
... from accessing Web sites which the word was assigned, and those that you want to 50 characters and can contain uppercase and lowercase letters and numbers. 90 McAfee® Internet Security Suite®software To edit users, you are allowed to which contain the word. The word appears if it , are changing and click Edit. 2 Select Password, and enter the user's new password in the Word List. McAfee Privacy Service...
... from accessing Web sites which the word was assigned, and those that you want to 50 characters and can contain uppercase and lowercase letters and numbers. 90 McAfee® Internet Security Suite®software To edit users, you are allowed to which contain the word. The word appears if it , are changing and click Edit. 2 Select Password, and enter the user's new password in the Word List. McAfee Privacy Service...
User Guide
Page 93
... Administrator. NOTE Users (including Administrators) that you want to the Adult group level can assign a Startup user from the Please Sign In dialog also. This overrides Privacy Service's default settings and web sites added to view specific web sites. For more information, see The Startup user on page 84 Removing users 1 Select the user you want to Privacy Service as non-adult users. NOTE You can access all users to the Blocked list. 1 Click Options...
... Administrator. NOTE Users (including Administrators) that you want to the Adult group level can assign a Startup user from the Please Sign In dialog also. This overrides Privacy Service's default settings and web sites added to view specific web sites. For more information, see The Startup user on page 84 Removing users 1 Select the user you want to Privacy Service as non-adult users. NOTE You can access all users to the Blocked list. 1 Click Options...
User Guide
Page 141
... scanning for scripts, 30 scanning for worms, 26 scanning inbound instant message attachments, 28 scanning program files and documents only, 29 starting, 24 stopping, 24 testing, 19 adding an e-mail address to a Friends List, 122 adding e-mail accounts, 107 adding filters, 132 adding users, 87 content blocking, 88 cookie blocking, 88 Internet time limits, 89 administrator, 81, 115 to 116 retrieving password, 83 alerts Application Has Been Modified, 73 Application Requests Internet Access, 73 Application Requests Server Access, 73 Connection...
... scanning for scripts, 30 scanning for worms, 26 scanning inbound instant message attachments, 28 scanning program files and documents only, 29 starting, 24 stopping, 24 testing, 19 adding an e-mail address to a Friends List, 122 adding e-mail accounts, 107 adding filters, 132 adding users, 87 content blocking, 88 cookie blocking, 88 Internet time limits, 89 administrator, 81, 115 to 116 retrieving password, 83 alerts Application Has Been Modified, 73 Application Requests Internet Access, 73 Application Requests Server Access, 73 Connection...
User Guide
Page 144
... firewalls, 51 uninstalling McAfee Privacy Service, 87 from Safe Mode, 83 Update Wizard, 24 updating a Rescue Disk, 44 VirusScan automatically, 47 manually, 47 user options, 100 accepting cookies, 101 changing your password, 100 changing your user name, 100 clearing your cache, 101 rejecting cookies, 102 users adding users, 115 creating passwords, 116 deleting user profiles, 117 editing user profiles, 117 logging on to SpamKiller, 117 switching users, 117 user types, 115 using a Rescue Disk, 44 144 McAfee® Internet Security Suite® software
... firewalls, 51 uninstalling McAfee Privacy Service, 87 from Safe Mode, 83 Update Wizard, 24 updating a Rescue Disk, 44 VirusScan automatically, 47 manually, 47 user options, 100 accepting cookies, 101 changing your password, 100 changing your user name, 100 clearing your cache, 101 rejecting cookies, 102 users adding users, 115 creating passwords, 116 deleting user profiles, 117 editing user profiles, 117 logging on to SpamKiller, 117 switching users, 117 user types, 115 using a Rescue Disk, 44 144 McAfee® Internet Security Suite® software