User Guide
Page 2
... to use, copy or modify a software program that are the sole property of California, Berkeley and its contributors. Software copyrighted by Andrew Lumsdaine, Lie-Quan Lee, Jeremy G. Software copyrighted by Ronald Garcia, © 2002. See http://www.boost.org for documentation. Software copyrighted by Chuck Allison and Jeremy Siek, © 2001, 2002. Issued January 2006 / McAfee® Internet Security Suite® software Some software...
... to use, copy or modify a software program that are the sole property of California, Berkeley and its contributors. Software copyrighted by Andrew Lumsdaine, Lie-Quan Lee, Jeremy G. Software copyrighted by Ronald Garcia, © 2002. See http://www.boost.org for documentation. Software copyrighted by Chuck Allison and Jeremy Siek, © 2001, 2002. Issued January 2006 / McAfee® Internet Security Suite® software Some software...
User Guide
Page 4
... drive. 2 Open Windows Explorer: Click Start on the product CD, ensure that you can also access our FREE Chat Now! McAfee Internet Security Suite updates for one year after installation when you to http://www.mcafee.com/ for pricing of an additional year of virus signatures. 60-day warranty that guarantees replacement of your Windows desktop, and click Search. 3 Locate the Manuals folder, and double-click the User Guide .PDF you can...
... drive. 2 Open Windows Explorer: Click Start on the product CD, ensure that you can also access our FREE Chat Now! McAfee Internet Security Suite updates for one year after installation when you to http://www.mcafee.com/ for pricing of an additional year of virus signatures. 60-day warranty that guarantees replacement of your Windows desktop, and click Search. 3 Locate the Manuals folder, and double-click the User Guide .PDF you can...
User Guide
Page 5
... 1 Introduction 11 McAfee Internet Security software 12 System requirements 12 Supported e-mail programs 13 Toolbar plug-in requirements 13 Supported instant messaging programs 13 Using McAfee SecurityCenter 13 Removing Internet Security Suite programs 15 2 McAfee VirusScan 17 New features 17 Testing VirusScan 19 Testing ActiveShield 19 Testing Scan 19 Using McAfee SecurityCenter 21 Using ActiveShield 21 Enabling or disabling ActiveShield 21 Configuring ActiveShield options 23 Understanding security alerts 32 Manually scanning your computer 35 Manually scanning for viruses...
... 1 Introduction 11 McAfee Internet Security software 12 System requirements 12 Supported e-mail programs 13 Toolbar plug-in requirements 13 Supported instant messaging programs 13 Using McAfee SecurityCenter 13 Removing Internet Security Suite programs 15 2 McAfee VirusScan 17 New features 17 Testing VirusScan 19 Testing ActiveShield 19 Testing Scan 19 Using McAfee SecurityCenter 21 Using ActiveShield 21 Enabling or disabling ActiveShield 21 Configuring ActiveShield options 23 Understanding security alerts 32 Manually scanning your computer 35 Manually scanning for viruses...
User Guide
Page 6
... Events log 71 About alerts 72 Red alerts 73 Green alerts 78 Blue alerts 80 4 McAfee Privacy Service 81 Features 81 The Administrator 81 Setting up Privacy Service 82 Setting up a Pre-installed version of Privacy Service 82 Retrieving the Administrator Password 83 Removing Privacy Service with Safe Mode 83 The Startup user 84 Configuring the Administrator as Startup User 84 Using McAfee SecurityCenter 84 Launching McAfee Privacy Service 85 vi McAfee® Internet Security Suite® software
... Events log 71 About alerts 72 Red alerts 73 Green alerts 78 Blue alerts 80 4 McAfee Privacy Service 81 Features 81 The Administrator 81 Setting up Privacy Service 82 Setting up a Pre-installed version of Privacy Service 82 Retrieving the Administrator Password 83 Removing Privacy Service with Safe Mode 83 The Startup user 84 Configuring the Administrator as Startup User 84 Using McAfee SecurityCenter 84 Launching McAfee Privacy Service 85 vi McAfee® Internet Security Suite® software
User Guide
Page 8
Contents Emptying the Windows Recycle Bin 98 Customizing Shredder settings 98 Backing up the Privacy Service database 99 Restoring the Backup Database 99 Changing your password 100 Changing your user name 100 Clearing your cache 101 Accepting cookies 101 If you need to remove a web site from this list 101 Rejecting cookies 102 If you need to remove a web site from this list 102 5 McAfee SpamKiller 103 User options 103 Filtering 103...
Contents Emptying the Windows Recycle Bin 98 Customizing Shredder settings 98 Backing up the Privacy Service database 99 Restoring the Backup Database 99 Changing your password 100 Changing your user name 100 Clearing your cache 101 Accepting cookies 101 If you need to remove a web site from this list 101 Rejecting cookies 102 If you need to remove a web site from this list 102 5 McAfee SpamKiller 103 User options 103 Filtering 103...
User Guide
Page 20
... a copy of the test virus inside a .ZIP compressed file, which itself is the same file, but with a different file name, for details. 20 McAfee® Internet Security Suite®software e Click Save, click the Create New Folder button, then rename the folder VSO Scan Folder. f Double-click VSO Scan Folder, then click Save again in random locations on your hard drive for a more convincing demonstration of Scan's abilities. 3 In the Scan Options...
... a copy of the test virus inside a .ZIP compressed file, which itself is the same file, but with a different file name, for details. 20 McAfee® Internet Security Suite®software e Click Save, click the Create New Folder button, then rename the folder VSO Scan Folder. f Double-click VSO Scan Folder, then click Save again in random locations on your hard drive for a more convincing demonstration of Scan's abilities. 3 In the Scan Options...
User Guide
Page 28
... set ActiveShield to scan all files If you cannot disable auto-cleaning of instant message attachments is enabled via the Scan inbound instant message attachments option (Figure 2-1 on page 29). 3 Click All files (recommended), then click OK. 28 McAfee® Internet Security Suite®software If an inbound instant message attachment is detected, VirusScan performs the following steps: Tries to clean the detected message Prompts you to quarantine or delete...
... set ActiveShield to scan all files If you cannot disable auto-cleaning of instant message attachments is enabled via the Scan inbound instant message attachments option (Figure 2-1 on page 29). 3 Click All files (recommended), then click OK. 28 McAfee® Internet Security Suite®software If an inbound instant message attachment is detected, VirusScan performs the following steps: Tries to clean the detected message Prompts you to quarantine or delete...
User Guide
Page 30
To set ActiveShield to use the default Enable ScriptStopper (recommended) option in the creation, copying, or deletion of files, or the opening of e-mails or recipients has been exceeded within a specified interval. Figure 2-4. Advanced ActiveShield Options - The ScriptStopper protection mechanism detects, alerts, and blocks suspect activity. McAfee VirusScan Scanning for scripts VirusScan monitors your computer for suspect activity that might include the following action on...
To set ActiveShield to use the default Enable ScriptStopper (recommended) option in the creation, copying, or deletion of files, or the opening of e-mails or recipients has been exceeded within a specified interval. Figure 2-4. Advanced ActiveShield Options - The ScriptStopper protection mechanism detects, alerts, and blocks suspect activity. McAfee VirusScan Scanning for scripts VirusScan monitors your computer for suspect activity that might include the following action on...
User Guide
Page 33
... the suspect e-mail from being sent and delete it : Click Find out more information to ignore the alert and let the script run once. Using ActiveShield Managing detected e-mail By default, e-mail scanning automatically tries to prevent the suspect script from your message queue. Click Continue what I was cleaned, quarantined, or deleted. Click Stop this script to clean detected e-mail. User Guide 33
... the suspect e-mail from being sent and delete it : Click Find out more information to ignore the alert and let the script run once. Using ActiveShield Managing detected e-mail By default, e-mail scanning automatically tries to prevent the suspect script from your message queue. Click Continue what I was cleaned, quarantined, or deleted. Click Stop this script to clean detected e-mail. User Guide 33
User Guide
Page 36
... option to reveal hidden files within compressed files - Figure 2-8. Scan within .ZIP and other compressed files. Use this option selected. Scan can generally rule out that .ZIP file into another .ZIP file in an effort to the signatures of known viruses, while also looking for new unknown viruses - This option provides the most thorough scan, but is generally slower than a normal scan. 36 McAfee® Internet Security Suite®software...
... option to reveal hidden files within compressed files - Figure 2-8. Scan within .ZIP and other compressed files. Use this option selected. Scan can generally rule out that .ZIP file into another .ZIP file in an effort to the signatures of known viruses, while also looking for new unknown viruses - This option provides the most thorough scan, but is generally slower than a normal scan. 36 McAfee® Internet Security Suite®software...
User Guide
Page 52
... to Open: Lockdown - All Internet connections on non-system ports. The default Windows Firewall log is C:\Windows\pfirewall.log To ensure that traffic will be removed except for previously blocked applications. If you are granting the application Full Access. McAfee Personal Firewall Plus NOTE If both send data and receive unsolicited data on your computer is protected by default, but if you choose to enable both firewalls, you configured to Open without manually enabling Windows...
... to Open: Lockdown - All Internet connections on non-system ports. The default Windows Firewall log is C:\Windows\pfirewall.log To ensure that traffic will be removed except for previously blocked applications. If you are granting the application Full Access. McAfee Personal Firewall Plus NOTE If both send data and receive unsolicited data on your computer is protected by default, but if you choose to enable both firewalls, you configured to Open without manually enabling Windows...
User Guide
Page 53
... access to the Open or Lockdown security setting. Record Intrusion Detection (IDS) Events in the Inbound Events log. The Intrusion Detection System detects common attack types and other suspicious activity. However, you can either change the application's permissions to your computer runs Windows XP and multiple XP users have been added, these to a "signature" database and automatically drops the packets coming from the Internet Applications list. 4 Select...
... access to the Open or Lockdown security setting. Record Intrusion Detection (IDS) Events in the Inbound Events log. The Intrusion Detection System detects common attack types and other suspicious activity. However, you can either change the application's permissions to your computer runs Windows XP and multiple XP users have been added, these to a "signature" database and automatically drops the packets coming from the Internet Applications list. 4 Select...
User Guide
Page 63
... that starts with 0 (0.x.x.x) is deliberately obscuring the origin of activity, so your computer has received a badly formed packet. User Guide 63 This is scanning your Web browser. About the Inbound Events page Understanding events About IP addresses IP addresses are numbers: four numbers each between components. The Internet isn't always 100% reliable, and bad packets can configure many personal E-mail or Web servers through a Web...
... that starts with 0 (0.x.x.x) is deliberately obscuring the origin of activity, so your computer has received a badly formed packet. User Guide 63 This is scanning your Web browser. About the Inbound Events page Understanding events About IP addresses IP addresses are numbers: four numbers each between components. The Internet isn't always 100% reliable, and bad packets can configure many personal E-mail or Web servers through a Web...
User Guide
Page 73
... Recommendations list. When an application has been modified from accessing the Internet. User Guide 73 This alert appears if Personal Firewall blocks an application from one of Windows silent updates, McAfee Personal Firewall alerts appear the next time the Microsoft application is not installed, you can launch McAfee SecurityCenter. This alert appears when Personal Firewall detects Internet or network traffic for online product updates (such as a server. Application Requests Server Access - IMPORTANT You...
... Recommendations list. When an application has been modified from accessing the Internet. User Guide 73 This alert appears if Personal Firewall blocks an application from one of Windows silent updates, McAfee Personal Firewall alerts appear the next time the Microsoft application is not installed, you can launch McAfee SecurityCenter. This alert appears when Personal Firewall detects Internet or network traffic for online product updates (such as a server. Application Requests Server Access - IMPORTANT You...
User Guide
Page 77
... the application temporary Internet access. User Guide 77 Click Help me choose to send a file during a chat. Application Requests Server Access alert For example, an alert appears when MSN Messenger requests server access to view online Help about application access permissions. Access is limited to the time the application launches to prohibit an Internet connection. Click Restrict to Outbound Access to the time it detects that an application you selected Tight security in the Security Settings options, Personal Firewall displays an...
... the application temporary Internet access. User Guide 77 Click Help me choose to send a file during a chat. Application Requests Server Access alert For example, an alert appears when MSN Messenger requests server access to view online Help about application access permissions. Access is limited to the time the application launches to prohibit an Internet connection. Click Restrict to Outbound Access to the time it detects that an application you selected Tight security in the Security Settings options, Personal Firewall displays an...
User Guide
Page 82
... Service Setting up Privacy Service The Setup Assistant allows you cannot use Privacy Service and the Internet. NOTE If your Administrator password and security answer so that you can logon to Privacy Service, and then select Setup Privacy Service. NOTE To cancel configuration, click Cancel. 82 McAfee® Internet Security Suite®software If you cannot logon, you to work properly. Keep your PC manufacturer's documentation. For more information, see Setting up a Pre-installed version...
... Service Setting up Privacy Service The Setup Assistant allows you cannot use Privacy Service and the Internet. NOTE If your Administrator password and security answer so that you can logon to Privacy Service, and then select Setup Privacy Service. NOTE To cancel configuration, click Cancel. 82 McAfee® Internet Security Suite®software If you cannot logon, you to work properly. Keep your PC manufacturer's documentation. For more information, see Setting up a Pre-installed version...
User Guide
Page 90
... word. Changing passwords 1 Select the user whose information you must sign in the Windows system tray, point to modify, and click Lookup. The password can be up to Privacy Service as the Administrator. To modify existing Web site permissions: 1 Right-click the McAfee icon in to 50 characters and can contain uppercase and lowercase letters and numbers. 90 McAfee® Internet Security Suite®software The word...
... word. Changing passwords 1 Select the user whose information you must sign in the Windows system tray, point to modify, and click Lookup. The password can be up to Privacy Service as the Administrator. To modify existing Web site permissions: 1 Right-click the McAfee icon in to 50 characters and can contain uppercase and lowercase letters and numbers. 90 McAfee® Internet Security Suite®software The word...
User Guide
Page 93
... dialog box. Allowing Web sites The Administrator can access all users to the Blocked list. 1 Click Options, and then select Allow List. If a Startup user already exists, you do not have to designate as the Administrator. NOTE Users (including Administrators) that you are in as non-adult users. This overrides Privacy Service's default settings and web sites added to view specific web sites. NOTE You can change the Startup user at any time. For more...
... dialog box. Allowing Web sites The Administrator can access all users to the Blocked list. 1 Click Options, and then select Allow List. If a Startup user already exists, you do not have to designate as the Administrator. NOTE Users (including Administrators) that you are in as non-adult users. This overrides Privacy Service's default settings and web sites added to view specific web sites. NOTE You can change the Startup user at any time. For more...
User Guide
Page 141
... scanning for scripts, 30 scanning for worms, 26 scanning inbound instant message attachments, 28 scanning program files and documents only, 29 starting, 24 stopping, 24 testing, 19 adding an e-mail address to a Friends List, 122 adding e-mail accounts, 107 adding filters, 132 adding users, 87 content blocking, 88 cookie blocking, 88 Internet time limits, 89 administrator, 81, 115 to 116 retrieving password, 83 alerts Application Has Been Modified, 73 Application Requests Internet Access, 73 Application Requests Server Access, 73 Connection...
... scanning for scripts, 30 scanning for worms, 26 scanning inbound instant message attachments, 28 scanning program files and documents only, 29 starting, 24 stopping, 24 testing, 19 adding an e-mail address to a Friends List, 122 adding e-mail accounts, 107 adding filters, 132 adding users, 87 content blocking, 88 cookie blocking, 88 Internet time limits, 89 administrator, 81, 115 to 116 retrieving password, 83 alerts Application Has Been Modified, 73 Application Requests Internet Access, 73 Application Requests Server Access, 73 Connection...
User Guide
Page 144
... firewalls, 51 uninstalling McAfee Privacy Service, 87 from Safe Mode, 83 Update Wizard, 24 updating a Rescue Disk, 44 VirusScan automatically, 47 manually, 47 user options, 100 accepting cookies, 101 changing your password, 100 changing your user name, 100 clearing your cache, 101 rejecting cookies, 102 users adding users, 115 creating passwords, 116 deleting user profiles, 117 editing user profiles, 117 logging on to SpamKiller, 117 switching users, 117 user types, 115 using a Rescue Disk, 44 144 McAfee® Internet Security Suite® software
... firewalls, 51 uninstalling McAfee Privacy Service, 87 from Safe Mode, 83 Update Wizard, 24 updating a Rescue Disk, 44 VirusScan automatically, 47 manually, 47 user options, 100 accepting cookies, 101 changing your password, 100 changing your user name, 100 clearing your cache, 101 rejecting cookies, 102 users adding users, 115 creating passwords, 116 deleting user profiles, 117 editing user profiles, 117 logging on to SpamKiller, 117 switching users, 117 user types, 115 using a Rescue Disk, 44 144 McAfee® Internet Security Suite® software