Product guide
Remove or restore the quarantined item ........................ 31
Update the anti-malware and DAT files ......................... 31
Perform a system scan ............................... 32
Configure custom scan tasks ............................. 32
Create a scan task .............................. 32
Modify an existing scan task .......................... 33
Remove an existing scan schedule ........................33
4 Configuring protection preferences on a standalone Mac 35
General preferences ................................ 35
Configure general preferences ......................... 35
Anti-malware ................................... 36
Configure on-access scan preferences ...................... 36
Configure on-demand scan preferences ......................37
Define anti-malware exclusions ......................... 38
Best practices for anti-malware preferences ....................38
Application protection ................................39
Configure preferences for application protection .................. 39
Create an application protection rule .......................40
Modify an existing application protection rule ................... 41
Reapply rules for modified applications ......................41
Specify exclusions for application protection ....................41
Best practices for application protection ..................... 42
Desktop firewall .................................. 43
How stateful filtering works .......................... 44
How regular mode firewall protection works ....................44
How Adaptive mode firewall protection works ................... 45
How DNS blocking works ........................... 46
How stateful FTP inspection works ........................46
How desktop firewall rules work .........................47
How desktop firewall rules are organized ..................... 48
Create a firewall rule ............................. 49
Desktop firewall rules examples .........................51
Best practices for desktop firewall ........................53
Configure an update schedule .............................54
Configure the repository list .......................... 54
Configure proxy settings ............................54
Configure the anti-malware update schedule ....................55
5 Managing the software with ePolicy Orchestrator 57
Manage policies .................................. 57
Create or modify policies ........................... 58
Assign policies ................................58
Create a self-protection policy ............................ 59
Create an anti-malware policy ............................ 59
Schedule an anti-malware update ........................... 61
Schedule an on-demand scan .............................62
Create an application protection policy ......................... 63
Desktop firewall policy ............................... 64
Create a desktop firewall policy .........................64
Create firewall rules ............................. 65
Create a rule group and move rules to the group ..................66
Create a DNS blocking policy .............................67
Create a trusted networks policy ........................... 67
Create a location awareness policy ...........................68
Queries and reports .................................69
Contents
4
McAfee Endpoint Protection for Mac 2.1.0 Product Guide