PRODUCT GUIDE McAfee Inter net Secur ity 5.0 VERSION 5.
COPYRIGHT © 2002 Networks Associates Technology, Inc. and its Affiliated Companies. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means without the written permission of Network Associates, Inc.
McAfee Perpetual End User License Agreement – United States of America NOTICE TO ALL USERS: CAREFULLY READ THE FOLLOWING LEGAL AGREEMENT ("AGREEMENT"), FOR THE LICENSE OF SPECIFIED SOFTWARE ("SOFTWARE") PRODUCED BY NETWORK ASSOCIATES, INC. ("McAfee"). BY CLICKING THE ACCEPT BUTTON OR INSTALLING THE SOFTWARE, YOU (EITHER AN INDIVIDUAL OR A SINGLE ENTITY) CONSENT TO BE BOUND BY AND BECOME A PARTY TO THIS AGREEMENT.
iv 2. Term. This Agreement is effective for an unlimited duration unless and until earlier terminated as set forth herein. This Agreement will terminate automatically if you fail to comply with any of the limitations or other requirements described herein. Upon any termination or expiration of this Agreement, you must cease use of the Software and destroy all copies of the Software and the Documentation. 3. Updates.
c. Warranty Disclaimer. Except for the limited warranty set forth herein, THE SOFTWARE IS PROVIDED "AS IS." TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, MCAFEE DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NONINFRINGEMENT WITH RESPECT TO THE SOFTWARE AND THE ACCOMPANYING DOCUMENTATION.
10. High Risk Activities.
McAfee Perpetual End User License Agreement – Canada NOTICE TO ALL USERS: CAREFULLY READ THE FOLLOWING LEGAL AGREEMENT ("AGREEMENT"), FOR THE LICENSE OF SPECIFIED SOFTWARE ("SOFTWARE") BY NETWORK ASSOCIATES INTERNATIONAL B.V. ("McAfee"). BY CLICKING THE ACCEPT BUTTON OR INSTALLING THE SOFTWARE, YOU (EITHER AN INDIVIDUAL OR A SINGLE ENTITY) CONSENT TO BE BOUND BY AND BECOME A PARTY TO THIS AGREEMENT.
c. viii Volume License Use. If the Software is licensed with volume license terms specified in the applicable price list or product packaging for the Software, you may make, use and install as many additional copies of the Software on the number of Client Devices as the volume license authorizes. You must have a reasonable mechanism in place to ensure that the number of Client Devices on which the Software has been installed does not exceed the number of licenses you have obtained.
a. Limited Warranty. McAfee warrants that for sixty (60) days from the date of original purchase the media (e.g., diskettes) on which the Software is contained will be free from defects in materials and workmanship. b. Customer Remedies.
9. Export Controls. You have been advised that the Software is subject to the U.S. Export Administration Regulations and applicable local export control laws. You shall not export, import or transfer Products contrary to U.S. or other applicable local laws, whether directly or indirectly, and will not cause, approve or otherwise facilitate others such as agents or any third parties in doing so.
Contents 1 Welcome to McAfee Internet Security 5.0 . . . . . . . . . . . . . . . . . . 15 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 What’s included with McAfee Internet Security? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 What’s new in this release? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 About this manual . . . . . . . . . . . . .
Contents Keep your program up-to-date . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38 What Mcafee Internet Security does while your computer is running . . . . . . . . . . . . . . . . . 39 Responding to McAfee Internet Security Alert Messages . . . . . . . . . . . . . . . . . . . . . 39 Using Browser Buddy to manage your web site passwords . . . . . . . . . . . . . . . . . . . 39 Using File Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Contents Frequently asked questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76 Getting Started with McAfee Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78 The Configuration Assistant . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79 The McAfee Firewall Home page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82 Other McAfee Firewall features . . .
Contents Virus Detection and Prevention Tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120 Use a Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121 Tips to maintaining your computer and its software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122 Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Welcome to McAfee Internet Security 5.0 1 The Internet provides a vast wealth of information and entertainment at your fingertips. Yet, as soon as you connect, your computer is exposed to a multitude of privacy and security threats. Protect your privacy and secure your computer and your data with McAfee Internet Security. Incorporating McAfee's award-winning technologies, McAfee Internet Security provides one of the most comprehensive sets of privacy and security tools you can buy.
Welcome to McAfee Internet Security 5.0 What’s included with McAfee Internet Security? 16 n The Administrator: As the Administrator, you are able to set up protection settings for other users of your computer. You can add, edit and delete a user’s profile—then setup individual privacy, security and Internet filtering options that McAfee Internet Security will apply whenever any of these users are browsing the Web through your computer.
Welcome to McAfee Internet Security 5.0 What’s new in this release? This release of McAfee Internet Security includes the following new features and functional enhancements. n Includes VirusScan Home Edition 7 - Includes the latest version of the award winning VirusScan anti-virus software to protect your system from viruses, Trojans, Internet worms, harmful scripts, and other malware. With automated updates and exclusive H.A.W.K.
Welcome to McAfee Internet Security 5.0 n Usability Enhancements - McAfee Internet Security 5.0 includes user interface enhancements to make it easier than ever to protect your online security and privacy. About this manual This manual provides the basic information you need to install, set up and get started with McAfee Internet Security 5.0. More detailed information about how to perform tasks within McAfee Internet Security is provided via online Help.
Welcome to McAfee Internet Security 5.0 McAfee Internet Security features This section briefly describes other features of McAfee Internet Security that protect you from the most common Internet threats. Only the designated administrator or a user with administrative rights can have access to these features which allow them to customize protection settings for themselves and in the case of the Administrator, protection for other profiled users of the same computer.
Welcome to McAfee Internet Security 5.0 n Password Manager stores your Web site login names and passwords for protected Web sites in one secure location. When you are visiting a site that requires this information, you can drag it from Browser Buddy to the form displayed in your browser. No more storing your login names and passwords in an nonsecure location, such as post-it notes on your monitor or in a text file on your Windows desktop. n Browser Buddy is convenient tool with a dual purpose.
2 Installing McAfee Internet Security Before you begin McAfee distributes McAfee Internet Security 5.0 in two formats: 1 As an archived file that you can download from the McAfee web site. 2 On CD-ROM. Although the method you use to transfer files from an archive obtained via download differs from the method you use to transfer files from a CD that is placed in your CD-ROM drive, the installation steps followed after that are the same for both distribution types.
Installing McAfee Internet Security Palm OS and Palm requirements McAfee VirusScan for Palm Desktop with HotSync Manager 3.0 will install and run on any IBM PC or PC-compatible computer equipped with Palm Desktop 3.0 or later. The latest version of Palm Desktop and HotSync 3.0 is a free download from Palm's site (at www.palm.com). The device-resident portion is quite simple and should work on any device with the Palm OS.
Installing McAfee Internet Security Installation steps After inserting the McAfee Internet Security 5.0 installation CD into your computer’s CD-ROM drive, an Autorun image should automatically display. To install McAfee Internet Security software immediately, click Install McAfee Internet Security, then skip to Step 5 to continue with Setup. Use the steps below to install your software.
Installing McAfee Internet Security NOTE If your computer does not have the required fonts to view the End User’s License Agreement (EULA), then you may locate the appropriate EULA on your McAfee software installation CD. You must read and agree to the terms of the agreement to complete your installation. Troubleshooting installation problems A failed installation can cause software problems that are difficult to track down.
Installing McAfee Internet Security 6 In the Windows taskbar, click Start, then click Shut Down. 7 Click Restart the computer, then click Yes in the Shut Down Windows dialog box to restart your PC. Step 3: Clean your hard drive Run the Windows hard drive utilities, ScanDisk and Disk Defragmenter to identify and fix any errors on your hard drive: 1 Click Start on the Windows taskbar, point to Programs, then Accessories, then System Tools, and click ScanDisk.
Installing McAfee Internet Security ... you must log on to your computer using a profile with administrative rights. Then do the following. 1 From the Windows Control Panel, start the Add/Remove applet. 2 Select McAfee Internet Security and click: M Remove to remove McAfee Internet Security from your computer. M Change to modify your McAfee Internet Security installation. 3 Refer to steps displayed on the McAfee Internet Security Installation Wizard to complete your changes.
Getting Started with McAfee Internet Security 5.0 3 McAfee Internet Security is a simple program to use. In fact, this one chapter covers the main things you need to know about using McAfee Internet Security. You begin with answering a few questions via the Interview so that McAfee Internet Security can effectively use its feature to protect you from Internet threats. Introduction The McAfee Internet Security 5.
Getting Started with McAfee Internet Security 5.0 The Title bar and Tool bar Title bar The Home page displays most of your standard Windows elements; that which includes: n The title bar displays the name of the program that is currently running. n Close and minimize buttons. McAfee Internet Security 5.0’s interface is of fixed length and width. You cannot resize the interface. Tool bar The tool bar displays four browser-like buttons that are common to all screens. n Back.
Getting Started with McAfee Internet Security 5.0 M If McAfee Internet Security is not running displays, click Start McAfee Internet Security to start the program. M If McAfee Internet Security is running displays, click Stop McAfee Internet Security to stop the program. n Update status: M If McAfee Internet Security is up-to-date displays, you are using the most current version of McAfee Internet Security 5.0.
Getting Started with McAfee Internet Security 5.0 n Add or remove a user. n Change a user or the Administrator’s settings. The User Settings properties sheet The User Settings property sheet allows the Administrator to configure their own personal settings or any other user’s settings. Self-administrating users can only change their personal settings. There are four tabs on the user settings property sheet Each tab allows you to configure settings - grouped by their classification.
Getting Started with McAfee Internet Security 5.0 n Parental Controls: This page of the Change User Settings property sheet displays for restricted user profiles - only. In other words, this page does not display if the user possesses a self-administrating profile or is the McAfee Internet Security Administrator. Here you will enable or disable parental controls, and set the content ratings for the selected user.
Getting Started with McAfee Internet Security 5.0 The Administrator can print, save or clear this list which contain any of the following: Activity log tab Description Violations w Displays any activity of a profiled user that violates any of the preset protection settings that the Administrator has indicated (e.g., attempting to pass a credit card number). It also displays the day, date and time that the user logon and off on the computer.
Getting Started with McAfee Internet Security 5.0 n Shredder n Safe & Sound (Please note, the link to start this utility displays only if your computer’s operating systems is Windows 98 or Windows Me.). n Visual Trace (You must install McAfee Firewall to see this link). About the McAfee list The McAfee list displays links to start the Home page to any other supported McAfee product. With this release of McAfee Internet Security 5.
Getting Started with McAfee Internet Security 5.0 How to use the McAfee Internet Security Configuration Assistant Although McAfee Internet Security is set up to use security and privacy settings that are appropriate for most users, some features require your input. Each interview screen either tells you about a McAfee Internet Security feature, asks you to enter information, or asks you how you want McAfee Internet Security to respond to certain situations.
Getting Started with McAfee Internet Security 5.0 n For optimal protection by Identity Protector, include all dashes (such as Social Security number, bank account numbers, brokerage accounts, and ATM cards). For example, if you enter 123-45-6789 as your social security number, McAfee Internet Security will recognize the number with or without the dashes. If you enter 123456789, McAfee Internet Security won’t alert you if the number is sent out with dashes (123-45-6789).
Getting Started with McAfee Internet Security 5.0 The Administrator's password As Windows starts, McAfee Internet Security prompts you to enter the password set during the Interview. Without the password, the owner of the Administrator profile cannot log into and start McAfee Internet Security. Although the owner of the Administrator profile cannot log in, users with a self-administrating or restricted user profiles can continue to use McAfee Internet Security normally.
Getting Started with McAfee Internet Security 5.0 To customize protection settings for another user, click the Change user settings task displayed on the McAfee Internet Security Home page, the User Setup screen is displayed. You can add, edit or delete a user’s profile from this screen. Click any of the buttons available and follow through the instructions displayed on screen. Refer to online Help to view more about how to add, edit or delete a user’s profile.
Getting Started with McAfee Internet Security 5.0 Keep your program up-to-date As technologies advance, we continually provide updates to McAfee software products. Updates include new product content, updates to anti-virus signature files, etc. To ensure the highest level of protection, you should always obtain the latest version of your McAfee product. McAfee’s Instant Updater component allows you to obtain and apply updates to your McAfee products while connected to the Internet.
Getting Started with McAfee Internet Security 5.0 What Mcafee Internet Security does while your computer is running While you use your PC, McAfee Internet Security is on the lookout for potential privacy and security problems and takes action when it finds a problem. McAfee Internet Security uses the settings stored in Protection Settings to determine what to monitor and how to react.
Getting Started with McAfee Internet Security 5.0 n Drag your user name or password from Password Manager and drop it on the login form for the Web site. n Add new password information for a Web site. Browser Buddy can also tell you how many cookies have been allowed or rejected by Cookie Blocker and how many times a search information you initiated from one Web site, was blocked by Referer filter and not passed to another Web site.
Getting Started with McAfee Internet Security 5.0 Using File Encryption File encryption translates a file into a “secret” code that makes the file unreadable. You must decode or decrypt the file before you can use it. The file encryption in McAfee Internet Security is designed so that you can easily encrypt or decrypt all of the files that you designate for encryption in File Guardian. Before you can encrypt a file, you must add it to the Guarded Files list in File Guardian.
Getting Started with McAfee Internet Security 5.0 Security Features McAfee Internet Security’s security features safeguard your Internet connection and protect the files on your PC from prying eyes and destructive programs. What Gatekeeper Does Gatekeeper lets you control what programs on your PC can have access to your Internet connection.
Getting Started with McAfee Internet Security 5.0 You can respond to the Internet access alert message in the following ways: If you choose ... Then McAfee Internet Security ... This time only w allows the program to access the Internet this time only and warns you the next time it tries to access the Internet. Allow always w allows the program to access the Internet at any time.
Getting Started with McAfee Internet Security 5.0 If you choose ... Then McAfee Internet Security ... Not this time w prevents the program from starting the other program just this time. This time only w allows the program to start the other program just this time. Any Credit Card Number Goes Out Message When a program sends a number resembling a credit card number over the Internet, an alert message is displayed. You can respond to the alert message in the following ways: If you choose ...
Getting Started with McAfee Internet Security 5.0 Use this option If you ... Any credit card number goes out. w want to be warned before any number that resembles a credit card number is sent out over the Internet. These programs are always allowed access to the Internet w want to see a list of what programs you have allowed to automatically access the Internet. (A program is added to the list when you click Accept Always in the Internet access alert message.
Getting Started with McAfee Internet Security 5.0 You can then decide whether you want to give the program in question access to the file. If you did not run the unauthorized program yourself, you should immediately investigate the program to determine its source. If you choose ... Then McAfee Internet Security ... Allow always w permits the program to open the file and adds the program to the list of programs that are authorized to access the file without further warnings.
Getting Started with McAfee Internet Security 5.0 You can respond to the alert message in the following ways: If you choose ... Not this time Then McAfee Internet Security ... w Stops the ActiveX control from running this time. If you change your mind, reload the page in your browser and click Allow this time the next time McAfee Internet Security displays its ActiveX delete message. This time only w Permits the ActiveX control to delete files just this time.
Getting Started with McAfee Internet Security 5.0 Use this option My drive is being formatted If you ... w want to be warned when any program tries to format any of your drives. An alert message appears whenever you format a floppy disk, other removable media, or hard disk. You may want to turn this option off temporarily if you are going to format a lot of disks and don’t want to see any messages.
Getting Started with McAfee Internet Security 5.0 Privacy Features McAfee Internet Security’s Privacy features protect browsing and personal information that you don’t want anybody to access as a result of your surfing through the Internet. What Cookie Blocker Does Cookies are small files that your Web browser stores on your PC at the request of a Web server. Each time you view a Web page from the Web server, your browser sends the cookie back to the server.
Getting Started with McAfee Internet Security 5.0 You can respond to the alert message in the following ways: If you choose ... Then McAfee Internet Security ... Allow always w accepts the cookie and adds the site to the Allowed list. The next time you go to that site, all cookies from that site are allowed automatically. Never accept w rejects the cookie and adds the site to the Rejected list. The next time you go to that site, all cookies from that site are refused automatically.
Getting Started with McAfee Internet Security 5.0 Why should I change my Cookie Blocker settings? If you want a good level of privacy protection without having to see any Cookie Blocker alert messages, configure your settings to always accept cookies from sites that you visit directly; and to always block cookies from sites that you haven’t visited directly. If you ... Then choose this option. Want the least number of cookies set and highest assurance of privacy.
Getting Started with McAfee Internet Security 5.0 n Block the information from going out. n Display an alert message when any application tries to send the information over the Internet to an unsecure site. This is the response that McAfee Internet Security sets up when you add information to protect in the McAfee Internet Security Interview.
Getting Started with McAfee Internet Security 5.0 A Note About Passwords When McAfee Internet Security asks for your password and you enter it, the password stays in effect until one of the following events takes place. For all Windows operating systems: n You log out of McAfee Internet Security. n You log out of your computer. n You shut down your computer.
Getting Started with McAfee Internet Security 5.0 Responding to the Web Trail Cleaner Alert Message You can respond to the alert message in the following ways. If you choose ... Clean Then McAfee Internet Security ... w Deletes all of the cached files, history and URL information associated with the selected Web site (Domain). Select a site for cleaning by selecting the check box next to the site name. Don’t clean w Closes the Alert message and continues closing your browser.
Getting Started with McAfee Internet Security 5.0 If you have Referer Filter selected in the Security Settings of McAfee Internet Security, it automatically removes search information before you go to another Web site. McAfee Internet Security does not display an alert message for this feature, but you can see the number of times Referer Filter blocks this information in the Browser Buddy.
Getting Started with McAfee Internet Security 5.0 56 McAfee Internet Security 5.
McAfee VirusScan Home Edition 4 Stop viruses and keep your PC safe with McAfee VirusScan! When you're surfing the Internet, there's more to worry about than just viruses. You need to be able to control the communications into and out of your PC to ensure that your computer is safe. VirusScan includes extra firewall protection to keep your computer safe when you're connected to the Internet. VirusScan destroys threats at all entry points to your PC including email and synchronization with your PDA.
McAfee VirusScan Home Edition 58 n Microsoft Office Integration: VirusScan 7 scans Microsoft Office 2000+ documents to provide extra protection to users of Microsoft Word, Excel, and PowerPoint (2000+) in the event that VShield background scanning must be disabled. n Usability enhancements: McAfee VirusScan includes many user interface enhancements to make it easier than ever to keep your computer and electronic files virus free. McAfee Internet Security 5.
McAfee VirusScan Home Edition What comes with McAfee VirusScan? McAfee VirusScan consists of several components that combine one or more related programs, each of which play a part in defending your computer against viruses and other malicious software. These components are: n The VirusScan Home page. This is your central entry point in using all of tasks and components.
McAfee VirusScan Home Edition NOTE Safe & Sound is a VirusScan utility that is only functional when McAfee VirusScan is installed in conjunction with a Windows 98, Windows 98 SE, or Windows Me operating system. n Quarantine. This component allows you to move infected files to a quarantine folder. This moves infected files from areas where they can be accessed and enables you to clean or delete them at your convenience. n The E-mail Scan extension.
McAfee VirusScan Home Edition M SCANPM.EXE, a scanner for 16-bit and 32-bit environments. This scanner provides you with a full set of scanning options for 16-bit and 32-bit protected-mode DOS environments. It also includes support for extended memory and flexible memory allocations. SCAN.EXE will transfer control to this scanner when its specialized capabilities can enable your scan operation to run more efficiently. M SCAN86.EXE, a scanner for 16-bit environments only.
McAfee VirusScan Home Edition Getting Started The McAfee VirusScan Home page is your central entry point to access and use all of McAfee VirusScan’s tasks, wizards, and components. This screen displays three regions that provide you with dynamic information about current status and navigation links to all tasks.
McAfee VirusScan Home Edition n Home. Click Home to go to the McAfee VirusScan Home page from any screen. n Next. In conjunction with the Back button, use Next to go to any previously viewed screen during your current session. n Help. Click Help to view its submenu. The Help submenu may include any of the following items. Help submenu item Select this item to... Help on this page w View online Help for the screen you are currently viewing.
McAfee VirusScan Home Edition The Task pane The Task pane displays links that allow you to start McAfee VirusScan’s Tasks and Advanced Tasks. Depending upon your configuration, the Task pane displays McAfee, links that allow you start the Home page for any other current McAfee product that you have installed in your computer. About Tasks Starting a task is as easy as clicking its link. The Task list allows you to start McAfee VirusScan’s major components.
McAfee VirusScan Home Edition n Configure Instant Updater: Instant Updater is the mechanism used to register your product and to communicate with McAfee to check for an update to virus definition files (DATs), the virus scanning engine, and for updates to the McAfee VirusScan product. Select this advanced task to check for updates to McAfee VirusScan. About the McAfee list The McAfee list displays links to start the Home page to any other supported McAfee product.
McAfee VirusScan Home Edition About VShield Scanner The VShield scanner has unique capabilities that make it an integral part of the VirusScan comprehensive anti-virus software security package. These capabilities include: n On-access scanning: This means that the scanner looks for viruses in files that you open, copy, save, or otherwise modify, and files that you read from or write to floppy disks and network drives.
McAfee VirusScan Home Edition Hostile Activity Watch Kernel HAWK monitors your computer for suspicious activity that may indicate a virus is present on your system. As opposed to VirusScan, which cleans the virus, HAWK prevents viruses, worms, and trojans from spreading further. Hostile Activity Watch Kernel (HAWK) is a VirusScan option that enables constant monitoring for suspicious activity that may indicate a virus is present on your system.
McAfee VirusScan Home Edition n Launch VirusScan to Start McAfee VirusScan, and to enable automatic file protection. n Disable VirusScan to disable automatic file protection. Please note, automatic file protection, by default, restarts without your intervention within 10 minutes of disablement. TIP To maintain the highest level of anti-virus protection, it is not recommended that you disable automatic file protection.
McAfee VirusScan Home Edition Using Quarantine Many VirusScan components allow you to move infected files to a quarantine folder. This moves infected files from areas where they can be accessed and enables you to clean or delete them at your convenience. How to managing quarantined files This list describes the options available to you when managing quarantined files: n Add. Select this option to browse for and quarantine a suspected file. n Clean.
McAfee VirusScan Home Edition TIP You can also attempt to obtain an antidote from A.V.E.R.T. using WebImmune at www.webimmune.net. Network Associates reserves the right to use any information you supply as it deems appropriate without incurring any obligations whatsoever. Safe & Sound Safe & Sound is a unique backup utility that automatically creates backup files of your documents as you work on them.
McAfee VirusScan Home Edition Safe & Sound automatically selects files that are typically important to include in a backup set. However, you can select other files or types of files to include in your backup set. How often should you or safe & sound make these backups? The more recent your backup set, the happier you’ll be if your PC does encounter a problem that compromises the data on your primary drives.
McAfee VirusScan Home Edition Emergency disk creation As it installs itself, VirusScan software will examine your computer’s memory and your hard disk’s boot sectors to verify that it can safely copy its files to your hard disk without risking their infection. During that installation, Setup offers to create an Emergency Disk you can use to start your system in a virus-free environment.
McAfee VirusScan Home Edition Using VirusScan With a Wireless Device Introduction As the demand for wireless devices continue to grow, it carries with it, the threat of compromising your data against viruses especially whenever you exchange information between your PC and your wireless device.
McAfee VirusScan Home Edition Table 4-1.
5 McAfee Firewall Introduction Protect yourself while online with the advanced security of McAfee Firewall. Easy-to-use, yet highly configurable, McAfee Firewall secures your PCs connection to the Internet whether you connect via DSL, cable modem or dial-up.
McAfee Firewall n Password protection: Prevent others from tampering with your firewall settings using password protection. n Improved support for broadband connections. n Usability enhancements: McAfee Firewall 4.0 includes many user interface enhancements to make it easier than ever to secure your computer. How McAfee Firewall works McAfee Firewall is a simple-to-operate security tool that dynamically manages your computing security behind the scenes.
McAfee Firewall McAfee Firewall protects your computer at the network level. It acts as a gatekeeper, checking every data packet going in or out of your PC. It allows only what you tell it to allow. McAfee Firewall has been designed to be easy to use, while providing superior protection. Once you install and run it, it is configured to block known attacks and to ask you before allowing applications to communicate.
McAfee Firewall Inbound Data: No. As long as McAfee Firewall supports a network device and is running, it is intercepting all incoming packets and will allow or block according to the way you have it configured. If you choose to block everything, it will. Outbound Data: Yes and no. McAfee Firewall intercepts outbound data packets as they are passed to the network device driver. All popular applications communicate this way. A malicious program could communicate by other means, however.
McAfee Firewall TIP Previous versions of McAfee Firewall did not allow you to run the Configuration Assistant more than once. However, McAfee Firewall 4.0 allows you to run the Configuration Assistant with an easily accessible link on the McAfee Firewall Home page. The Configuration Assistant Welcome Screen The McAfee Firewall Configuration Assistant displays the first time you start McAfee Firewall. This wizard guides you through initial setup and activates McAfee Firewall on your computer.
McAfee Firewall Table 5-2. McAfee Firewall’s Network Control Settings Internet Traffic Setting Description Filter all traffic Gives you the opportunity to decide whether an application or program in your computer will be allowed to access the Internet. If an unrecognized program attempts to access your computer from the Internet, you will also be given an opportunity to allow or block its access your computer.
McAfee Firewall 1 Access to other shares: check the Allow my computer to access other computer’s shares if you want to allow your computer to have access to the shared drives, directories, folders, and printers, etc. of other computers in your workgroup or home network. 2 Access to my shares: check the Allow other computers to access my shares check box to allow other computers in your workgroup or home network to have access to your shared drives, directories, folders, and printers, etc.
McAfee Firewall The McAfee Firewall Home page The McAfee Firewall main window is your central entry point to all of McAfee Firewall’s Tasks, Advanced Tasks, and shared features. The McAfee Firewall interface displays three regions common to all of McAfee Firewall’s screens. The Title bar and Tool bar Title bar The Home page displays most of your standard Windows elements; that which includes: n The title bar displays the name of the program that is currently running. n Close and minimize buttons.
McAfee Firewall n Next. In conjunction with the Back button, use Next to go to any previously viewed screen during your current session. n Help. Click Help to view its submenu. The Help submenu may include any of the following items. Help submenu item Select this item to... Help on this page w View online Help for the screen you are currently viewing. Contents and index w View online Help for McAfee Firewall.
McAfee Firewall McAfee Firewall status This region of the Home page displays the current running state of McAfee Firewall. It is either running or not running. If the McAfee Firewall status message is... Then... McAfee Firewall is Running w Click Stop McAfee Firewall to disable firewall protection. McAfee Firewall is Stopped w Click Start McAfee Firewall to enable firewall protection.
McAfee Firewall n View network activity: Select this task to view real-time network activity and view your current activity log. n Set alert preferences: Choose how you want McAfee Firewall to notify you when a potential security breach occurs. n Set up Home Networking: Helps make setting up protections for your PCs sharing an Internet connection a breeze. n Perform a security check: This task allows you to start the McAfee Firewall Security Check process.
McAfee Firewall Other McAfee Firewall features McAfee Firewall settings security check Examines your firewall security settings, allowing you to rectify weaker settings before hackers get a chance to exploit them. The McAfee Firewall Settings Security Check flags and suggests changes to help you keep your system set to optimal security. If Security Check detects an issue, click Fix and McAfee Firewall helps you analyze and correct potential problems.
McAfee Firewall n Determine the location of sites and their users, uncover the owners of a site, and help track down the origin of unwanted e-mail messages ('spam'). n Get detailed contact information on sites all over the world (where available). How to start Visual Trace You can start Visual Trace directly from the Windows start menu.
McAfee Firewall Program configuration During your first attempt to start McAfee Firewall, the Configuration Assistant asked you to identify programs that you want to allow to communicate. At such time, McAfee Firewall created a default set of communication rules for the programs (applications); designated as allowed to communicate.
McAfee Firewall Changing a program’s allowed state McAfee Firewall monitors Internet traffic to see which programs are communicating. Depending on your settings, it will allow, block, or filter a program's attempt to communicate. If you choose to “Allow all” programs to communicate through your firewall, then all programs installed in your computer can communicate. To view and configure the current list of trusted programs 1 From the Task list, select Control Internet programs.
McAfee Firewall Refer to the instruction’s displayed on the Custom Filtering rules dialog boxes to complete your custom configuration. 4 Table 5-3. Customize Filtering Rules dialog buttons Button Description Add w Click Add to add a new rule and to display the What do you want this rule to do? dialog. Remove w Click Remove to remove a rule from the selected program. CAUTION: There is no “undo” feature. Edit w Click Edit to refine a filtering rule.
McAfee Firewall Refining conditions After you select the primary function for the rule, you can further refine the rule by checking the check boxes for any or all of the communication characteristics: With... Using... w direction w protocols w domain names w remote ports w IP addresses w local ports To customize the refinement condition, click [click here to select]. Depending upon the communication characteristics selected, various dialog and text boxes display.
McAfee Firewall You can then choose to allow or block NetBIOS over TCP, Identification, ICMP, ARP, DHCP, RIP, PPTP and other protocols (IP and non-IP). Table 5-5. Default Settings for System Activity 92 System Activity Type Description NetBIOS over TCP: Blocked This will block all file share activity over TCP as well as UDP broadcasts. Your system will not appear in anyone's “Network Neighborhood” and theirs will not appear in yours.
McAfee Firewall McAfee Firewall’s Intrusion Detection System Unlike other intrusion detection tools, McAfee Firewall’s powerful Intrusion Detection System (IDS) is simple to configure and activate. Instead of requiring users to learn and understand a complex set of attacks to build their own defense lines against intrusions, McAfee Firewall’s development team created a tool that, when activated with the click of a button, detects common attack types and suspicious activity.
McAfee Firewall Common attacks recognized by IDS The following table lists attacks recognized by McAfee Firewall’s IDS, a description of each attack, and the risk factor assigned to each attack. Attack Description Risk Factor 1234 Also known as the Flushot attack, an attacker sends an oversize ping packet that networking software could not handle. Usually, computers hang or slows down. If a total lockup occurs, unsaved data may be lost.
McAfee Firewall Attack Description Risk Factor Newtear A Denial of Service (DoS) attack that usually causes computers with a Windows NT-based operating system to crash. Although the attack is not usually harmful to the computer itself, data from running applications will most certainly be lost. High Oshare A Denial of Service (DoS) attack caused by sending a unique packet structure to your computer.
McAfee Firewall Attack UDP Flood Description A remote denial of service attack designed to flood the target machine with more data than it can process, thereby preventing legitimate connections from being established. Risk Factor High Machine is inaccessible via TCP/IP. Occurs when machine is put to sleep and then awakened. Make sure that “Load Only When Needed” is not checked in the TCP/IP control panel.
6 McAfee Internet Security’s Shared Features QuickClean Lite Clean your computer with QuickClean Lite QuickClean Lite enables you to clean your computer of unnecessary files and free valuable hard disk space. You can use the QuickClean Lite wizard to perform any of the following cleaning tasks: n Clean your Recycle Bin. n Remove files that accumulate as you browse the Internet. Files of this type are stored in folders called Temporary Internet or Cache folders.
McAfee Internet Security’s Shared Features WARNING Deleted files are not backed up. You cannot restore files deleted by QuickClean Lite. How to start QuickClean Lite There are two methods you can use to start the QuickClean Lite wizard. 1 From any VirusScan Professional screen click the “Other tasks” Task, and select Start QuickClean Lite. 2 From the Windows task bar click the Start button, point to Programs > McAfee > McAfee Shared Features and click QuickClean Lite. If you need help...
McAfee Internet Security’s Shared Features McAfee Shredder Securely delete files using McAfee Shredder When you save a file in Windows, it is stored in multiple pieces (in clusters made up of multiple sectors) on the disk. Windows also saves a road map, or index, that points to these clusters in two copies of the FAT (File Allocation Table). The FAT contains the directions to all the pieces of your files, so that applications can find them again later.
McAfee Internet Security’s Shared Features McAfee Shredder allows you to shred files on your PC’s Recycle Bin, Temporary Internet, as well as Web site history folder. You can also specify the number of shredding passes (1-99) and can now have the option to shred an entire drive. TIP If your computer is running on Windows Me, some files even if shred, may be retained on your PC since these are protected by the Windows Me System Restore.
7 Updating McAfee Internet Security About Instant Updater As technologies advance, we continually provide updates to McAfee software products. To ensure the highest level of protection, you should always obtain the latest version of your McAfee product. Updating your software is simple using McAfee's Instant Updater. It is a seamless process and requires minimal interaction on your part. Instant Updater is also the mechanism used to register your product with McAfee.
Updating McAfee Internet Security n Auto Inquiry: If Auto Inquiry is enabled, it allows you to receive notification of product updates while connected to the Internet. We do not recommend Auto Inquiry if you have slow internet connection n Manual Updating: If you rarely connect to the Internet, you may prefer to use Manual Updating with your McAfee product. You can manually update while connected to the Internet. To do this, select the UPDATE function from within the individual product.
How to contact McAfee A www.McAfee-at-Home.com McAfee is famous for its dedication to customer satisfaction. We have continued this tradition by making our site on the World Wide Web a valuable resource for answers to your questions about McAfee Consumer Products. We encourage you to visit us at http://www.mcafee-at-home.com and make this your first stop for all of your product support needs.
How to contact McAfee n Windows operating system version number n Amount of memory (RAM) n Complete description of the problem n EXACT error message as on screen n What steps were performed prior to receiving error message? n Is the error persistent; can you duplicate the problem n Model name of hard disk (internal / external) n Extra cards, boards, or hardware Virus definition renewal McAfee VirusScan includes twelve (12) months of free virus protection updates obtained using Instant Update
Internet Security and Privacy B This chapter provides some background information that will help you understand Internet security and privacy threats, and discusses strategies for using McAfee Internet Security to protect yourself and your computer. Networks and the Internet A computer network links individual computers together so they can share data and resources.
Internet Security and Privacy Why packets? Why go through all this trouble, breaking data down into packets? The answer lies in the origins of TCP/IP. Like the Internet itself, it is a product of the Cold War. The United States Department of Defense originally developed the Internet. It was designed to ensure secure communications, even with multiple communications network failures anticipated in the event of a nuclear war.
Internet Security and Privacy About Privacy and Security on the Web Before the advent of the Web, Internet security usually posed a problem only for system administrators trying to keep meddlesome hackers away from their systems. When the Web arrived, the popularity of the Internet skyrocketed.
Internet Security and Privacy Snooping and Sniffing Since its inception, the Internet has been (and largely remains) an open network. Openness means that information on the Internet travels without any special security: Anyone who can monitor network traffic can intercept it. This sort of monitoring is called “sniffing,” and is easy to perform using “sniffers.” Sniffers are programs (or hardware devices) designed to monitor data traveling over a network.
Internet Security and Privacy When you visit an SSL-secured site, the latest versions of Netscape Communicator and Microsoft Internet Explorer use a visual cue to tell you that the site is secure. For more information, see How can I tell if a Web site is secure? TIP McAfee Internet Security’s Security Check lets you know if your Web browser is up-to-date. The latest browser versions usually offer an enhanced degree of security.
Internet Security and Privacy Certificates are Microsoft technologies designed to guarantee a person’s identity and Web site security. Personal certificates verify that you are who you claim to be. Web site certificates verify that a Web site is secure and what it claims to be (so Web sites can’t falsify their identity). When you open a Web site that has a certificate, Internet Explorer checks if the certificate is correct. If the certificate is not OK, Internet Explorer warns you.
Internet Security and Privacy Security on the Web One of the most exciting Web developments is the evolution of downloadable, executable programs. Java and ActiveX are two tools that help developers create programs that can “live” inside Web pages, and use your Web browser to automatically run over the Internet. Java allows Web pages to host small programs called “applets.” When Java-enabled browsers access a Web page containing Java, they automatically download and run the applets they find on the page.
Internet Security and Privacy Computer Viruses and the Web A computer virus is a small computer program that automatically replicates itself and spreads from one computer to another. Viruses may infect programs, your hard drive, and even some document files that employ macros. Viruses do not infect data files, but they can create problems that prevent you from accessing your data. Viruses are not accidents—they are always created by computer programmers.
Internet Security and Privacy n Macro viruses: Macro viruses are contained in document files, such as Microsoft Word or Excel files. These files can contain macros that can automate your work—but macros can also be written to do damage to your PC. Macro viruses are activated when you open an infected document file. n A final word should be said about hoax “viruses,” which are not viruses in the strictest sense of the term.
Internet Security and Privacy A virus might be hidden in the next file you download, or on a diskette you borrow —even diskettes purchased at a store. Downloaded shareware is also a source of infection. Although Java and ActiveX are not, strictly speaking, viruses (i.e., it can’t spread and replicate), they can still harm your PC. McAfee Internet Security’s default settings allow it to monitor all Java and ActiveX activity on your PC, and warn you before something potentially dangerous occurs.
Internet Security and Privacy Information about the items you add to the shopping basket is stored in a cookie on your computer because the Internet browser cannot retain information that you entered in one Internet page when you switch to another Internet page. The cookie saves information about your purchases and allows the site to create a final order form for you.
Internet Security and Privacy 116 McAfee Internet Security 5.
Your McAfee Internet Security To-do List C After you finish installing McAfee Internet Security, and you have completed the preliminary setup using the Configuration Assistant, you will want to create and customize all of your user profiles. The purpose of this section is to guide you through the customization process.
Your McAfee Internet Security To-do List Conversely, cookies can record “what you did” on a particular Web site. For example, you visit one of the major search engine’s Web site and shop for an automobile. You revisit the same Web site a few days later and shop for an automobile again. The following week, you turn on your computer and go directly the same Web site. This time you’re looking for the local weather forecast. As the page loads into memory, there are ads for autos all over the screen.
Your McAfee Internet Security To-do List n Improve your Internet browsing experience by preventing ads and pop-up windows from displaying. n Shield younger family members from distasteful or undesirable content. Users of the Internet, at all age levels can exposed to inappropriate Web site content. A simple typographical error in the text box of your favorite search engine could return graphic gore, rather than cartoons; or pornography, rather than recipes.
Your McAfee Internet Security To-do List Virus Detection and Prevention Tips Although far from harmless, most viruses that infect your personal computer or laptop will not destroy data, play pranks, or render your computer unusable. Even the comparatively rare viruses that do carry a destructive payload usually produce their nasty effects in response to a trigger event. In most cases, unless you actually see evidence of a payload that has activated, you will have time to deal with the infection properly.
Your McAfee Internet Security To-do List n Update your anti-virus software regularly. These updates should be at the least the product's virus signature files (DATs). You may also need to update the scanning engine as well. n Back up your files on a regular basis. If a virus destroys your files, at least you can replace them with your back-up copy. You should store your backup copy in a separate location from your work files, one that is preferably not on your computer.
Your McAfee Internet Security To-do List n If you allow your computer to run 24 hours per day, then configure your Firewall to block communication while you are away from the desk. n Check for an update your software frequently, and configure it to notify you if there is an update available. n Review your activity logs periodically. If the logs display suspicious activity, or frequent violations, investigate the activity.
Index Web trail cleaner, 54 Authentication, 109 Automatic Protection Settings, Start and Stop, 67 Numerics 1234 Attack, 94 A About Advanced tasks, 64, 85 McAfee list, 33, 65, 85 Tasks, 29, 64, 84 ActiveX Applets, 111 discussed, 111 Activity Logs, 16, 37 Activity logs, 64 Administrator profile, 15 to 16, 19, 30 to 32, Autorun, 23 B Back orifice, 94 Bonk, 94 Boot virus, 112 Bootable CD, 60 BOOTSCAN.
Index SynDrop, 95 Teardrop, 95 UDP Flood, 96 Fraggle, 94 Frequently asked questions About Internet security, Winnuke, 96 Configuration Assistant, 32, 34, 76, 79 Access to shares, 80 Allowed applications, 81 Network control settings, 79 Startup options, 80 About McAfee Firewall, G Gatekeeper, 19, 42 Alert Messages, 42 Settings, 44 Cookie Blocker, 19, 49 Copyright Information, ii Custom filtering rules, 89 Customer Service, 103 H HAWK, 59 Hoax virus, 113 Hostile Activity Watch Kernel, 59 How to Configu
Index Forgotten, 36 Lost, 122 Password Manager, L LAN, 105 Land, 94 Lost Administrator password, M Macro virus, 113 Manage passwords, 39 Master Boot Record virus, 112 McAfee Firewall, 20 McAfee Guardian, 20 McAfee Guardian shortcut menu, McAfee Instant Updater, 101 McAfee list, 33, 65, 85 McAfee QuickClean Lite, 97 McAfee Shredder, 99 McAfee VirusScan, 20 48 user, 30 Using Browser Buddy, 39 Web site login, 34 PDA Devices supported, 73 Perform a security check, 31 36 39 Ping flood, 95 Ping of death,
Index Password Manager, 20 Security Check, 16 Self-Administrating users, 35 Server-side nuking, 78 Set Startup Options, 32 Smurf, 95 Spyware, 121 Stealth program, 121 Symbian EPOC, 22 Syn flood, 95 synDrop, 95 System Requirements, Desktop, 21 Wireless Devices, System settings, 91 21 21 Uninstalling, 25 Updating your product, User Setup, 36 38 V View Activity Log, 31 Virus Definition Renewal, Viruses Types of, 112 104 VirusScan scan engine, 60, 65, 72, 101 VShield Scanner, 59, 66 Control Panel applet,
Index Product Guide 127
For more information on products, worldwide services, and support, contact your authorized McAfee sales representative or visit us at: Network Associates 13465 Midway Road Dallas, TX 75244 (972) 308-9960 www.mcafee-at-home.