McAfee Guard Dog User Manual

McAfee Guard Dog
User’s Guide
COPYRIGHT
Copyright © 1999 Network Associates, Inc. and its Affiliated Companies. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means without the written permission of Network Associates, Inc.
NOTICE TO ALL USERS: CAREFULLY READ THE FOLLOWING LEGAL AGREEMENT ("AGREEMENT"), FOR THE LICENSE OF SPECIFIED SOFTWARE ("SOFTWARE") BY NETWORK ASSOCIATES, INC. ("McAfee"). BY CLICKING THE ACCEPT BUTTON OR INSTALLING THE SOFTWARE, YOU (EITHER AN IND IVIDUAL OR A SINGLE ENTITY) CONSENT TO BE BOUND BY AND BECOME A PARTY TO THIS AGREEMENT. IF YOU DO NOT AGREE TO ALL OF THE TERMS OF THIS AGREEMENT, CLICK THE BUTTON THAT INDICATES THAT YOU DO NOT ACCEP T THE TERMS OF TH IS AGREEMENT AND DO NOT INSTALL THE SOFTWARE. (IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO THE PLACE OF PURCHASE FOR A FULL REFUND.)
1. License Grant. Subject to the payment of the appl icable license fees, and subject to the
terms and conditions of this Agreement, McAfee hereby grants to you a non-exclusive, non-transferable right to use one copy of the specified version of the Software and the accompanying documentation (the "Documentati on"). You may in stall one copy of the Software on one computer, workstation, personal digital assistant, pager, "smart phone" or other electronic device for which the Software was designed (each, a "Client Device"). If the Software is licensed as a suite or bundle with more than one specified Software product, this license applies to all such specified Software products, subject to any restrictions or usage terms specified on the applicable price list or product packaging that apply to any of such Softwa re products individually.
a. Use. The Software is licensed as a single product; it may not be used on more than one
Client Device or by more than one user at a time, except as set forth in this Section 1. The Software is "in use" on a Client Device when it is loaded into the temporary memory (i.e., random-access memory or RAM) or installed into the permanent memory (e.g., hard disk, CD-ROM, or other storage device) of that Client Device. This license authorizes you to make one copy of the Software solely for backup or archival purposes, provided that the copy you make contains all of the Software's proprietary notices.
b. Server Use. You may use the Software on a Client Device as a server ("Server") within
a multi-user or networked environment ("Server-Mode") only if such use is permitted in the applicable price list or product packaging for the Software. A separate license is required for each Client Device or "seat" that may connect to the Server at any time, regardless of whether such licensed Client Devices or seats are concurrently connected to, accessing or using the Software. Use of software or hardware that reduces the number of Client Devices or seats directly accessing or utilizing the Software (e.g., "multiplexing" or "pooling" software or hardware) does not reduce the number of licenses required
Issued May 1999 / McAfee Guard Dog
(i.e., the required number of licenses would equal the number of distinct inputs to the multiplexing or pooling software or hardware "front end"). If the number of Client Devices or seats that can connect to the Software can exceed the number of licenses you have obtained, then you must have a reasonable mechanism in place to ensure that your use of the Software does not exceed the use limits specified for the licenses you have obtained. This license authorizes you to make or download one copy of the Documentation for each Client Device or seat that is licensed, provided that each such copy contains all of the Documentation’s proprietary notices.
c. Volume Licenses. If the Soft ware is licensed with volume licens e terms specified in the
applicable price list or product packaging for the Software, you may make, use and install as many additional copies of the Software on the number of Client Devices as the volume license authorizes. You must have a reasonable mechanism in place to ensure that the number of Client Devices on which the Software has b een installed does not exceed the number of licenses you have obtained. This license authorizes you to make or download one copy of the Documentation fo r each additional copy authorized by the volume license, provided that each such copy contains all of the Documentation’s proprietary notices.
2. Term. This Agreement is effective for an unlimited duration unless and until earlier
terminated as set forth herein. This Agreement will terminate automatically if you fail to comply with any of the limitations or other requirements described herein. Upon any termination or expiration of this Agreement, you must destroy all copies of the Software and the Documentation. You may terminate this Agreement at any point by destroying all copies of the Software and the Documentation.
3. Updates. For the time period specified in the applicable price list or product packaging for
the Software you are entitled to download revisions or updates to the Software when and as McAfee publishes them via its electronic bulletin board system, website or through other online services. For a period of ninety (90) days from the date of the original purchase of the Software, you are entitled to download one (1) revision or upgrade to the Software when and as McAfee publishes it via its electronic bulletin board system, website or through other online services. After the specified time period, you have no further rights to receive any revisions or upgrades without purchase of a new license or annual upgrade plan to the Software.
4. Ownership Rights. The Software is protected by United States copyright laws and
international treaty provisions. McAfee and its suppliers own and retain all right, title and interest in and to the Software, including all copyrights, patents, trade secret rights, trademarks and other intellectual property rights therein. Your possession, installation, or use of the Software does not transfer to you any title to the intellectual property in th e Software, and you will not acquire any rights to the Software except as expressly set forth in this Agreement. All copies of the Software and Documentation made hereunder must contain the same proprietary notices that appear on and in the Software and Documentation.
User’s Guide iii
5. Restrictions. You may not rent, lease, loan or resell the Software. You may not permit
third parties to benefit from the use or functionality of the Software via a timesharing , service bureau or other arrangement, except to the extent such use is specified in the applicable list price or product packaging for the Software. You may not transfer any of the rights granted to you under this Agreement. You may not reverse engineer, decompile, or disassemble the Software, except to the extent the foregoing restriction is expressly prohibited by applicable law. You may not modify, or create derivative works based upon, the Software in whole or in part. You may not copy the Software or Documentation except as expressly permitted in Section 1 above. You may not remove any proprietary notices or labels on the Software. All rights not expressly set forth hereunder are reserved by McAfee. McAfee reserves the right to periodically conduct audits upon advance written notice to verify compliance with the terms of this Agreement.
6. Warranty and Disclaimer a. Limited Warranty. McAfee warrants that for sixty (60) days from the date of original
purchase the media (e.g., diskettes) on which the Software is contained will be free from defects in materials and workmanship.
b. Customer Remedies. McAfee’s and its suppliers’ entire liability and your exclusive
remedy for any breach of the foregoing warran ty shall be, at McA fee’s option , e ither (i) return of the purchase price paid for the license, if any, or (ii) replacement of the defective media in which the Software is contained. You must return the defective media to McAfee at your expense with a co py of your receipt. This limited w arranty is void if the defect has resulted from accident, abuse, or misapplication. Any replacement media will be warranted for the remainder of the original warranty period. Outside the United States, this remedy is not available to the extent McAfee is subject to restrictions under United States export control laws and regulations.
c. Warranty Disclaimer. Except for the limited warranty set forth herein, THE
SOFTWARE IS PROVIDED "AS IS." TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, MCAFEE DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NONINFRINGEMENT WITH RESPECT TO THE SOFTWARE AND THE ACCOMPANYING DOCUMENTATION. YOU ASSUME RESPONSIBILITY FOR SELECTING THE SOFTWARE TO ACHIEVE YOUR INTENDED RESULTS, AND FOR THE INSTALLATION OF, USE OF, AND RESULTS OBTAINED FROM THE SOFTWARE. WITHOUT LIMITING THE FOREGOING PROVISIONS, MCAFEE MAKES NO WARRANTY THAT THE SOFTWARE WILL BE ERROR-FREE OR FREE FROM INTERRUPTIONS OR O THER FAILURES OR THAT THE SOFT WARE WILL MEET YOUR REQUIREMENTS. SOME STATES AND JURISDICTIONS DO NOT ALLOW LIMITATIONS ON IMPLIED WARRANTIES, SO THE ABOVE LIMITATION MAY NOT APPLY TO YOU. The foregoing provisions shall be enforceable to the maximum extent permitted by applicable law.
iv McAfee Guard Dog
7. Limitation of Liability. UNDER NO CIRCUMSTANCES AND UNDER NO LEGAL THEORY, WHETHER IN TORT, CONTRACT, OR OTHERWISE, SHALL MCAFEE OR ITS SUPPLIERS BE LIABLE TO YOU OR TO ANY OTHER PERSON FOR ANY INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES OF ANY CHARACTER INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF GOODWILL, WORK STOPPAGE, COMPUTER FAILURE OR MALFUNCTION, OR FOR ANY AND ALL OTHER DAMAGES OR LOSSES. IN NO EVENT WILL MCAFEE BE LIABLE FOR ANY DAMAGES IN EXCESS OF THE LIST PRICE MCAFEE CHARGES FOR A LICENSE TO THE SOFTWARE, EVEN IF MCAFEE SHALL HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. THIS LIMITATION OF LIABILITY SHALL NOT APPLY TO LIABILITY FOR DEATH OR PERSONAL INJURY TO THE EXTENT THAT APPLICABLE LAW PROHIBITS SUCH LIMITATION. FURTHERMORE, SOME STATES AND JURISDICTIONS DO NOT ALLOW THE EXCLUSION OR LIMITATION OF INCIDENTAL OR CONSEQUENTIAL DAMA GES, SO THIS LIMITATION AND EXCLUSION MAY NOT APPLY TO YOU. The foregoing provisions shall be enforceable to the ma ximum extent permitted by applicable law.
8. United States Government. The Software and accompanying Documentation are deemed to be "commercial computer software" and "commercial computer software documentation," respectively, pursuant to DFAR Section 227.7202 and FAR Section
12.212, as applicable. Any use, modification, reproduction, release, performance, display or disclosure of the Software and accompanying Documentation by the United States Government shall be governed solely by the terms of this Agreement and shall be prohibited except to the extent expressly permitted by the terms of this Agreement.
9. Export Controls. Neither the Software nor the Documentation and underlying information or technology may be downloaded or otherwise exported or re-exported (i) into (or to a national or resident of ) Cuba, Iran, Iraq, Libya, North Korea, Sudan, Syria or any other country to which the United States has embargoed goods; or (ii) to anyone on the United States Treasury Department’s list of Specially Designated Nations or the United States Commerce Department’s Table of Denial Orders. B y downloading or using the Software you are agreeing to the foregoing and you are certifying that you are not located in, under the control of, or a national or resident of any such country or on any such list.
IN ADDITION, YOU SHOULD BE AWARE OF THE FOLLOWING: EXPORT OF THE SOFTWARE MAY BE SUBJECT TO COMPLIANCE WITH THE RULES AND REGULATIONS PROMULGATED FROM TIME TO TIME BY THE BUREAU OF EXPORT ADMINISTRATION, UNITED STATES DEPARTMENT OF COMMERCE, WHICH RESTRICT THE EXPORT AND RE-EXPORT OF CERTAIN PRODUCTS AND TECHNICAL DATA. IF THE EXPORT OF THE SOFTWARE IS CONTROLLED UNDER SUCH RULES AND REGULATIONS, THEN THE SOFTWARE SHALL NOT BE EXPORTED OR RE-EXPORTED, DIRECTLY OR INDIRECTLY, (A) WITHOUT ALL EXPORT OR RE-EXPORT LICENSES AND UNITED STATES OR OTHER GOVERNMENTAL APPROVALS REQUIRED BY ANY APPLICABLE LAWS, OR (B) IN VIOLATION OF ANY APPLICABLE PROHIBITION AGAINST THE EXPORT OR RE-EXPORT OF ANY PART OF THE SOFTWARE.
User’s Guide v
SOME COUNTRIES HAVE RESTRICTIONS ON THE USE OF ENCRYPTION WITHIN THEIR BORDERS, OR THE IMPORT OR EXPORT OF ENCRYPTION EVEN IF FOR ONLY TEMPORARY PERSONAL OR BUSINESS USE. YOU ACKNOWLEDGE THAT THE IMPLEMENTATION AND ENFORCEMENT OF THESE LAWS IS NOT ALWAYS CONSISTENT AS TO SPECIFIC COUNTRIES. ALTHOUGH THE FOLLOWING COUNTRIES ARE NOT AN EXHAUSTIVE LIST THERE MAY EXIST RESTRICTIONS ON THE EXPORTATION TO, OR IMPORTATION OF, ENCRYPTION BY: BELGIUM, CHINA (INCLUDING HONG KONG), FRANCE, INDIA, INDONESIA, ISRAEL, RUSSIA, SAUDI ARABIA, SINGAPORE, AND SOUTH KOREA. YOU ACKNOWLEDGE IT IS YOUR ULTIMATE RESPONSIBILITY TO COMPLY WITH ANY AND ALL GOVERNMENT EXPORT AND OTHER APPLICABLE LAWS AND THAT MCAFEE HAS NO FURTHER RESPONSIBILITY AFTER THE INITIAL SALE TO YOU WITHIN THE ORIGINAL COUNTRY OF SALE.
10.High Risk Activities. The Software is not fault-tolerant and is not designed or intended for use in hazardous environments requiring fail-safe performance, including without limitation, in the operation of nuclear facilities, aircraft navigation or communication systems, air traffic control, weapons systems, direct life-support machines, or any other application in which the failure of the Software could lead directly to death, personal injury, or severe physical or property damage (collectively, "High Risk Activities"). McAfee expressly disclaims any express or implied warranty of fitness for High Risk Activities.
11. Miscellaneous. This Agreement is governed by the laws of the United States and the State of California, without reference to conflict of laws principles. The application of the United Nations Convention of Contracts for the International Sale of Goods is expressly excluded. This Agreement sets forth all rights for the user of the Software and is the entire agreement between the parties. This Agreement supersedes any other communications with respect to the Software and Documentation. This Agreement may not be modified except by a written addendum issued by a duly authorized representative of McAfee. No provision hereof shall be deemed waived unless such waiver shall be in writing and signed by McAfee or a duly authorized representative of McAfee. If any provision of this Agreement is held invalid, the remainder of this Agreement shall continue in full force and effect. The parties confirm that it is their wish that this Agreement has been written in the English languag e only.
12.McAfee Customer Contact. If you have any questions concerning these terms and conditions, or if you would like to contact McAfee for any other reason, please call (408) 988-3832, fax (408) 97 0-9727, or write: McAfee Softwa re, 3965 Freedom Circle, Santa Clara, California 95054. http://www.mcafee.com.
Statements made to you in the course of this sale are subject to the Year 2000 Information and Readiness Disclosure Act (Public Law 105-271). In the case of a dispute, this Act may reduce your legal rights regarding the use of any statements regarding Year 2000 readiness, unless otherwise specified in your contract or tariff.
vi McAfee Guard Dog
Table of Contents
Chapter 1. Welcome to Guard Dog™ . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1
Guard Dog and the Internet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1
How Guard Dog works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1
Guard Dog and your Internet Connection . . . . . . . . . . . . . . . . . . . . . . . . .1
What Internet problems Guard Dog solves . . . . . . . . . . . . . . . . . . . . . . . .2
What’s new in Guard Dog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3
About Guard Dog documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4
How this book is organized . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5
Using Guard Dog help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5
Chapter 2. Installing Guard Dog™ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7
System requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7
Installing Guard Dog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8
Troubleshooting installation problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9
Step 1: Clean up your hard drive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9
Step 2: Remove temporary files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10
Step 3: Close other software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11
Installing other software from the Guard Dog CD . . . . . . . . . . . . . . . . . . . . . .11
Chapter 3. Quick Tour of Guard Dog™ . . . . . . . . . . . . . . . . . . . . . . . . . . .13
Viewing the Guard Dog video . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13
Using the Guard Dog interview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13
What information does Guard Dog ask me to enter? . . . . . . . . . . . . . . .14
Why should I create an Emergency Disk? . . . . . . . . . . . . . . . . . . . . . . .15
How password protection effects using Guard Dog . . . . . . . . . . . . . . .16
Using the Guard Dog Home screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17
Opening and closing the Guard Dog Home screen . . . . . . . . . . . . . . . .18
Performing a CheckUp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19
Updating Guard Dog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20
Viewing the Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20
What Guard Dog does while your PC is running . . . . . . . . . . . . . . . . . . . . . . .21
Using the Guard Dog shortcut menu . . . . . . . . . . . . . . . . . . . . . . . . . . .21
User’s Guide vii
Table of Contents
Responding to Guard Dog alert messages . . . . . . . . . . . . . . . . . . . . . . .22
Using Browser Buddy to retrieve or store your Web site passwords .23
Using file encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .25
Chapter 4. Customizing Guard Dog™ . . . . . . . . . . . . . . . . . . . . . . . . . . . .27
Restarting the Interview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27
Changing Protection Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27
Preferences settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .29
Scheduling Guard Dog actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .29
Changing CheckUp Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .32
Chapter 5. Privacy Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .35
What Cookie Blocker does . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .35
Responding to a Cookie Blocker alert message . . . . . . . . . . . . . . . . . .36
Why should I change my Cookie Blocker settings? . . . . . . . . . . . . . . .37
What Identity Protector does . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .37
Responding to an Identity Protector alert message . . . . . . . . . . . . . . .38
Why should I change my Identity Protector settings? . . . . . . . . . . . . .39
What Web Trail Cleaner does . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .39
Responding to the Web Trail Cleaner alert message . . . . . . . . . . . . . .40
Why should I change my Web Trail Cleaner settings? . . . . . . . . . . . . .41
What Search Filter does . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .41
Chapter 6. Security Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .43
What Gatekeeper does . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .43
Responding to a Gatekeeper alert messages . . . . . . . . . . . . . . . . . . . . .43
Why should I change my Gatekeeper settings? . . . . . . . . . . . . . . . . . . .45
What File Guardian does . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .46
Responding to a File Guardian alert messages . . . . . . . . . . . . . . . . . . .47
Why should I change my File Guardian settings? . . . . . . . . . . . . . . . . .49
What Password Manager does . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .50
Chapter 7. Using AntiVirus Features . . . . . . . . . . . . . . . . . . . . . . . . . . . .53
Looking for viruses with CheckUp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .53
Continuing virus protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .53
What Virus Sentry does . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .54
viii McAfee Guard Dog
Table of Contents
Responding to a Virus Sentry alert message . . . . . . . . . . . . . . . . . . . . .54
Why should I change my Virus Sentry settings? . . . . . . . . . . . . . . . . . .54
Keeping virus protection up-to-date . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .57
Appendix A. Internet Security and Privacy . . . . . . . . . . . . . . . . . . . . . . .59
Networks and the Internet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .59
TCP/IP is the subsystem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .59
Why packets? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .60
The Internet and the Web…what is the difference? . . . . . . . . . . . . . . . .60
Privacy and security on the Web . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .61
Why does Internet privacy matter to me? . . . . . . . . . . . . . . . . . . . . . . . .61
Privacy on the Web . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .62
Who is snooping? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .62
Snooping and sniffing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .62
Web servers and firewalls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .62
What can I do to keep my stuff safe? . . . . . . . . . . . . . . . . . . . . . . . . . . . .63
How can I tell if a Web site is secure? . . . . . . . . . . . . . . . . . . . . . . . . . . .63
How does encryption work? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .64
Security on the Web . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .65
Nasty applets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .66
Can I prevent programs from accessing the Internet? . . . . . . . . . . . . . .66
Computer viruses and the Web . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .66
Are viruses really that dangerous? . . . . . . . . . . . . . . . . . . . . . . . . . . . . .67
Types of viruses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .67
How can my PC become infected with a virus? . . . . . . . . . . . . . . . . . . .68
Frequently asked questions about Internet privacy . . . . . . . . . . . . . . . . . . . .68
Sources for Internet privacy and security information . . . . . . . . . . . . . . . . . .70
Finding out about Internet hoaxes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .70
More information about computer viruses . . . . . . . . . . . . . . . . . . . . . . .70
More information about security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .71
More information about privacy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .71
Appendix B. Product Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .73
How to Contact McAfee . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .73
Customer service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .73
User’s Guide ix
Table of Contents
Technical support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .74
McAfee training . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .74
x McAfee Guard Dog
1Welcome to Guard Dog
Guard Dog and the Internet
In the last few years the Internet has changed from a communications network
used almost exclusively by governments and universities to an information
treasure house used by people of all ages and occupations. With an Internet
account you can send electronic mail (e-mail) around the world in seconds, do
research without leaving home, meet new friends in an online chat room, or
shop without getting out of your bathrobe. However, with all this potential
comes a certain element of risk. When you use the Internet, information is
transmitted from your computer to other computers in the
Internet—information you may not want people to have. And those
computers can also send files to your computer. While most of these files are
harmless, some can invade your privacy or even damage the data on your
computer’s hard drive.
1
How Guard Dog works
There are two main ways that Guard Dog protects you:
You can find any potential privacy, security, and virus threats that exist on your PC by performing a CheckUp. You are guided step-by-step through solving each problem.
Once installed, a portion of Guard Dog remains active in your PC’s memory and watches over your PC. When Guard Dog detects a potential problem, it takes action based on your preferences—it either takes care of the problem automaticall y or pops up an alert message to as k you how to proceed.
With Guard Dog, you are in control at all times. You decide what security and privacy features to use. If your concerns or computing habits change, it is easy to change Guard Dog to meet your needs.
Guard Dog and your Internet Connection
Guard Dog relies on your Internet Connection to pro vide its Intern et security features. Unless you have an Internet provider and browser software designed for Windows 95 or Windows 98, Guard Dog can provide only virus protection.
User’s Guide 1
Welcome to Guard Dog
To use all Guard Dog features, you must have an Internet connection through a local network or a modem. Some networks have an Internet connection that you can use by connecting to the network-either directly or through dial-up
networking. If you don’t connect through a network, your computer must have a modem installed.
You can establish an Internet connection through a n Internet Service Provider (ISP) such as Netcom or Earthlink. An ISP acts as a middleman between you and the Internet Your computer connects (using your modem) to the ISP’s equipment, which in turn connects to the Internet. You may also be co nnected to the Internet through an online service such as America Online or Compuserve.
In addition, you must also have a browser. A browser is software, such as Netscape Navigator or Microsoft Internet Explorer (it must be a version designed for Windows 95 or Windows 98), that allows you to view text and graphics and download files from Web sites. America Online 3.0 for Windows 95 and Compuserve Interactive 3.0 both include bro wsers that are compatible with Guard Do g.
What Internet problems Guard Dog solves
This section briefly describes how Guard Dog protects you from the most common Internet threats. If you want more background information on Internet privacy, security, and virus issues, see “Internet Security and Privacy” on page 59.
Privacy threats
Identity Protector monitors your Internet connection and warns you before private information is sent to an unsecure Internet site. It stops programs and other people that use your computer (like your kids) from sending your name and credit card numbers over the Internet without your OK.
Cookie Blocker prevents Web sites from storing cookies on your hard drive. Third-party Web sites use cookies to track yo ur Web browsing habits. You can choose your level of interaction with Cookie Blocker. (For more information, see “What are cookies and how are they used?” on page 69.)
W eb T rai l Cleaner cleans up your Web browsing trails—cached files, list of URLs (Uniform Resource Locator, also known as Web address) visited, history file—when you close your browser. Others can track your online movements by viewing the files and URLs left over from your Internet browsing.
2 Mc Afee Guard Dog
Search Filter prevents search information that you request at one Web site from being passed along to the next site you visit. Without Search Filter, your browser can transfer your search request information from one Web site to another without your knowledge.
Security threats
Gatekeeper lets you control the programs that have access to your Internet connection. Programs on your PC can be programmed to access to the Internet without your consent.
CheckUp can check for and if necessary, display the Web page from which you can install the latest Netscape or Internet Explorer version. Older Netscape or Internet Explorer software installed on your PC may have security flaws.
File Guardian protects files that contain your sensitive data from being opened, renamed, copied, moved, or deleted. Programs, such as ActiveX and Java programs, can scan your PC for personal information or delete files without your permission.
Welcome to Guard Dog
Password Manager stores your Web site login names and passwords for
Virus threats
Virus Sentry checks for boot sector, partition table, and memory viruses
Vi rus Check in eith er CheckUp or Scheduler will catch file and macro
File Guardian also limits access to protected files either to programs you specify or through file encryption. It can limit the programs that can access your tax, on-line banking, or personal accoun ting data files.
protected Web sites in one secure location. When you are visiting a site that requires this information, drag it from Browser Buddy to the form displayed in your browser. No more storing your login names and passwords in an unsecure location, such as on a sticky note on your monitor or in a text file on your Windows desktop.
during your DOS startup. It also watches for viruses while you work with program, document, and e-mail attachment files.
viruses, and Trojan Horses.
What’s new in Guard Dog
Guard Dog version 2 includes these new features.
User’s Guide 3
Welcome to Guard Dog
New interf ac e Easier to use—you don’t have to know a lot about the inner workings of your PC and the Internet.
Guard Dog password Protects the information and settings in Guard Dog from being viewed or changed. It also prevents others using your computer from sending out information that you specify as private.
Multimedia introduction tutorial Walks you through Guard Dog’s features and teaches you the facts about today’s Internet threats.
Improved cookie management Selectively remove cookies that you don’t want in CheckUp.
Personal identity protection “Mark” personal identity information and sensitive files (such as financial records and credit card numbers) so they’ll never be sent over the Internet without your OK.
Additional Scheduled events Schedule events that automatically:
Remove viruses and other hostile programs.
Remove cookies, browser History records, and browser Cache files.
Encrypt or decrypt files protected by File Guardian.
Remind you to create or update your Emergency Disk or Guard Dog files.
Encrypt sensitive files
Add an extra layer of protection by encoding files to prevent them from being read—until you decode them.
Web site password management
Store and manage your Web site passwords in one convenient, secure location.
About Guard Dog docu mentation
This manual provides the basic information you need to install, set up, and use Guard Dog. More detailed information about Guard Dog is provided by Help.
4 Mc Afee Guard Dog
How this book is organized
This User’s Guide is designed to get you using Guard Dog quickly. Read chapters 1 and 2 to get G uard Dog installed and running. You nee d only rea d Chapters 3, 4, 5, and 6 if you w an t further info rmation on customizing Guard Dog or using specific features. If you are new to the Internet or just want to find out more about Internet privacy and security issues, read Appendix A.
To find out Read
Welcome to Guard Dog
Table 1-1.
What this versio n of Guard Do g does and ho w to find information about Guard Dog.
System requirements and how to install Guard Dog.
How to use the main features of Guard Dog. Chapter 2. Quick Tour of Guard
How to change CheckUp and Protection settings or schedule automatic checks and reminders.
What the Cookie Blocker, Identity Protector, Web Trail Cleaner, and Search Filter features are and how to work with them.
What the Gatekeeper, File Guardian, and Password Manager features are and how to work with them.
What the AntiVirus features are and how to work with them.
What privacy, security, and virus issues exist on the Internet.
Welcome to Guard Dog™
Chapter 1. Installing Guard Dog™
Dog™ Chapter 3. Customiz ing Guard
Dog™
Chapter 4. Us ing Gu ar d Dog Privacy Features
Chapter 5. Us ing Gu ar d Dog Security Features
Chapter 6. Us ing Gu ar d Dog AntiVirus Features
Appendix A. About Internet Security and Privacy
How to contact McAfee Software sales, customer service and support depa rtments.
Using Guard Dog help
To view Guard Dog
1. In the Guard Dog Home screen, click Help.
2. Click Contents and Index to open the Help Topics window.
Appendix B. Contacting McAfee Software
User’s Guide 5
Welcome to Guard Dog
3. Click one of the following:
To display help f or a screen
1. In the Guard Dog Home screen, click Help.
2. Click Help for this screen to display a help topic that explains what you
To get help for settings in a dialog box
Whenever you see the button in the upper-right corner of a dialog
Contents displays the topics in the Help file organized in book form.
Index lets you search for specific information.
can do in or what you may need to know about the current Guard Dog screen.
box, click the button, then click on the setting for which you want information.
6 Mc Afee Guard Dog
2Installing Guard Dog
Most installation problems are a caused by having programs running while you try to install new software. Even if the installation appears normal, you
won’t be able to run the new program. To avoid installation problems, close all open programs before you install Guard Dog, including programs that run in the background, such as screen savers or virus checkers.
System requirements
To use Guard Dog you need:
IBM PC or compatible computer running Windows 95 or Windows 98.
16 megabytes (MB) minimum of RAM.
20 MB free hard disk space to install Guard Dog and Oil Change. Additional disk space is required to install any optional Internet software that may be included on the compact disc (CD) version.
2
256-color video display or better. Guard Dog looks and operates best in a resolution of 800x600 pixels (or greater) and a color palette of 32,000 color mode (15 bit) or higher. 256-color palette is supported, but may cause some color changes (caused by ‘palette swapping’) when switching between applications.
Microsoft mouse or compatible pointing device.
Access to the Internet, either a dial-up account with an Internet Service Provider (ISP) or a constant connection through a network.
Sound card (not required, but you’ll need this to hear the sound for the Guard Dog video).
Windows 95 Web browser (also called a 32-bit browser). Some Help features—McAfee Software on the Web, Guard Dog on the
Web, FAQs, and Report a problem—require you to conn ect to th e McA fee Software Web site with a Web browser (software that allows you to view documents and download files from the World Wide Web). To use all the
®
online support features, the browser must be Microsoft
Netscape Navigator
, or America Online v3.0 (or later) for Windows 95.
Internet Explorer,
User’s Guide 7
Installing Guard Dog
NOTE: America Online users need AOL’s 32-bit Winsock to use
Guard Dog. To upgrade from a 16-bit Winsock, contact America Online.
Installing Guard Dog
After closing all open programs, you are ready to install Guard Dog on your PC. Installation should go smoothly, however, if you do have difficulties, see “Troubleshooting installation problems” on page 9 .
To install Gu ard Dog
1. Close all open programs.
2. Insert the Guard Dog CD in the CD-ROM drive.
3. In the Guard Dog Setup screen, click Install Guard Dog.
NOTE: If the setup screen doesn’t start automatically when you
close your CD-ROM drive, click Start on the Windows taskbar, click Run, then type d:\setup. If D is not the drive letter of your CD-ROM drive, substitute the correct drive letter.
4. Read the text in the Welcome to Guard Dog screen, then click Next to display the Software License Agreement.
5. After you read the license agreement, click Yes to continue.
6. In the Choose Destination Location window, do one of the following:
To install the software into the default location C:\Program Files\Guard Dog, click Next>.
To install the files in an alternate location, click Browse, locate the appropriate directory, and then click OK. Click Next> to copy the Guard Dog files to your hard drive.
7. After the Guard Dog files are copied to your PC, you are asked if you want to register Guard Dog over the Internet. To register, click Yes.
The McAfee Software Online Registration wizard steps you through the registration process. Online registration is optional. If you do not register Guard Dog during installation, you can do so later from the S tart menu by choosing Register Guard Dog from the Guard Dog menu.
8 Mc Afee Guard Dog
Installing Guard Dog
8. After registration, you are asked if you want to install a limited
subscription version of McAfee Software Oil Change™. To use Guard Dog’s Update feature, you must have Oil Change installed. Do one of the following:
Click Yes to install Oil Change (with a limited subscription).
Click No to install Oil Cha nge later from the Guard Dog CD. For more information, see “Installing other software from the Guard Dog CD” on page 11.
9. The final installation screen notifies you that the installation is complete and lets you choose to view the Guard Dog ReadMe file and start Guard Dog. (You should read the ReadMe file, as it contains information that isn’t included in this manual.) By default, these options are selected. To disable either option, clear its check box. Click Finish.
10. The Readme file and a message that asks permission to restart your PC appears. Do the following:
Click the Readme window to read the file. Close the window when you are finished.
Click Yes in the message box to restart your PC. Guard Dog can’t begin monitoring your PC un til you do so.
After you restart your computer, Guard Dog opens automa tically, plays its introductory video, and then starts its interview. For more information, see “Viewing the Guard Dog video” on page 13 and “Using the Guard Dog interview” on page 13 .
Troubleshooting installation p roblems
A failed installation can cause software problems that are difficult to track down. The major causes of installation failure are:
Hard drive errors
Temporary files that conflict with the installation
Attempting to install while other software is running Follow the procedure outlined below to minimize the affect that these
common conditions m ay have on your installation.
Step 1: Clean up your hard drive
Run the Windows 95 hard drive utilities, ScanDisk and Disk Defragmenter to identify and fix any errors on your hard drive:
User’s Guide 9
Installing Guard Dog
1. Click Start on the Windows taskbar, point to Programs, then Accessories,
2. In the ScanDisk wi ndow, select Standard and Automatically fix errors
3. Click Advanced. In the Advanced Settings dialog box, make sure the
4. Ignore the other options, and click OK. Click Start. ScanDisk begins
then System Tools, and click ScanDisk.
(these are the default settings).
following settings are selected:
Only if errors found
•Replace log
Delete
•Free
scanning your drive for erro rs. Depending on the size of your hard drive, ScanDisk may take several minutes to complete its job.
5. When ScanDisk is finished, close ScanDisk.
6. Click Start on the Windows taskbar, point to Programs, then Accessories, then System Tools, and click Disk Defragmenter.
7. Click OK to start Disk Defragmenter. Depending on the s peed of your computer and the size of your drive, this may take several minutes to complete.
8. Close Disk Defragmenter when it has finished defragmenting your disk.
Step 2: Remove temporary files
Delete the contents of the Windows Temp folder:
1. Double-click the My Computer icon on your desktop. The My Computer window opens. Double-click the C: drive. You are now viewing the contents of your hard drive.
2. Double-click the Windows folder.
3. In the Windows folder, double-click the Temp folder.
4. In the menu, click Edit, then click Select All. All of the items in your Temp folder are now selected.
5. Press the Delete key on your keyboard to delete the files. If Windows asks about deleting files, click Yes.
6. In the Win d ows taskbar, click Start, then click Sh ut Down.
10 Mc Afee Guard Dog
7. Click Restart the computer, then click Yes in the Shut Down Windows dialog box to restart your PC.
Step 3: Close other software
Disable all software running in the background:
1. Hold down the Ctrl and Alt keys on your keyboard, and then press the Delete key once. The Close Program dialog box appears.
2. Click End Task for every item on the list except Explorer.
3. Repeat steps 2 and 3 until you’ve closed everything except Explorer.
4. When you see only Explorer in the Close Program dialog box, click Cancel.
You are now ready to install your new software.
Installing Guard Dog
Installing other software from the Gu ard Dog CD
The Guard Dog CD may contain additional Internet programs or trial copies of other McAfee Software products.
To install op tion al sof tware
1. Insert the Guard Dog CD in the CD-ROM drive.
2. In the Guard Dog Setup screen, click Other Software Products.
3. Follow the instructions on your screen.
User’s Guide 11
Installing Guard Dog
12 Mc Afee Guard Dog
3Quick Tour of Guard Dog
Guard Dog is a simple program to use. In fact, this one chapter covers the main things you need to know about using Guard Dog. Yo u begin by watching the Guard Dog video, after which you must answer a few questions so that Guard Dog can effectively protect the sensitive data on your PC.
Viewing the Guard Dog video
After you install Guard Dog and restart your computer, Guard Dog plays its video. The video introduces you to Internet privacy and security issues and
guides you through Guard Dog’s main features. If you want to stop the video before it is done playing, press the Esc key. If you
want to view the video again, click Help on the Guard Dog Home screen, then click How Guard Dog works.
After the video finishes playing, Guard Dog displays its interview.
3
Using the Guard Dog interview
The interview starts automatically after the Guard Dog video finishes playing for the first time. Although Guard Dog is set up to use security, privacy, and virus settings that are appropriate for most users, some features require your input. The interview provides an easy means of customizing your Guard Dog settings.
To rerun the interview at a later time, click Interview in the Options menu on the Guard Dog Home screen.
User’s Guide 13
Quick Tour of Guard Dog
Each interview screen either tells you about a Guard Dog fea ture, asks you to enter information, or asks you how you want G uard Dog to respond to certain situations. (Figure 3-1.)
Figure 3-1. Guard Dog Interview screen.
On each interview screen you can click Back to return to a previous screen or click Next to move to the next screen. In the final interview screen, you click Finish to save the settings you selected and close the interview.
What information does Guard Dog ask me to enter?
The Guard Dog interview asks you to enter the personal and financial information that you want to protect. All the information you enter into Guard
Dog is stored in encrypted form on your hard disk—it is never sent to McAfee Software.
You may want to gather your personal information before you start the interview. If you don’t have the information readily available or if you change your mind, you can rerun the interview or add information directly using Protection Settings. Guard Dog asks you to enter:
A password that you use to protect your Guard Dog information.
Personal and financial information that you want to protect from being sent out over the Internet:
•Name
Address
14 Mc Afee Guard Dog
Quick Tour of Guard Dog
Social Security number
Telephone number
E-mail address
Other financial numbers such as bank account, brokerage account, credit card, phone card, and so on.
Any Web site login names and passwords that you want to store in Password Manager.
For optimal protection by Identity Protector, include all dashes (such as Social Security number, bank account numbers, brokerage accounts, and ATM cards). For example, if you enter 123-45-6789 as your social security number, Guard Dog will recognize the number with or wi thout the dashes. If you enter 123456789, Guard Dog won’t alert you if th e number is sent out with dashes (123-45-6789). Credit cards do not need dashes because you type the numbers into separate boxes.
NOTE: You can fine-tune the configuration of Guard Dog’s
privacy, security, and AntiVirus features in Protection Settings. Click Options on the Guard Dog Home screen, then click Protection Settings.
Why should I create an Emergency Disk?
As part of the interview, Guard Dog asks you to create an Emergency Disk. The Emergency Disk saves critical information and files that can be used to start up (or boot) your computer when it can’t start normally. If you should encounter a boot sector virus, you may need the Emergency Disk in order to start up your computer and clean the virus.
If you think that your computer is in good condition, now is the best time to create an Emergency Disk. You will need three formatted, high-density,
3.5-inch floppy disks. (If you need help formatting the disks, refer to Windows
Help, which is located on your Windows In case anything should happen to your installed copy of Guard Dog, the
Emergency Disk also contains a copy of your Guard Dog settings (including the Guard Dog password) and Password Manager information. Keep your Emergency Disk in a secure location away from heat and magnetic surfaces.
Start menu.)
User’s Guide 15
Quick Tour of Guard Dog
If you choose not to create an Emergency Disk at this time, you can create one later by running CheckUp. Guard Dog also reminds you every four months to create or update your Emergency Disk. You can also create an Emergency Disk by running the Interview and clicking Next until you reach the Emergency Disk page.
How password protection effects using Guard Dog
If you set up Guard Dog to use a pass word—either through the Interview o r Preferences in Protection Settings—you are prompted for the Guard Dog password when you start Windows. When you enter an incorrect password, Guard Dog displays the hint that you provided when you created your password.
Without the password you can still open the Guard Dog Home screen, but you won’t be able to change your CheckUp Settings or Protections Settings. Also, Guard Dog won’t let you use the Password Manager information in Browser Buddy or send out information protected by Identity Protector.
If you’ve forgotten your Guard Dog password, you can retrieve it from the Emergency Disk, so remember to keep your disks in a secure location.
WARNING: If you forget your password and didn’t create an
+
Emergency Disk, you can reins tall Guard Dog to use it—but you ’ll lose your Guard Dog settings, Passw ord Manager information and won’t be able to use any of your encrypted files.
To retrieve your Guard D og passwor d
1. When you try to use a Guard Dog password-protected feature, the Guard Dog Password dialog box appears. In the dialog box, click OK. The Guard Dog Login Failed dialog box appears.
2. Insert the first disk of your Emergency Disk set into your floppy disk drive and click Browse.
3. Click the icon for your floppy drive and click OK.
TIP: Use Interview when you want to change your Guard Dog
Ó
password, then update your Emergency Disk set (you can reuse the same disks) to store your changed pass word information.
16 Mc Afee Guard Dog
Using the Guard Dog Home screen
After the interview ends, Guard Dog displays its Home screen (Figure 3-2).
Figure 3-2. Guard Dog Home screen.
Quick Tour of Guard Dog
Table 3-1. Actions you can perform in the Home screen
To do this Click this
Run a complete check of your PC for privacy, security, and virus problems.
Adjust the CheckUp settings. Options, then click CheckUp
Adjust the Guard Dog general or a lert setting s. Options, then click Protection
Display a list of Guard Dog actions. Log Display the McAfee Software Home screen in
your Web browser. Display the McAfee Software Support page in
your Web browser. Display the Support FAQ page in your Web
browser. Create an e-mail message addressed to
McAfee Software Technical Support site.
CheckUp
Settings
Settings
Help, then McAfee Software on the Web
Help, then Guard Dog on the Web
Help, then Frequently Asked Questions
Help, then Report a problem
User’s Guide 17
Loading...
+ 62 hidden pages