Mcafee INTERNET GUARD DOG 3.0 User Manual

Internet Guard Dog

User’s Guide

Version 3.0

COPYRIGHT
Copyright © 2000 Network Associates, Inc. and its Affiliated Companies. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means without the written permission of Network Associates, Inc.
* ActiveHelp, Bomb Shelter, Building a World of Trust, CipherLink, Clean-Up, Cloaking, CNX, Compass 7, CyberCop, CyberMedia, Data Security Letter, Discover, Distributed Sniffer System, Dr Solomon’s, Enterprise Secure Cast, First Aid, ForceField, Gauntlet, GMT, GroupShield, HelpDesk, Hunter, ISDN Tel/Scope, LM 1, L ANGuru, Leading Help Desk Technology, Magic Solutions, MagicSpy, MagicTree,Magic University, MagicWin, MagicWord,McAfee, McAfeeAssociates, MoneyMagic, More Power To You,M ultimedia Cloaking,NetCrypto, NetOctopus, N etRoom, NetScan,Net Shield, NetShield, NetStalker, Net Tools, Network Associates, Network General, Network Uptime!, NetXRay, Nuts & Bolts, PC Medic, PCNotary, PGP, PGP (Pretty Good Privacy), PocketScope, Pop-Up, PowerTelnet, Pretty Good Privacy, PrimeSupport,RecoverKey, RecoverKey-International, ReportMagic,RingFence, Router PM, Safe & Sound, SalesMagic, SecureCast, Service Level Manager, ServiceMagic, Site Meter, Sniffer, SniffMaster, SniffNet, Stalker, Statistical Information Retrieval (SIR), SupportMagic, Switch PM, TeleSniffer, TIS, TMach, TMeg, Total Network Security, Total Network Visibility, Total Service Desk, Total Virus Defense, T-POD, Trusted Mach, Trusted Mail, Uninstaller, Virex, Virex-PC, Virus Forum, ViruScan, VirusScan, VShield, WebScan, WebShield, WebSniffer, WebStalker WebWall, and ZAC 2000
are registered trademarks of Network Associates and/or its affiliates in the USand/or other countries. All other registered and unregistered trademarks in this document are the sole property of their respective owners.
LICENSE AGREEMENT
NOTICE TO ALL USERS: CAREFULLY READ THE FOLLOWING LEGAL AGREEMENT ("AGREEMENT"), FOR THE LICENSE OF SPECIFIED SOFTWARE ("SOFTWARE") BY NETWORK ASSOCIATES, INC. ("McAfee"). BY CLICKING THE ACCEPT BUTTON OR INSTALLING THE SOFTWARE, YOU (EITHER AN INDIVIDUAL OR A SINGLE ENTITY) CONSENT TO BE BOUND BY AND BECOME A PARTY TO THIS AGREEMENT. IF YOU DO NOT AGREE TO ALL OF THE TERMS OF THIS AGREEMENT, CLICK THE BUTTON THAT INDICATES THAT YOU DO NOT ACCEPT THE TERMS OF THIS AGREEMENT AND DO NOT INSTALL THE SOFTWARE. (IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO THE PLACE OF PURCHASE FOR A FULL REFUND.)
1. License Grant. Subject to the payment of the applicable license fees, and subject to the terms and
conditions of this Agreement, McAfee hereby grants to you a non-exclusive,non-transferable right to use one copy of the specified version of the Software and the accompanying documentation (the "Documentation"). You may install one copy of the Software on one computer, workstation, personal digital ass istant, pager, "smart phone" or other electronic d evice for which the Software was designed (each, a "Client Device"). If the Software is licensed as a suite or bundle with more than one specified Software product, this license applies to all such specified Software products, subject to any restrictions or usage terms specified on the applicable price list or product packaging that apply to any of such Software products individually.

Issued February 2000/ Internet Guard Dog v3.0

(i.e., the required number of licenses would equal the number of distinct inputs to the multiplexing or pooling software or hardware "front end"). If the number of Client Devices or seats that can connect to the Software can exceed the number of licenses youhave obtained,then you must have a reasonable mechanism in place to ensure that your use of the Software does not exceed theuse limits specified for the licenses you have obtained. This license authorizesyou to make or downloadone copyof the Documentation for eachClient Device or seat that is licensed, provided that each such copy contains all of the Documentation's proprietary notices.
c. Volume Licenses. If the Software is licensed with volume license terms specified in the
applicable price list or product packaging for the Software, you may make, use and install as many additional copies of the Software on the number of Client Devices as the volume license authorizes. You must have a reasonable mechanism in p lace to ensure that the number of Client Devices on which the S oftware has been installed does not exceed the number of licenses you have obtained. This license authorizesyou to make or download one copy of theDocumentation for each additional copy authorizedby thevolume license,provided that each such copy contains all of the Documentation's proprietary notices.
2. Term. This Agreement is effective for an unlimited duration unless and until earlier terminated as
set forth herein. This Agreement will terminate automatically if you fail to comply with any of the limitations or other requirements described herein. Upon any termination or expiration of this Agreement, you must destroy all copies of the Software and the Documentation. You may terminate this Agreement at any point by destroying all copies of the Software and the Documentation.
3. Updates. For the time period specified in the applicable price list or product packaging for the
Software you are entitled to download revisions or updates to the Software when and as McAfee publishes them via its electronic bulletin board system, website or through other online services. For a period of ninety (90) days from the date of the original purchase of the Software, you are entitled to download one (1) revision or upgrade to the Software when and as McAfee publishes it via its electronic bulletin board system, website or through other online services. After the specified time period, you have no further rights to receive any revisions or upgrades without purchase of a new license or annual upgrade plan to the Software.
4. Ownership Rights. The Software is protected by United States copyright laws and international
treaty provisions. McAfee and its suppliers own and retain all right, title and interest in and to the Software, including all copyrights, patents, trade secret rights, trademarks and other intellectual property rights therein. Your possession, installation, or use of the Software does not transfer to you any title to the intellectual property in the Software, and you will not acquire any rights to the Software except as expressly set forth in this Agreement. All copies of the Software and Documentation made hereundermust contain the same proprietarynotices thatappear onand in the Software and Documentation.
User’sGuide iii
5. Restrictions. Youmay not rent, lease, loan or resell the Software. You maynot permitthird parties
to benefit from the use or functionality of the Software via a timesharing, service bureau or other arrangement, except to the extent such use is specified in the applicable list price or product packaging for the Software. You may not transfer any of the rights granted to you under this Agreement. You may not reverse engineer, decompile, or disassemble the Software, except to the extent the foregoing restriction is expressly prohibited by applicable law. You may not modify, or create derivative works based upon, the Software in whole or in part. You may not copy the Software or Documentation exceptas expressly permitted inSection 1above. You may not remove any proprietary notices or labels on the Software. All rights not expressly set forth hereunder are reserved by McAfee. McAfee reserves the right to periodically conduct audits upon advance written notice to verify compliance with the terms of this Agreement.
6. Warranty and Disclaimer a. Limited Warranty. McAfee warrants that for sixty (60) days fromthe date of originalpurchase
the media (e.g., diskettes) on which the Software is contained will be free from defects in materials and workmanship.
b. Customer Remedies. McAfee's and its suppliers' entire liability and your exclusive remedy for
any breach of the foregoing warranty shall be, at McAfee's option, either (i) return of the purchase price paid forthe license, if any, or (ii) replacementof thedefective media in which the Software is contained. You must return the defective media to McAfee at your expense with a copy of your receipt. This limited warranty is void if the defect has resulted from accident, abuse, or misapplication. Any replacement media will be warranted for the remainder of the original warranty period. Outside the United States, this remedy is not available to the extent McAfee is subject to restrictions under United States export control laws and regulations.
c. Warranty Disclaimer. Except for the limited warranty set forth herein, THE SOFTWARE IS
PROVIDED "AS IS." TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, MCAFEE DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NONINFRINGEMENT WITH RESPECT TO THE SOFTWARE AND THE ACCOMPANYING DOCUMENTATION. YOU ASSUME RESPONSIBILITY FOR SELECTING THE SOFTWARE TO ACHIEVE YOUR INTENDED RESULTS, AND FOR THE INSTALLATION OF, USE OF,AND RESULTSOBTAINED FROMTHE SOFTWARE. WITHOUT LIMITING THE FOREGOING PROVISIONS, MCAFEE MAKES NO WARRANTY THAT THE SOFTWARE WILL BE ERROR-FREE OR FREE FROM INTERRUPTIONS OR OTHER FAILURES OR THAT THE SOFTWARE WILL MEET YOUR REQUIREMENTS. S OME STATES AND JURISDICTIONS DO NOT ALLOW LIMITATIONS ON IMPLIED WARRANTIES, SO THE ABOVE LIMITATION MAY NOT APPLY TO YOU. The foregoing provisions shall be enforceable to the maximum extent permitted by applicable law.
iv Internet Guard Dog
7. Limitation of Liability.UNDER NO CIRCUMSTANCES AND UNDER NO LEGAL THEORY, WHETHER IN TORT, CONTRACT, OR OTHERWISE, SHALL MCAFEE OR ITS SUPPLIERS BE LIABLE TO YOU OR TO ANY OTHER PERSON FOR ANY INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES OF ANY CHARACTER INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF GOODWILL, WORK STOPPAGE, COMPUTER FAILURE OR MALFUNCTION, OR FOR ANY AND ALL OTHER DAMAGES OR LOSSES. IN NO EVENT WILL MCAFEE BE LIABLEFOR ANY DAMAGES IN EXCESS OF THE LIST PRICE MCAFEE CHARGES FOR A LICENSE TO THE SOFTWARE, EVEN IF MCAFEE SHALL HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. THIS LIMITATION OF LIABILITY SHALL NOT APPLY TO LIABILITY FOR DEATH OR PERSONAL INJURY TO THE EXTENT THAT APPLICABLE LAW PROHIBITS SUCH LIMITATION. FURTHERMORE, SOME STATES AND JURISDICTIONS DO NOT ALLOW THE EXCLUSION OR LIMITATION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THIS LIMITATION AND EXCLUSION MAY NOT APPLY TO YOU. The foregoing provisions shall be enforceable to the maximum extent permitted by applicable law.
8. United States Government. The Software and accompanying Documentation are deemed to be "commercial computer software" and "commercial computer software documentation," respectively, pursuant to DFAR Section 227.7202 and FAR Section 12.212, as applicable. Any use, modification, reproduction, release, performance, display or disclosure of the Software and accompanying Documentation by the United States Government shall be governed solely by the terms of this Agreement and shall be p roh ibited except to the extent expressly permitted by the terms of this Agreement.
9. Export Controls. Neither the Software nor the Documentation and underlying information or technology may be downloaded or otherwise exported or re-exported (i) into (or to a national or resident of ) Cuba, Iran, Iraq, Libya, North Korea, Sudan, Syria or any other country to which the United States has embargoed goods; or (ii) to anyone on the United States Treasury Department's list of Specially Designated Nations or the United States Commerce Department's Table of Denial Orders. By downloading or using the Software you are agreeing to the foregoing and you are certifying that you are not located in, under the control of, or a national or resident of any such country or on any such list.
IN ADDITION, YOU SHOULD BE AWARE OF THE FOLLOWING: EXPORT OF THE SOFTWARE MAY BE SUBJECT TO COMPLIANCE WITH THE RULES AND REGULATIONS PROMULGATED FROM TIME TO TIME BY THE BUREAU OF EXPORT ADMINISTRATION, UNITED STATES DEPARTMENT OF COMMERCE, WHICH RESTRICT THE EXPORT AND RE-EXPORT OF CERTAIN PRODUCTS AND TECHNICAL DATA. IF THE EXPORT OF THE SOFTWARE IS CONTROLLED UNDER SUCH RULES AND REGULATIONS, THEN THE SOFTWARE SHALL NOT BE EXPORTED OR RE-EXPORTED, DIRECTLY OR INDIRECTLY, (A) WITHOUT ALL EXPORT OR RE-EXPORT LICENSES AND UNITED STATES OR OTHER GOVERNMENTAL APPROVALS REQUIRED BY ANY APPLICABLE LAWS, OR (B) IN VIOLATION OF ANY APPLICABLE PROHIBITION AGAINST THE EXPORT OR RE-EXPORT OF ANY PART OF THE SOFTWARE.
User’sGuide v
SOME COUNTRIES HAVE RESTRICTIONS ON THE USE OF ENCRYPTION WITHIN THEIR BORDERS, OR THE IMPORT OR EXPORT OF ENCRYPTION EVEN IF FOR ONLY TEMPORARY PERSONAL O R BUSINESS USE. YOU ACKN OWLEDGE THAT THE IMPLEMENTATION AND ENFORCEMENT OF THESE LAWS IS NOT ALWAYS CONSISTENT AS TO SPECIFIC COUNTRIES. ALTHOUGH THE FOLLOWING COUNTRIES ARE NOT AN EXHAUSTIVE LIST THERE MAY EXIST RESTRICTIONS ON THE EXPORTATION TO, OR IMPORTATION OF, ENCRYPTION BY: BELGIUM, CHINA (INCLUDING HONG KONG), FRANCE, INDIA, INDONESIA, ISRAEL, RUS SIA, SAUDI ARABIA, SINGAPORE, AND SOUTH KOREA. YOU ACKNOWLEDGE IT IS YOUR ULTIMATE RESPONSIBILITY TO COMPLY WITH ANY AND ALL GOVERNMENT EXPORT AND OTHER APPLICABLE LAWS AND THAT MCAFEE HAS NO FURTHER RESPONSIBILITY AFTER THE INITIAL SALE TO YOU WITHIN THE ORIGINAL COUNTRY OF SALE.
10.High Risk Activities. The Software is not fault-tolerant and is not designed or intended for use in hazardous environments requiring fail-safe performance, including without limitation, in the operation of nuclear facilities, aircraft navigation or communication systems, air traffic control, weapons systems, direct life-support machines, or any other application in which the failure of the Software could lead directly to death, personal injury, o r severe physical or property damage (collectively, "High Risk Activities"). McAfee expressly disclaims any express or implied warranty of fitness for High Risk Activities.
11.Miscellaneous. This Agreement is governed by the laws of the United States and the State of California, without reference to conflict of laws principles. The application of the United Nations Conventionof Contracts for the InternationalSale of Goods is expressly excluded. ThisAgreement sets forth all rights for the user of the Software and is the entireagreement betweenthe parties. This Agreement supersedes any other communicationswith respectto theSoftware and Documentation. This Agreement may not be modified except by a written addendum issued by a duly authorized representative of McAfee. No provision hereof shall be deemed waived unless such waiver shall be in writing and signed by McAfee or a duly authorized representative of McAfee. If any provision of this Agreement is held invalid, the remainder of this Agreement shall continue in full force and effect. The parties confirm that it is their wish that this Agreement has been written in the English language only.
12.McAfee Customer Contact. If you have any questions concerning these terms and conditions, or if you would like to contact McAfee for any other reason, please call (408) 988-3832, fax (408) 970-9727, or write: McAfee Software, 3965 Freedom Circle, Santa Clara, California 95054. http://www.mcafee.com.
Statements made to you in the course of this sale are subject to the Year 2000 Information and Readiness Disclosure Act(Public Law105-271). In the case ofa dispute, this Act may reduce your legal rights regarding the use of any statements regarding Year 2000 readiness, unless otherwise specified in your contract or tariff.
vi Internet Guard Dog

Table of Contents

Chapter1. WelcometoInternetGuardDog™......................1
UsingInternetGuardDog ..........................................1
HowInternetGuardDogworks..................................2
UserSetup ..................................................2
VirusScan ...................................................2
Activity Logs . . . . ............................................2
SecurityCheck ...............................................3
InternetGuardDogandyouronlineconnection....................3
InternetGuardDogfeatures ....................................3
What’snewinInternetGuardDog ...................................5
Otherfeaturesandenhancements ...............................6
About Internet Guard Dog documentation . . . . . . . . . . . . . . ...............6
How this book is organized . . . . . ...............................7
UsingInternetGuardDoghelp .................................7
Chapter2. InstallingInternetGuardDog™ .......................11
Systemrequirements .............................................11
Installing Internet Guard Dog . . . . . . . . ..............................12
Troubleshooting installation problems ..............................12
Step1:Cleanupyourharddrive ...............................13
Step 2: Remove temporary files . . ..............................13
Step3:Closeothersoftware...................................14
Installing McAfee VirusScan from the Internet Guard Dog CD . . . . . . . . . . .14
Chapter 3. Quick Tour of Internet Guard Dog™ . . . . . . . . . . . . . . . . . . . 15
UsingtheInternetGuardDogInterview ..............................15
What information does Internet Guard Dog ask me to enter? . . . . . . . .16
HowInternetGuardDogAdministratorworks ....................17
HowpasswordprotectionworksinGuardDog ...................18
UsingtheInternetGuardDogHomescreen ..........................18
HowUserSetupworks .......................................20
HowInternetFilteringworks ..................................21
User’s Guide vii
Table of Contents
HowPrivacyandSecurityoptionswork .........................22
Options ....................................................23
UsingMcAfeeVirusScan......................................23
Viewing Activity Logs . . . . . . . . . . ..............................23
UpdatingInternetGuardDogandVirusScan .....................24
PerformingaSecurityCheck ..................................25
WhatInternetGuardDogdoeswhileyourPCisrunning................26
UsingtheInternetGuardDogshortcutmenu ....................26
Responding to Internet Guard Dog alert messages . ..............27
Using Browser Buddy to retrieve or store your Web site passwords .27
Usingfileencryption .........................................29
Chapter4. PrivacyFeatures ...................................31
WhatCookieBlockerdoes ........................................31
Responding to a Cookie Blocker alert message . . . . ..............32
Why should I change my Cookie Blocker settings? . ..............33
WhatIdentityProtectordoes ......................................33
Responding to an Identity Protector alert message . ..............34
Why should I change my Identity Protector settings? . . . . . . . . . . . . .35
WhatWebTrailCleanerdoes ......................................36
Responding to the Web Trail Cleaner alert message ..............36
Why should I change my Web Trail Cleaner settings? . . . . . . . . . . . . .37
WhatSearchFilterdoes ..........................................37
Chapter5. SecurityFeatures ..................................39
WhatGatekeeperdoes ...........................................39
Responding to Gatekeeper alert messages . . . . . . . . ..............39
Why should I change my Gatekeeper settings? . . . . . ..............42
WhatFileGuardiandoes ..........................................43
Responding to File Guardian alert messages . . . . . . ..............43
Why should I change my File Guardian settings? . . . ..............46
WhatPasswordManagerdoes .....................................47
Chapter6. McAfeeVirusScan..................................49
WhatisMcAfeeVirusScan?........................................49
StartingVirusScan ...........................................49
viii Internet Guard Dog
Table of Contents
VirusScanCentralwindow ....................................50
VirusScanClassicwindow ....................................50
ConfiguringVirusScan .......................................51
AppendixA. InternetSecurityandPrivacy .......................55
NetworksandtheInternet .........................................55
TCP/IPisthesubsystem ......................................55
Whypackets?...............................................56
TheInternetandtheWeb…whatisthedifference? ................56
PrivacyandsecurityontheWeb ...............................57
WhydoesInternetprivacymattertome? ........................57
PrivacyontheWeb...............................................58
Whoissnooping? ...........................................58
Snoopingandsniffing ........................................58
Webserversandfirewalls .....................................58
WhatcanIdotokeepmystuffsafe?............................59
HowcanItellifaWebsiteissecure? ...........................59
Howdoesencryptionwork? ...................................60
SecurityontheWeb ..............................................61
Nastyapplets ...............................................62
CanIpreventprogramsfromaccessingtheInternet?..............62
Computer viruses and the Web . . . . . . . ..............................62
Arevirusesreallythatdangerous? .............................63
Typesofviruses.............................................63
HowcanmyPCbecomeinfectedwithavirus? ...................64
Frequently asked quest ions about Internet privacy . . . . . . ..............64
SourcesforInternetprivacyandsecurityinformation ..................66
Finding out about Internet hoaxes ..............................66
More information about computer viruses . . . . . . . . . ..............66
More information about secur ity . ..............................67
More information about priva cy . . ..............................67
Appendix B. Product Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .69
HowtoContactMcAfee ...........................................69
Customerservice ............................................69
User’s Guide ix
Table of Contents
Technical support ...........................................70
McAfeetraining .............................................71
x Internet Guard Dog
1Welcome to Internet Guard Dog
Using Internet Guard Dog
In the last fewyearsthe Internet has changedfrom acommunications network
that government entities and universities used almost exclusively, to an
information treasure house that people of all ages and occupations can now
access. With an Internet account, youcan send electronic mail (e-mail) around
the world in seconds, do research without leaving home, meet new friends in
an onlinechat room, or shop without getting out of your bathrobe. However,
with all these conveniences come a certain element of risk. When you use the
Internet, information istransmitted fromyourcomputer toother computers in
the Internet—information you may not want other people to have. And those
computers can also send files to your computer that may contain viruses.
While most of these files are harmless, some can invade your privacy or even
damage the data on your computer’s hard drive.
Figure 1-1. Internet Guard Dog Home screen
1
McAfee’s Internet Guard Dog addresses any of these potential risks with its
comprehensive features designed to protect your privacy and security when
surfing the Internet.
User’s Guide 1
Welcome to Internet Guard Dog™
With its new features, you can now also act as an Administrator and apply
customized protection settings not only for yourself, but for other users of
your computer and easily monitor potential risk they may encounter while
browsing the Internet.
How Internet Guard Dog works
Internet Guard Dog works via the following main features displayed in the
Home screen:
User Setup
As the Administrator, this feature allows you to setup protection settings for
other users of your computer. Y ou can add, edit and delete a user’s
profile—then setup individual privacy, security and Internet filtering options
that Internet Guard Dogwill apply w henever any of these users are browsing
the Web through your computer.
See the following for more information:
“Customize User Setup Settings” on page 33.
Chapter 4, “Privacy Features.”
Chapter 5, “Security Features.”
VirusScan
Internet Guard Dog now uses the McAfee VirusScan to address virus-related
problems you may encounter through the Internet. This feature allows you to
set how to perform a virus scan operation on your computer; what to do if a
virus isfound; and how it should alert you once thevirus is detected. You can
also direct VirusScan to keep a recordof actions performedon yourcomputer.
With these mainfeatures of InternetGuard Dog, youarein controlat all times.
You decide what security and privacy features to use. If your concerns or
computing habits change, it is easy to change Internet Guard Dog protection
settings to meet your needs and those of others who use your computer
frequently. See “What is McAfee VirusScan?” on page 49.
Activity Logs
On the Internet Guard Dog Home screen, Activity Logs allow you to view a
list of all the interactions that you and other profiled users of your computer
had with Internet Guard Dog, including the date and time of the action. You
can print, save or clear this list. See “Viewing Activity Logs” on page 23.
2 Internet Guard Dog
Welcome to Internet Guard Dog™
Security Check
You can run a complete check of your computer for any privacy or security
problems via this feature. After Internet Guard Dog performs the check, it
displays any problem found, provides additional information about the
problem, and guides you through on how to solve the problem. See
“Performing a Security Check” on page 25.
Internet Guard Dog and your online connection
To use all Internet Guard Dog features, you must have an Internet connection
through a local network or a modem. Some networks have an Internet
connection that you can use by connecting to the network-either directly or
through dial-up networking. If you don’t connect through a network, your
computer must have a modem installed.
You can establish anInternet connectionthrough anInternet Service Provider
(ISP) such as Earthlink. An ISP acts as a middleman between you and the
Internet. Your computer connects (using your modem) to the ISP’s equipment,
which in turn connects to the Internet. You may also be connected to the
Internet through an online service such as America Online or Compuserve.
In addition, you must also have a browser. A browser is software, such as
Netscape Navigator or Microsoft Internet Explorer (it must be a version
designed for Windows 95 or Windows 98), that allows you to view text and
graphics and download files from Web sites.
Internet Guard Dog features
This section brieflydescribes other featuresof Internet GuardDog that protect
you from the most common Internet threats. If you want more background
information on Internet privacy, security, and virus issues, see “Internet
Security and Privacy” on page 55.
NOTE: Only the designated Admi nistrator or Self-Administrator can have access to these features which allow them to customize protection settings for themselves and in the case of the Administrator, protection forotherprofiledusersofthesamecomputer.
User’s Guide 3
Welcome to Internet Guard Dog™
Protection from privacy threats
Identity Protector monitors your Internet connection and warns you
before private information is sent to an unsecure Internet site. It stops programs and other people that use your computer (like your kids) from sendingyour name and credit cardnumbers overthe Internetwithout your approval.
Cookie Blocker prevents Web sites from storing cookies on your hard
drive. Third-party Web sites use cookies to track your Web browsing habits. You can choose your level of interaction with Cookie Blocker. (For
more information, see “What are cookies and how are they used?” on page 65.)
Web Trail Cleaner cleans yourWeb browsing trailssuch as cachedfiles; list
ofURLs (Uniform ResourceLocator,also known as Webaddress)visited; and history files—when you close your browser. This feature prevents other users of your computer to track your online movements by viewing the files and URL addresses l eft over from your Internet browsing.
Search Filterprevents search information that you request at one Web site
from being passed along to the next site you visit. Without Search Filter, your browser can transfer your search request information from one Web site to another without your knowledge.
Protection from security threats
Gatekeeper allows you to control the programs that have access to your
Internet connection. Programs on your PC can be programmed to access to the Internet without your consent.
File Guardian protects files that contain your sensitive data from being
opened, renamed, copied, moved, or deleted. Programs, such as ActiveX and Java programs, can scan your PC for personal information or delete files without your permission.
File Guardian also limits access to protected files either to programs you specify or through file encryption. It can limitthe programs that can access your tax, on-line banking, or personal accounting data files.
Password Manager stores your Web site login names and passwords for
protected Web sitesin one securelocation. When you are visitinga site that requires this information, drag it from Browser Buddy to the form displayed in your browser. No more storing your login names and passwords in an unsecure location, such as post-it notes on your monitor or in a text file on your Windows desktop.
4 Internet Guard Dog
Protection from virus threats
Using the McAfee VirusScan, the following features are available:
Scan to start the default virus scan task immediately, or config ure a virus
scan task that suits your needs.
Scheduler to launch the McAfee VirusScan Scheduler. This utility enables
you to configure and run unattended virus scan operations.
Virus info to display virus information via the McAfee Web site.
What’s new in Internet Guard Dog
Internet Guard Dog version 3.0 includes these new features.
• Inclusion of McAfee VirusScan
McAfee VirusScan is now included in Internet Guard Dog. Select from availableoptions to customized how you want itto protectyour computer.
• Multi-user Logon and user settings
Internet Guard Dog now allows multiple users to have different protections settings. The main user can also act as an Administrator customizing settings for other users of the same computer.
Welcome to Internet Guard Dog™
Internet Filtering options
After an Administrator has added profiles of other users of the computer, Internet Filtering optionscan be usedbased ondefault URL sites,word list, rating systems, and Internet access time. Administrator can also enter additional lists or sites if desired.
• Activity Logs
An Administrator can view a list of activity, maintenance and violation logs at the single click of a button. This list contains information such as duration of computer use or any protection setting violation that a profiled user may have committed (e.g., attem pting to pass credit card number). Administrator also has the option to clean, print or save this list.
• Improved online Help interface
The online Help is now displayed via a tri-pane Explorer View Help window. While viewing a topic within the Help file, the user can now also view the table of contents as well as access the index and full-text search options simultaneously while the topic is displayed on the right-hand side of the window.
User’s Guide 5
Welcome to Internet Guard Dog™
Other features and enhancements
Internet Guard Dog password
Protects the information and settings in Internet Guard Dog from being viewed or changed. It also prevents other users of your computer from sending out information that you specify as private.
File Guardian enhancement
Protects individual files even when encrypted.
Improved cookie management
Indicates whethercookies are direct or indirect and the domain where it is coming from.
Personal identity protection
“Mark” personal identity information and sensitive files (such as financial records and credit card numbers) so they’ll never be sent over the Internet without your OK.
Encrypt sensitive files
Add an extra layer of protection by encoding files to prevent them from being read—until you decode them.
Browser Buddy enhancement
Store and manage your Web site passwords in one convenient, secure location. User can now reset numbers.
• Single Update button
At the single click of a button, user can update both Internet Guard Dog and McAfee VirusScanvia the Web.
About Internet Guard Dog documentation
This manual provides the basicinformation youneed to install, set up,and use
Internet Guard Dog. More detailed information on Internet Guard Dog is
provided by the Help files which you can access while working within the
different windows.
6 Internet Guard Dog
How this book is organized
This User’s Guide is designed to get you using Internet Guard Dog quickly.
Read chapters 1 and 2 to get Internet Guard Dog installed and running. You
only need to read Chapters 3, 4, 5, and 6 if you want further information on
customizing Internet GuardDog orusing specific features. Read Chapter7 for
furtherinformation on McAfeeVirusScan. Ifyou are new tothe Internetorjust
want to find out more about Internet privacy and security issues, read
Appendix A.
To find out Read
Welcome to Internet Guard Dog™
Table 1-1.
What this version of Internet Guard Dog does and how to find information about Internet Guard Dog.
System requirements and how to install Internet Guard Dog.
HowtousethemainfeaturesofInternet Guard Dog.
What the Cookie Blocker, Identity Protector, Web Trail Cleaner, and Search Filter features are and how to work with them.
What the Gatekeeper, File Guardian, and Password Manager features are and how to work with them.
What the VirusScan features are and how to work with them.
What privacy, security, and virus issues exist on the Internet.
How to contact McAfee Software sales, customer service and support departments.
Chapter 1, “Welcome to Internet Guard Dog™.”
Chapter 2, “Installing Internet Guard Dog™.”
Chapter 3, “Quick Tour of Internet Guard Dog™.”
Chapter 4, “Privacy Features.”
Chapter 5, “Security Features.”
Chapter 6, “McAfee VirusScan.”
Appendix A, “Internet Security and Privacy”
Appendix B, “Product Support”
Using Internet Guard Dog help
To launch InternetGuard Dog help
1. In the Internet Guard Dog Home screen, click Help; then select Help Topics. The Help system is displayed via a tri-pane Explorer View window.
User’s Guide 7
Welcome to Internet Guard Dog™
2. You can search for a help topic via the Contents, Index or Find tabs.
•Contentstab
•Indextab
NOTE: To go to the next page of help, click the next >>browse button
(if activated). To return to the previous page, click the previous << browse button (if activated) or click the Back button.
•Findtab.
1. Double-click a book icon to display its table of contents of related topics.
2. Locate the topic you want; thenpoint and double-clickto open the Help topic.
1. In the text box, type the first few letters of the word or phrase you are looking for.
2. Locate what you are looking for; then double-click the topic or click the Display button.
Clicking the Find tab enables you to launch a full text search. When you search for topics via the Find tab for the first tim e, a Find Setup Wizard is displayed. Follow the instructions on screen to setup the full text search option. After setup is complete:
1. In the text box, type the first few letters of the word or phrase you are looking for. You can also select matching words to narrow your search.
2. Once you have located what you are looking for in the display topic box, click the topic.
To display help for a screen
1. In the Internet Guard Dog Home screen, click Help.
2. Click Help for this screen to display a help topic that explains what you can do in or what you may need to know about the current Internet Guard Dog screen.
8 Internet Guard Dog
Welcome to Internet Guard Dog™
To get help for settings in a dialog box
• Whenever you see the button in the upper-right corner of a dialog box, click the button, then click on the setting for which you want information.
User’s Guide 9
Welcome to Internet Guard Dog™
10 Internet Guard Dog
2Installing Internet Guard Dog
Most installation problems are a caused by having programs running while you try to install new software. Even if the installation appears normal, you won’tbe ableto runthe newprogram. To avoid installationproblems, close all open programs before you install Internet Guard Dog, including programs that run in the background, such as screen savers or virus checkers.
System requirements
To use Internet Guard Dog you need:
• IBM PC or compatible computer running Windows 95 or Windows 98.
• 16 megabytes (MB) minimum of RAM.
• 20MBfreeharddiskspacetoinstallInternetGuardDogandMcAfee VirusScan. Additionaldisk space isrequired to installany optionalInternet software that may be included on the compact disc (CD) version.
• 256-color video display or better. Internet Guard Dog looks and operates best in a resolution of 800x600 pixels (or greater) and a color palette of 32,000colormode(15 bit) or higher. 256-color palette is supported, but may cause some color changes (caused by ‘palette swapping’) when switching between applications.
2
• Microsoft mouse or compatible pointing device.
• Access to the Internet, either a dial-up a ccount with an Internet Service Provider (ISP) or a constant connection through a network.
• Windows 95 or Windows 98 Web browser (also called a 32-bit browser). SomeHelp features—McAfeeSoftware on theWeb, Internet Guard Dogon
the Web, FAQs, and Report a problem—require you to connect to the McAfee Software Web site with a Web browser (software that allows you to vi ew documents and download files from the World WideWeb). To use all the online support features, the browser must be Microsoft Explorer, Netscape Navigator Windows 95 or Windows 98.
NOTE: America Online users need AOL’s 32-bit Winsock to use
Internet Guard Dog. To upgrade from a 16-bit Winsock, contact America Online.
,orAmericaOnlinev3.0(orlater)for
®
Internet
User’s Guide 11
Installing Internet Guard Dog™
Installing Internet Guard Dog
After closing all open programs, you are ready to install Internet Guard Dog on your PC. Installation should go smoothly, however, if you do have difficulties, see “Troubleshooting installation problems” on page 12.
To installInternet Guard Dog
1. Close all open programs.
2. Insert the Internet Guard Dog CD in the CD-ROM drive.
3. In the InternetGuard Dog Setup screen, click Install Internet GuardDog.
NOTE: If the setup screen doesn’t start automatically when you
close your CD-ROM drive, click Start on the Windows taskbar, click Run, then typed:\setup. IfD is not the driveletter ofyour CD-ROM drive, substitute the correct drive letter.
4. After installationis completed, InternetGuard Dog’s Interviewfeatureis launched. Follow through the screen instructions and provide information as needed.
NOTE: Only the Administrator can access this Interview feature of Internet Guard Dog. For more information, see “Using the Internet
Guard Dog Interview” on page 15.
Troubleshooting installation problems
A failed installation can cause software problems that are difficult to track down. The major causes of installation failure are:
• Hard drive errors
• Temporary files that conflict with the installation
• Attempting to install while other software is running Follow the procedure outlined below to minimize the affect that these
common conditions may have on your installation.
12 Internet Guard Dog
Step 1: Clean up your hard drive
Run the Windows 95 hard drive utilities, ScanDisk and Disk Defragmenter to identify and fix any errors on your hard drive:
1. ClickStart on the Windows taskbar, pointto Programs,then Accessories, then System Tools, and click ScanDisk.
2. In the ScanDisk window, select Standard and Automatically fix errors.
NOTE: These are the default settings.
3. Click Advanced. In the Advanced Settings dialog box, make sure the following settings are selected:
• Only if errors found
•Replacelog
• Delete
•Free
4. Ignore the other options, and click OK. Click Start. ScanDisk begins scanningyour drive forerrors. Depending onthesize of yourhard drive, ScanDisk may take several minutes to complete its job.
Installing Internet Guard Dog™
5. When ScanDisk is finished, close ScanDisk.
6. ClickStart on the Windows taskbar, pointto Programs,then Accessories, then System Tools, and click Disk Defragmenter.
7. Click OK to start Disk Defragmenter. Depending on the speed of your computer and the size of your drive, this may take several minutes to complete.
8. Close Disk Defragmenter when it has finished defragmenting your disk.
Step 2: Remove temporary files
Delete the contents of the Windows Temp folder:
1. Double-click the My Computer icon on your desktop. The My Computer window opens. Double-click the C: drive. You are now viewing the contents of your hard drive.
2. Double-click the Windows folder.
3. In the Windows folder, double-click the Temp folder.
User’s Guide 13
Installing Internet Guard Dog™
4. In themenu, click Edit,thenclick Select All.All of the itemsin your Temp folder are highlighted.
5. Press the Delete key on your keyboard to delete the files. If Windows asks about deleting files, click Yes.
6. In the Windows taskbar, click Start, then click Shut Down.
7. Click Restart the computer, then click Yes in the Shut Down Windows dialog box to restart your PC.
Step 3: Close other software
Disable all software running in the background:
1. Hold down the Ctrl and Alt keys on your keyboard, and then press the Delete key once. The Close Program dialog box appears.
2. Click End Task for every item on the list except Explorer.
3. Repeat steps 2 and 3 until you’ve closed everything except Explorer.
4. When you see only Explorer in the Close Program dialog box, click Cancel.
You are now ready to install your new software.
Installing McAfee VirusScan from the Internet Guard Dog CD
The Internet Guard Dog CD contains a copy of McAfee VirusScan.
To install McAfee VirusScan
1. Insert the Internet Guard Dog CD in the CD-ROM drive.
2. In the Internet Guard Dog Setup screen, click Install McAfee VirusScan.
3. Follow the instructions on your screen.
14 Internet Guard Dog
3Quick Tour of Internet Guard Dog
Internet Guard Dog is a simple program to use. In fact, this one chapter covers themain things youneedto know aboutusingInternet Guard Dog. Youbegin with answering a few questions via the Interview so that Internet Guard Dog can effectively use its feature to protect you from Internet threats.
Using the Internet Guard DogInterview
Although Internet Guard Dog is set up to use security and privacy settings that are appropriate for most users, some features require your input. The Interview provides an easy means of customizing your Internet Guard Dog settings.
Eachinterview screen eithertells you abouta Internet Guard Dogfeature, asks you to enter information, or asks you how you want Internet Guard Dog to respond to certain situations. (Figure 3-1.)
3
Figure 3-1. Internet Guard Dog Interview screen.
On each interview screen you can click Back to return to a previous screen or click Next to move to the next screen. In the final interview screen, you click Finish to save the settings you selected and close the Interview.
User’s Guide 15
Quick Tour of Internet Guard Dog™
What information does Internet Guard Dog ask me to enter?
The Internet Guard Dog interview asks you to enter the personal andfinancial information that you want to protect. All the information you enter into Internet Guard Dog is stored in encrypted form on your hard disk— it is never sent to McAfee Software.
You may want to gather your personal information before you start the interview. During the interview, Internet Guard Dog allows you to enter:
• A password that you can use to protect your Internet Guard Dog information.
• Personal and financial information that you want to protect from being sent out over the Internet without your knowledge:
•Name
• Address
• Social Security number
• Telephone number
• E-mail address
• Other financial numbers such as bank account, brokerage account, credit card, phone card, and so on.
• Any Web site login names and passwords that you want to store in Password Manager.
• Information about other users of your computer. If you are the Administrator, you can create user profiles and set protection settings that Internet Guard will use whenever the user is browsing the Internet via your computer. See “How Internet Guard Dog Administrator works” on
page 17.
For optimal protection by Identity Protector, include all dashes (such as Social Security number, bank account numbers, brokerage accounts, and ATM cards). For example, if you enter 123-45-6789 as your social security number, Guard Dog will recognize the number with or without the dashes. If you enter 123456789, Guard Dog won’t alert you if the number is sent out with dashes (123-45-6789). Credit cards do not need dashes because you type the numbers into separate boxes.
16 Internet Guard Dog
Quick Tour of Internet Guard Dog™
NOTE: You can fine-tune the configuration of Internet Guard
Dog’s privacy and security features in the Protection Settings. Click
Options on the Internet Guard Dog Home screen, then click Protection Settings.
How Internet Guard Dog Administrator works
Since Internet GuardDog nowoffers multi-userlogon capabilities,this feature allows one userto act as the administratorof personal information, protection and security settings entered via the Internet Guard Dog features. This is particularly useful if for example, you would want to filter, block or monitor certaintypes of informationthat you donot want your children toaccesswhen browsing the Internet.
Creating an Internet Guard Dog Administrator account can only be done in the Interview feature of Internet Guard Dog. And only the designated Administrator can access and change information and protection settings of the computer.
After this setup is complete, the Administrator can add other users and set the levels of security and protection for each user profile.
See the Internet Guard Dog online Help to view step-by-step instructions on how to set an Administrator account.
Self-Administrator
The Internet Guard Dog Administrator may designate another user as a Self-Administrator.Thisfeaturemaybeusedifforexample,theuserisan adult and is deemed responsible enough to customize his privacy and protection settings on his own.
This user can access Internet Guard Dog features and change his settings, not anyone else’s.
See the Internet Guard Dog online Help to view step-by-step instructions on how to designate a user as a Self-Administrator.
NOTE: In adding user profiles, the Administrator can designate a
user as a Self-Administrator.
User’s Guide 17
Loading...
+ 61 hidden pages