McAfee Internet Security User Manual

McAfee Internet Security
VERSION 5.0
PRODUCT GUIDE
COPYRIGHT © 2002 Networks Associates Technology, Inc. and its Affiliated Companies. All Rights Reserved. No
part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means without the written permission of Network Associates, Inc.
ANTIVIRUS ANYWARE AND DESIGN, BOMB SHELTER, CERTIFIED NETWORK EXPERT, CLEAN-UP, CLEANUP WIZARD, CNX, CNX CERTIFICATION CERTIFIED NETWORK EXPERT AND DESIGN, CYBERCOP, CYBERCOP (IN KATAKANA), CYBERMEDIA, CYBERMEDIA UNINSTALLER, DESIGN (STYLIZED N), DISK MINDER, DISTRIBUTED SNIF FER SYSTEM, DISTRIBUTED SNIFFER SYSTEM (IN KATAKANA), DR SOLOMON’S, DR SOLOMON’S LABEL, ENTERPRISE SECURECAST, ENTERPRISE SECURECAST (IN KATAKANA), EZ SETUP, FIRST AID, FORCEFIELD, GMT, GROUPSHIELD, GROUPSHIELD (IN KATAKANA), GUARD DOG, HELPDESK, HOMEGUARD, HUNTER, ISDN TEL/SCOPE, LANGURU, LANGURU (IN KATAKANA), M AND DESIGN, MAGIC SOLUTIONS, MAGIC SOLUTIONS (IN KATAKANA), MAGIC UNIVERSITY, MA GICSPY, MAGICTREE, MCAFEE, MCAFEE (IN KATAKANA), MCAFEE AND DESIGN, MULTIMEDIA CLOAKING, NET TOOLS, NET TOOLS (IN KATAKANA), NETCRYPTO, NETOCTUPUS, NETSCAN, NETSHIELD, NETSTALKER, NETWORK ASSOCIATES, NETXRAY, NOTESGUARD, NUTS & BOLTS, OIL CHANGE, PC MEDIC, PC MEDIC 97, PCNOTARY, PGP, PGP (PRETTY GOOD PRIVACY), PRETTY GOOD PRIVACY, PRIMESUPPORT, RECOVERKEY, RECOVERKEY - INTERNATIONAL, REGISTRY WIZARD, REPORTMAGIC, RINGFENCE, ROUTER P M, SALESMAGIC, SECURECAST , SERVICE LEVEL MANAGER, SERVICEMAGIC, SMARTDESK, SNIFFER, SNIFFER (IN HANGUL), SNIFFMASTER, SNIFFMASTER (IN HANGUL), SNIFFMASTER (IN KATAKANA), SNIFFNET, STALKER, SUPPORTMAGIC, TIS, TMEG, TNV, TVD, TNS, TOTAL NETWORK SECURITY, TOTAL NETWORK VISI BILITY, TOTAL NETWORK VISIBILITY (IN KATAKAN A), TOTAL SERVICE DESK, TOTA L VIRUS DEFENSE, TRUSTED M AIL, UNINSTALLER, VIREX, VIRUS FORUM, VIRUSCAN, VIRU SSCAN, WEBSCAN, WEBSHI ELD, WEBSHIELD (IN KATAKANA), WEBSNIFFER, WEBSTALK ER, WEBWALL, WHO’S WATCHING YOUR NETWORK, WINGAUGE, YOUR E-BUSINESS DEFENDER, ZAC 2000, ZIP MANAGER are registered
trademarks of Net work As socia tes, Inc. and/or its affi liates i n the US an d/or ot her coun tries . All other registered and unregistered trademarks in this document are the sole property of their respective owners. © 2002 Networks Associates Technology, Inc. All Rights Reserved.
Issued August 2002 / Product Guide v5.0
Contents
1
Welcome to McAfee Internet Security 5.0 . . . . . . . . . . . . . . . . . . . 7
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
What’s included with McAfee Internet Security? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
What’s new in this release? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
About this manual . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
McAfee Internet Security and your online connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
McAfee Internet Security features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
2
Installing McAfee Internet Security . . . . . . . . . . . . . . . . . . . . . . . 13
Before you begin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
System requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Installation steps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Troubleshooting installation problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Removing or modify ing your McA fee In ter n et Securi ty i nstall at io n . . . . . . . . . . . . . . . . . . 17
Important information about Windows XP migration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
3
Getting Started with McAfee Internet Security 5.0 . . . . . . . . . . . 19
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
The Title bar and Tool bar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Status information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
About Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
About the McAfee list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
How to use the McAfe e In tern et Sec ur it y Co nfigu ra ti on Assi sta nt . . . . . . . . . . . . . . . . . . . 26
How the McAfee In te rnet Sec ur it y Administrator Wo rk s . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Self-Administrating users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
The Administrator's password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Forgotten passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
How User Setup Works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Using McAfee VirusScan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Viewing Activity Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Product Guide iii
Contents
4
Keep your program up-to-date . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
What Mcafee Internet Security does while your computer is running . . . . . . . . . . . . . . . . . 31
Responding to McAfee Internet Security Alert Messages . . . . . . . . . . . . . . . . . . . . . 31
Using Browser Buddy to manage your web site passwords . . . . . . . . . . . . . . . . . . . 31
Using File Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Security Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
What Gatekeeper Does . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
What File Guardian Does . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
What Password Manager Does . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
Privacy Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
What Cookie Blocker Does . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
What Identity Protector Does . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
What Web Trail Cleaner Does . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
McAfee VirusScan Home Edition . . . . . . . . . . . . . . . . . . . . . . . . . 49
What’s new in this release? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
What comes with McAfee VirusScan? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Getting Started . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
The Title bar and Tool bar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
Status information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
The Task pane . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
Other McAfee VirusScan features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
About VShield Scanner . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
VShield automatic protection settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
How to Start and St op VS hie ld Scan ne r . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Using Quarantine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
How to managing quarantined files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
Safe & Sound . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
Safe & Sound configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
Emergency disk creation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
Using VirusScan With a Wireless Device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
How VirusScan protects your wireless device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
5
McAfee Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
What’s new in this release? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
How McAfee Firewall works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
iv McAfee Internet Security 5.0
Frequently asked questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
Getting Started with McAfee Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
The Configuration Assistant . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
The McAfee Firewall Home page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
Other McAfee Firewall features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
McAfee Firewall Configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
Program configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
System configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
McAfee Firewalls Intrusion Detection System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
How to Configure the Intrusion Detection System . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
Common attacks recognized by IDS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
6
McAfee Internet Security’s Shared Features . . . . . . . . . . . . . . . . 89
QuickClean Lite . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
McAfee Shredder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
7
Updating McAfee Internet Security . . . . . . . . . . . . . . . . . . . . . . . 93
About Instant Updater . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
Instant Updater features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
Contents
A
Product Support and Customer Service . . . . . . . . . . . . . . . . . . . 95
Contacting Customer Service and Technical Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
About McAfee-at-home.com . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
Emergency Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
Virus definition renewal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
B
Internet Security and Privacy . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
Networks and the Internet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
About Privacy and Security on the Web . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
Privacy on the Web . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
Security on the Web . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
Computer Viruses and the Web . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
Types of Viruses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
Frequently Asked Questions About Internet Privacy . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
C
Your McAfee Internet Security To-do List . . . . . . . . . . . . . . . . . 111
Privacy & Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
Product Guide v
Contents
Virus Detection and Prevention Tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114
Use a Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
Tips to maintaining your computer and its software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
vi McAfee Internet Security 5.0

Welcome to McAfee Internet Security 5.0

The Internet provides a vast wealth of information and entertainment at your fingertips. Yet, as soon as you connect, your computer is exposed to a multitude of privacy and security threats. Protect your privacy and secure your computer and your data with McAfee Internet Security. Incorporating McAfee's award-winning technologies, McAfee Internet Security provides one of the most comprehensive sets of privacy and security tools you can buy. McAfee Internet Security destroys viruses, outwits hackers, secures your personal information, privatizes your Web browsing, blocks ads and pop ups, manages your cookies and pass words, locks down your files, folde rs and drives, filters objectionable content, and puts you in control of the communications in and out of your PC. McAfee Internet Security provides powerful protection for today's Int e rnet users.

Introduction

In the last few years the Inter net has changed from a communications network that government entities and universities used almost exclusively, to an information treasure house that people of all ages and occupations can now access. With an Internet account, you can send electronic mail (e-mail) around the world in seconds, do research without leaving home, meet new friends in an online chat room, or shop without getting out of your bathrobe. However, with all these conveniences come a certain element of risk. When you use the Internet, information is transmitted from your computer to other computers on the Internet – information you may not want other people to have. And those computers can also send files to your computer that may contain viruses. While most of these files are harmless, some can invade your privacy or even damage the data on your computers hard drive.
1
McAfee Internet Security addresses any of these potential risks with its comprehensive features designed to protect your privacy and security when using the Internet.
With its new features, you can now also act as an Administrator and apply customized protection settings not only for yourself, but for other users of your computer and easily monitor potential risks they may encounter while browsing the Internet.
Product Guide 7
Welcome to McAfee Internet Security 5.0

What’s included with McAfee Internet Security?

n The Administrator: As the Administrator, you are able to set up
protection settings for other users of your computer. You can add, edit and delete a users profilethen setup individual privacy, security and Internet filtering options that McAfee Internet Security will apply whenever any of these users are browsing the Web through your computer.
n Activity Logs: Activity Logs allow you to view a list of all the
interactions that you and other profiled users of your com puter had with McAfee Internet Security, including the date and time of the activity. You can print, save or clear this list.
n Security Check: You can run an extensive check of your computer for
any privacy or security problems via this feature. After McAfee Internet Security performs the check, it displays any problem found, provides additional information about the problem, and guides you through on how to solve the problem.
n VirusScan: McAfee Internet Security uses McAfee VirusS can to a ddress
virus-related problems you may encounter through the Internet. This feature allows you to set how to perform a virus scan operation on your computer; what to do if a virus is found; and how it should alert you once the virus is detected. You can also direct VirusScan to keep a record of actions performed on your computer.
n Firewall: McAfee Internet Security incorporates McAfee Firewall to
protect your computer while it is connected to the Internet. McAfee Firewall is a highly-flexible, easy-to-use program. Whether you are connected to the Internet via DSL, cable modem or standard dial-up, Internet communication in to and out of your PC is secure.
n QuickClean Lite: Remove unnecessary files using QuickClean Lite. The
QuickClean Lite wizard enables you to clean your computer of unnecessary f iles and free valuable hard disk spa c e.
n Shredder: For privacy and security reasons, you may want to be positive
that the information stored in files you delete is permanently erased from your computer. Shredder does this for you by security wiping deleted files so they cannot be restored or rebuilt using an “undelete” type of utility.
8 McAfee Internet Security 5.0

Whats new in this release?

This release of McAfee Internet Security includes the following new features and functional enhancements.
n Includes VirusScan Home Edition 7 - Includes the latest version of the
award winning VirusScan anti-virus software to protect your system from viruses, Trojans, Internet wo rms, harmful scripts, and other malware. With automated updates and exclusive H.A.W.K. (Hostile Activity Watch Kernel) pr otections, Vi rusScan keeps y o ur computing free of even the latest threats.
n Includes McAfee Firewall 4 - Includes the latest version of McAfee
Firewall. McAfee Firewall enables you to control the communications in and out of your PC and helps keep hackers at bay. With powerful Application Control, Intrusion Detection, and easy Home Networking and Custom Rule Creation Wizards, McAfee Firewall provides essential security for your Internet connection.
n Spyware/Adware Protection - Helps enhance your privacy by rooting
out snooper programs that attempt to track your Web surfing habits. Now you can easily find and shut down these tracking programs that often piggyback on popular freeware utilities and games.
n Extended Stealth Program Protect ion - Helps keep your PC free of
hidden key loggers that try to capture and steal your passwords and a whole host of even more insidious programs that may be watching and recording everything you do on your PC. Adds an essential layer of protection against this growing threat to your privacy and security.
Welcome to McAfee Internet Security 5.0
n Pop-Up Bloc ker - Puts an end to thos e p esky a nd annoying p o p- up ad s
so prevalent on the Internet. Now you'll be able to surf the Internet without these and other ads getting in your way and slowing you down.
n Allow/Block Applications Per User - Lets you to control which
applications are available to different family members. Parents can readily use installed programs while blocking access to younger family members, protecting the family PC while restricting access to questionab le material.
n Filtering of Usenet Newsgroups - Usenet is said to exemplify the best
and worst of the Internet. Now you can take charge of which newsgroups and content various family members might be exposed to and filter out objectionable material while retaining access to the wealth of information Usenet provides.
n MRU Cleaner - Deletes the telltale trail left behind the files you've
opened and viewed recently. Enhances your privacy by clearing MRU's (Most Recently Used) of Windows based utilities and many other popular programs.
Product Guide 9
Welcome to McAfee Internet Security 5.0
n Usability Enhancements - McAfee Internet Security 5.0 includes user
interface enhancements to make it easier than ever to protect your online security and privacy.

About this manual

This manual provides the basic information you need to install, set up and get started with McAfee Internet Security 5.0. More de tailed information a bout how to perform tasks within McAfee Internet Security is provided via online Help. You can get Help while working with the different windows and dialog boxes.
You can also view the Readme.txt file which contains other general information, known issues, etc., about this product.

McAfee Internet Security and your online connection

You must have an Internet connection through a local network or a modem t o use all McAfee Internet Security features. Some networks have an Internet connection that you can use by connecting to the network – either directly or through dial–up networking. Your computer mu st hav e a mod em installed if you don’t connect through a network.
You can establish an Internet connection through an Internet Service Provider (ISP) such as MSN, AOL, or Earthlink, etc. An ISP acts as a middleman between you and the Internet. Your computer connects (using your modem) to the ISPs equipment, which in turn connects your compu ter to the Inter net.
In addition, you must also have a br owser. A browser is software, such as Microsoft Intern et Explore r or Netscape Navigator, tha t allows y ou to view text and graphics and download files from Web sites.
10 McAfee Internet Security 5.0
Welcome to McAfee Internet Security 5.0

McAfee Internet Security features

This section briefly describes other features of McAfee Internet Security that protect you from the most common Internet threats.
Only the designated administrator or a user with administrative rights can have access to these features which allow them to customize protection settings for themselves and in the case of the Administrator, protection for other profiled users of the same computer.
Protection from privacy threats
n Identity Protector monitors your Internet connection and warns you
before private i nformation is sent to an nonsecure Internet site. It stops programs and other people that use your computer (like your kids) from sending your name and credit card numbers over the Internet without your approval.
n Cookie Blocker prevents Web sites from storing cookies on your hard
drive. Third-party Web sites use cookies to track your Web browsing habits. You can choose your level of interaction with Cookie Blocker.
n Web Trail Cleaner cleans your Web browsing trails such as cached files;
list of URLs (Uniform Resource Locator, also known as Web address) visited; and history fileswhen you close your browser. This feature prevents other users of your computer from tracking your online movements by viewing the files and URL addresses left over from your Internet browsing.
n Referer Filter prevents search information that you request at one Web
site from being passed along to the next site you visit. Without Referer Filter, your browser may be allowing the transfer of your search request information from one Web site to another.
Protection from security threat s
n Gatekeeper allows you to cont rol the programs that have a ccess to your
Internet connection. Programs on your PC can be programmed to access to the Internet without your consent.
n File Guardian protects files that contain your sensitive data from being
opened, renamed, copied, moved, or deleted. Programs, such as ActiveX and Java programs, can scan your PC for personal information or delete files without your permission.
File Guardian also limits access to protected files ei ther to programs you specify or through file encryption. It can limit the programs that can access your tax, online banking, or personal accounting data files.
Product Guide 11
Welcome to McAfee Internet Security 5.0
n Password Manager stores your Web site login names and passwords for
protected Web sites in one secure location. When you are visiting a site that requires this information, you can drag it from Browser Buddy to the form displayed in your browser. No more storing your login names and passwords in an nonsecure location, such as post-it notes on yo ur monitor or in a text file on your Windows desktop.
n Browser Buddy is convenient tool with a dual purpose. First, Browser
Buddy lets you view a summary of cookie activity. Just choose a Web site that you have visited from the drop-down list. Second, Browser Buddy gives you access to the passwords that you have stored in Password Manager. When you log on a password-controlled Web Site, you can drag and drop a user name and pas sword from Browser Buddy to the appropriate box in the login form. To access Browser Buddy, right-click the McAfee Guardian icon in the Windows system tray and click Browser Buddy in the pop-up menu.
Protection from virus threa ts
Using McAfee VirusScan, the following features are available:
n Scan to start the default virus scan task immediately, or conf igure a virus
scan task that suits your ne eds.
n Scheduler to launch the McAfee VirusScan Scheduler. This utility
enables you to configure and run unattended virus scan operations.
n Virus info to display virus information via the McAfee Web site.
Safeguard your computer against intrusions and attacks
Protect yourself while online with the advanced security of McAfee Firewall. Easy-to-use, yet highly secure, McAfee Firewall safeguards your PC's connection to the Internet whether you connect via DSL, cable modem, or dial-up. McAfee Firewall gives you t he powerful tools you need to control the communications into and out of your PC.
12 McAfee Internet Security 5.0

Installing McAfee Internet Security

Before you begin

McAfee distributes McAfee Internet Security 5.0 in two formats:
1 As an archived file that you can download from the McAfee web site. 2 On CD-ROM.
Although the method you use to transfer files from an archive obtained via download differs from the method you us e to transfer files from a CD that is placed in your CD-ROM drive, the installation steps followed after that a re the same for both distribution types. Review the system requirements shown below to verify that this software will run on your computer.

System requirements

To install this product, you require the following:
Desktop and notebook computers
n Windows 98, Windows Me, Windows 2000 Professional, W indows XP
Home Edition, or Windows XP Professional.
2
n Internet Explorer 4.01, Service Pack 2 or higher required for Windows
NT; IE 5.01 or later recommended.
n 71 megabytes (MB) of hard disk space. n 32 MB of RAM. n An Intel Pentium-class or compatible processor rated at 100 MHz or
higher.
n CD-ROM drive. n Internet access for product updating.
Additional requirements for wireless devices
McAfee Internet Security includes the latest version of McAfee VirusScan software. In order to fully protect your wireless device from viruses, trojans, and worms, etc., your wireless device requires the following:
Product Guide 13
Installing McAfee Internet Security
Palm OS and Palm requirements
McAfee VirusScan for Palm Desktop with HotSync Manager 3.0 will install and run on any IBM PC or PC-compatible computer equipped with Palm Desktop 3.0 or later. The latest version of Palm Desktop and HotSync 3.0 is a free download from Palm's site (at www.palm.com). The device-resident portion is quite simple and should work on any device with the Palm OS.
Windows CE or Pocket PC System requirements
McAfee VirusScan for Windows CE or Pocket PC will install and run on any IBM PC or PC-compatible computer equipped with ActiveSync 3.0 or later. Any CE device with ActiveSync 3 will function properly.
Symbian EPOC System requirements
McAfee VirusScan for Symbians EPOC will install and run on any IBM PC or PC-compatible computer equipped with PsiWin 2.3 (or equivalent for non-Psion EPOC devices. All EPOC devices should ship with PsiWin 2.3 /EPOC Connect 5. These include:
n Psion Revo n Psion Series 5mx n Psion Series 7 n Psion netBook n Oregon Scientific Osaris n Ericsson MC218 n Ericsson R380
If you have an older device but the current PsiWin/EPOC Connect software, McAfee VirusScan for Symbians EPOC will function properly, including the Psion HC, the MC series, the Workabout series, all Psion Series 3 models, the Psion Sienna, the Psion Series 5, the Geofox One, and the Phillips Illium.
If you do not have PsiWin 2.3, Symbian offers a free product called EPOC Connect Lite which also works.
14 McAfee Internet Security 5.0

Installation steps

After inserting the McAfee Internet Security 5.0 installation CD into your computers CD-ROM drive, an Autorun image should automatically display. To install McAfee Internet Security software immediately, click Install McAfee Internet Security, then skip to Step 5 to continue with Setup.
Use the steps b e low to i nst al l you r sof twa re.
1 If your computer runs Windows 2000 Professional, or Windows XP, log
on to your computer as a user with administrative rights. You mus t have administrative rights to install this software.
2 Insert th e McAfee Internet Security 5.0 CD in to you r computer ’s
CD-ROM drive. If the Installation Wizard does not automatically display, go to Step 3. Otherwise, skip to Step 4.
3 Use the following procedure if the Autorun installation menu does not
display, or, if you obtained your software via download at a McAfee web site.
a From the Windows Start menu, select Run.
b Type <X>:\SETUP.EXE in the text box provided, then click OK.
Installing McAfee Internet Security
The Run dialog box displays.
4 Here, <X> represents the drive letter for your CD-ROM drive or the path
to the folder that contains your extracted McAfee Firewall files. To search for the correct files on your hard disk or CD-ROM, click Browse.
a Before proceeding with the installation, Setup first checks to see
whether your computer has the Microsoft Windows Installer (MSI) utility running as part of your system software. If your computer runs Windows XP, the current version of MSI already exists on your system. If your computer runs an earlier Windows release, you may still have MSI in your computer if you previously installed other software that uses MSI. In either of these cases, Setup will display its first wizard pane l immediately. Skip to Step 5 t o continue.
b If Setup does not find MSI or an earlier version of MSI is installed
in your computer, it installs files necessary to continue the installation, then prompts you to restart your computer. Click Restart System. When your computer restarts, Setup will continue from where it left off.
5 Refer to steps displayed on the Installation Wizard to complete your
installation.
Product Guide 15
Installing McAfee Internet Security
NOTE
If your computer does not have the required fonts to view the End Users License Agreement (EULA), then you may locate the appropriate EULA on your McAf ee software installation CD. You must read and agree to the terms of the agreement to complete your installation.

Troubleshooting installation problems

A failed installation can cause software problems that are difficult to track down. The major causes of installation failure are:
n Attempting to install while other software is running. n Temporary files that conflict with the installation. n Hard drive errors.
Follow the procedure outlined below to minimize the affect that these common conditions may have on your installation.
Step 1: Close other software
Disable all software running in the background:
1 Hold down the Ctrl and Alt keys on your keyboard, and then press the
Delete key once. The Close Program dialog box appears.
2 Click End Task for every item on the list except Explorer. 3 Repeat step s 2 and 3 until y o uve closed everything except Explorer. 4 When you see only Explorer in the Close Program dialog box, click
Cancel.
Step 2: Remove t empor ary f iles
Delete the contents of the Windows Temp folder:
1 Double-click the My Computer icon on your desktop. The My Computer
window opens. Double-click the C: drive. You are now viewing the contents of your hard drive.
2 Double-click the Windows folder. 3 In the Windows folder, double-click the Temp folder. 4 In the menu, click Edit, then click Select All. All of the items in your
Temp folder are highlighted.
5 Press the Delete key on your keyboard to delete the files. If Windows
asks about deleting files, click Yes.
16 McAfee Internet Security 5.0
Installing McAfee Internet Security
6 In the Windows taskbar, click Start, then click Shut Down. 7 Click Restart the computer, then click Yes in the Shut Down Windows
dialog box to restar t your PC.
Step 3: Clean your hard drive
Run the Windows hard drive utilities, ScanDisk and Disk Defragmenter to identify and fix any error s on you r hard drive:
1 Click Start on the Windows taskbar, point to Programs, then Accessories,
then System Tools, and click ScanDisk .
2 In the ScanDisk window, select Standard and Automatically fix errors. 3 Click Advanced. In the Advanced Settings dialog box, make sure the
following settings are selected:
M Only if errors found M Replace log M Delete M Free
4 Ignore the other options, and click OK. Click Start. ScanDisk begins
scanning your drive for errors. Depending on the size of your hard drive, ScanDisk may take several minutes to complete its job.
5 When ScanDisk is finished, close ScanDisk. 6 Click Start on the Windows taskbar, point to Programs, then Accessories,
then System Tools, and click Disk Defragmenter.
7 Click OK to start Disk Defragmenter. Depending on the speed of your
computer and the size of your drive, this may take several minutes to complete.
8 Close Disk Defragmenter when it has finished defragmenting your disk.

Removing or modifying your McAfee I nternet Security installation

If your computers operating system is...
n Windows 2000 Professional n Windows XP Home Edition n Windows XP Professional Edition
Product Guide 17
Installing McAfee Internet Security
... you must log on to your computer using a profile with administr ative rights. Then do the following.
1 From the Windows Control Panel, start the Add/Remove applet. 2 Select McAfee Internet Security and click:
M Remove to remove McAfee Internet Security from your computer. M Change to modify your McAfee Internet Security installation.
3 Refer to steps displayed on the McAfee Internet Security Installation
Wizard to complete your changes. Restart your computer as directed by setup.

Important information about Windows XP migration

Upgrading your computer's operating system from any version of Windows to Windows XP causes all McAfee products installed before migration to become disabled after migration to Windows XP.
You will be made aware of this situation as you make your first attempt to start a McAfee product (after migration) - you will be instructed to reinstall the product.
As such, you will need to uninstall all McAfee products and reinstall using your installation CD or the software obtained from McAfee via download.
18 McAfee Internet Security 5.0

Getting Started with McAfee Internet Security 5.0

McAfee Internet Security is a simple program to use. In fact, this one chapter covers the main things you need to know about using McAfee Internet Security . You begin with answering a few questions via the Interview so that McAfee Internet Security can effectively use its feature to protect you from Internet threats.
3

Introduction

The McAfee Internet Security 5.0 Home page is your central entry point to access and use all of McAfee Internet Securitys tasks, wizards, and components. This screen displays three regions that provide you with dynamic information about current status and navigation links to all tasks.
Product Guide 19
Getting Started with McAfee Internet Security 5.0

The Title bar and Tool bar

Title bar
The Home page displays most of your standard Windows elements; that which includes:
n The title bar displays the name of the program that is currently running. n Close and minimize buttons. McAfee Internet Security 5.0s interface is
of fixed length and width. You cannot resize the interface.
Tool bar
The tool bar displays four browser-like buttons that are common to all screens.
n Back. Click Back to return to the last screen viewed. n Home. Click Home to go to the McAfee Internet Security Home page
from any screen.
n Next. In conjunction with the Back button, use Next to go to any
previously viewed screen during your current session.
n Help. Click Help to view its submenu. The Help submenu may include
any of the following items.
Help submenu item Select this item to...
Help on this page w View online Help for the screen you are currently
Contents and index Help on the Web
McAfee at Home on the Web
About McAfee Internet Security

Status information

Depending upon your configuration, the McAfee Internet Security 5.0 Home page displays other helpful information such as:
n The name or user name of the person currently logged in represented by
Welcome (name)...
n Running status:
20 McAfee Internet Security 5.0
viewing.
w View online Help for McAfee Internet Security. w Start your Internet browser and go directly to the
McAfee Help Web site at McAfeeHelp.com.
w Start your Internet browser and go directly to
McAfee-at-home.com.
w Version information about McAfee Internet
Security.
Getting Started with McAfee Internet Security 5.0
M If McAfee Internet Security is not running displays, click Start
McAfee Internet Security to start the program.
M If McAfee Internet Security is running displays, click Stop McAfee
Internet Security to stop the program.
n Update status:
M If McAfee Internet Security is up-to-date displays, you are using
the most current version of McAfee Internet Security 5.0.
M If Check for an update displays, click Download update to start
McAfee Instant Updater and check for an update to McAfee Internet Security 5.0.
n Number of warnings logged.
M If one or more warnings were logged and not reviewed, click View
warnings to start the Activity log page.
M For more information about Activity logs, please refer to online
Help.
McAfee Firewall st atu s
In order to view McAfee Firewall status information, you must first activate McAfee Firewall. Activation requires that you perform a few preliminary configuration steps; the Firewall Configuration Assistant guides you through this process.

About Tasks

If the Network Traffic monitor does not display on the McAfee Internet Security home page, click Activate McAfee Firewall to start the McAfee Firewall Configuration Assistant.
For more information about the Network Traffic monitor or the McAfee Firewall Configuration assistant, please refer to McAfee Firewall on page 67.
The Task pane displays links that allow you to start McAfee Internet Securi ty’s Tasks. Depending upon your configuration, the Task pane displays McAfee, links that allow you start the Home page for any other current McAfee product that you have installed in your computer.
Starting a task is as easy as clicking its link. The Task list allows you to start McAfee Internet Securitys major components. Although the tasks you can perform will vary based upon your computers operating system and its configuration, primary tasks include:
Change user settings
Select this task to perform the following:
Product Guide 21
Getting Started with McAfee Internet Security 5.0
n Add or remove a user. n Change a user or the Administrators settings.
The User Setting s pr operties sheet
The User Settings property sheet allows the Administrator to configure their own personal settings or any other us ers settings. Self-administrating users can only change their personal settings.
There are four tabs on the user settings property s heet Each tab allows you t o configure settings - grouped by their classification.
n Privacy settings:
Click the Privacy Settings tab to configure your Internet privacy level. For example, you can filter Cookies, Web bugs and block annoying ads and pop up windows encountered while browsing th e Internet.
You can also configure Web Trail cleaner to remove records stored on your computer that were created as you used the Internet. Records of this type include Temporary Internet Files and historical records such as URLs visited, created by your Internet browser.
The Privacy settings sheet allows you to protec t personal information about each user that you want to protect from prying eyes and programs while browsing the Internet.
n Security Settings:
Click the Security Setting tab to monitor your Internet connection and safeguard your computer against suspicious and potential malicious activities. Additionally, you can configure McAfee Internet Security to alert you if you visit harmful Web sites; or if a program in your computer attempt to access th e Internet without your knowl edge.
n From this page of the Change User Settings property sheet, you can
setup File Guardian to protect files, folders, programs, and drives from unauthorized a ccess.
n User Preferences:
The User Preferences tab on the Change User Settings property sheet enables all users to configure how McAfee Internet Security responds to particular events. Here you configure how McAfee Internet Security starts, ho w it should alert you, and manage user passwords.
22 McAfee Internet Security 5.0
Getting Started with McAfee Internet Security 5.0
n Parental Controls:
This page of the Change User Settings property sheet displays for restricted user profiles - only. In other words, this page does not display if the user possesses a self-administrating profile or is the McAfee Internet Security Administrator.
Here you will enable or disable parental controls, and set the content ratings for the selected user. Other tasks tha t you can p erform f rom this section of the Change User Settings property sheet include:
M Filter Web sites, chat, and instant messaging for content, that which
includes the blocking of access to proxy sites.
M Identify the time-of-day a restricted user profile is allowed to access
the Internet.
M Explicitly block or allow a restricted user profile the ability to use
specific programs installed in the computer and limit their access to Internet Newsgroups.
Perform a Security Check
After completing the interview, youll want to find out how your PC may be at risk. Security Check examines your PC for privacy and security problems and then guides you through fixing any problem it finds. If you are using the settings suggested by McAfee Internet Security in the interview, you only need to run Security Check right after installat ion and then every month or so. If you reduce the level of protection, you should run Security Check more frequently.
You can also change the Security Check settings to customize how you want this feature to work on your computer.
View Activity Log
McAfee Internet Security now provides a list of activities that an Administrator can view via the Activity Logs feature. This list is generated based on his preferred security and privacy settings for himself and for other profiled users he created. Anything from dates and time that a user logged on, to PC maintenance, and violation (e.g., a user attempting to pass a credit card number) can be viewed at the single click of a button.
Product Guide 23
Getting Started with McAfee Internet Security 5.0
The Administrator can print, save or clear this list which contain any of the following:
Activity log tab Description
Violations w Displays any activity of a pr of iled user that
All
Firewall
For step-by-step instructions on working with any of the report logs, see McAfee Internet Security online Help.
Set Startup Options
This task allows you to start and st op McAfee Internet Secur ity manu ally and to configure McAfee Internet Security to start as Windows starts.
violates any of the preset protection settings that the Administrator has indicated (e.g., attempting to pass a credit card number). It also displays the day, date and time that the us er logon and off on the computer.
w Displays list of actions that McAf ee Internet
Security performed including the specific feature used to complete the task.
w Displays detailed loggin g in fo rm a tion as it
relates to McAfee Firewall.
Configuration Assistant
Select this task to start the McAfee Internet Security Configuration Assistant. The Configuration Assistant provides you with an easy means of customizing your McAfee Internet Security settings.
Other Tasks
McAfee Internet Security 5.0 is a fully integrated suite that protects and secures your computer and connection to the Internet. In addition to the wizards and features described earlier in this chapter, McAfee Internet Security also includes utilities such as QuickClean Lite, McAfee Shredder, Instant Updater.
Although you can start McAfee Internet Securitys shared feature s from the the Windows Start Menu, you can also start these programs directly from the Other Tasks Task list item.
From the Other Tasks screen you can start:
n McAfee Instant Updater. n QuickClean Lite
24 McAfee Internet Security 5.0
n Shredder n Safe & Sound (Please note, the link to start this utility displays only if
your computers operating systems is Windows 98 or Windows Me.).
n Visual Trace (You must install McAfee Firewall to see this link).

About the McAfee list

The McAfee list displays links to start the Home page to any other supported McAfee product. With this release of McAfee Internet Security 5.0, click the Firewall and VirusScan Home Edition links to start the respective program.
Getting Started with McAfee Internet Security 5.0
Product Guide 25
Getting Started with McAfee Internet Security 5.0

How to use the McAfee Internet Security Configuration Assistant

Although McAfee Internet Security is set up to use security and privacy settings that are appropriate for most users, some features require your input.
Each interview screen either tells you about a McAfee Internet Security feature, asks you to enter information, or asks you how you want McAfee Internet Security to respond to certain situations.
On each interview screen you can click Back to return to a previous screen or click Next to move to the next screen. In the final interview screen, you click Finish to save the settings you selected and close the Interview.
What information do es Mc Afee I nte rnet Secur it y ask m e to ent e r?
The McAfee Internet Security interview asks you to enter the personal and financial information that you want to protect. All the information you enter into McAfee Internet Security is stored in an encrypted form on your hard disk – it is never sent to McAfee Software.
You may want to gather your personal information before you start the interview. During the interview, McAfee Internet Security allows you to enter:
n A password that you can use to protect your McAfee Internet Security
information.
n Information about other users of your computer. If you are the
Administrator, you can create user profiles and set protection settings that McAfee Internet Security uses whenever a user is using the Internet via your computer.
n Personal and financial information that you want to protect from being
sent out over the Internet without your knowledge:
w Name w Social Security number w Address w E-mail address w Telephone number w Other financial number s such as bank account,
n Any Web site login names and passwords that you want to store in
Password Manager.
26 McAfee Internet Security 5.0
brokerage account, credit card, phone card, and so on.
Getting Started with McAfee Internet Security 5.0
n For optimal protection by Identity Protector, include all dashes (such as
Social Security number, bank account numbers, brokerage a ccounts, and ATM cards). For e xample, if you enter 123-45-6789 as your social secur ity number, McAfee Internet Security will recognize the number with or without the dashes. If you enter 123456789, McAfee Internet Security wont alert you if the number is sent out with dashes (123-45-6789). Credit cards do not need dashes because you type the numbers into separate boxes.

How the McAfee Internet Security Administrator Works

Since McAfee Internet Security now offers multi-user logon capabilities, this feature allows one user to act as the administrator of personal information, protection and security settings entered via the McAfee Internet Security features. This is particularly useful if for example, you would want to filter, block or monitor certain types of information that you do not want your children to access when browsing the Internet.
Creating the McAfee Internet Security Administrator account can only be done in the Interview feature of McAfee Internet Security. And only the designated Administrator can access and change information and protection settings of the computer.
After this setup is complete, the Administrator can add other us ers and set the levels of security and protection for each user profile.
TIP
When adding user profiles, the Administrator can designate a user as a Self-Administrator.
See the McAfee Internet Security online Help to view step-by-step instructions on how to set an Administrator account.

Self-Administrating users

The McAfee Internet Security Administrator may designate another us er as a Self-Administrator. This feature may be used if for example, the user is an adult and is deemed responsible enough to customize their privacy and protection settings.
Self-administrating users cannot change the Privacy, Security, or User Preferences settings for any other McAfee Internet Security user.
See the McAfee Internet Security online Help to view step-by-step instructions on how to designat e a user as a Self-Admi n istrator.
Product Guide 27
Getting Started with McAfee Internet Security 5.0

The Administrator's password

As Windows starts, McAfee Internet Security prompts you to enter the password set during the Interview. Without the password, the owner of the Administrator profile cannot log into and start McAfee Internet Security.
Although the owner of the Administrator profile cannot log in, users with a self-administrating or restricted user profiles can continue to use McAfee Internet Security normally. However, if the McAfee Internet Security administrator cannot log in, he or she cannot add, delete, or modify the settings for any user profile, including their own. Additionally, McAfee Internet Security settings cannot be modified.
Therefore, it is very highly recommended that the owner of the Administrator profile create a password that they will not forget, or, write the password down on a piece of paper and store it in a secure location.

Forgotten passwords

Please do not lose or forget the Administrator's password.
As described above, you must use the Administrator's profile to effectively use and configure McAfee Internet Security. Due to the high security risk it poses to you, we cannot describe the solution to recovering a lost or forgotten Administrator profile password in this Product Guide, via online Help, or at our Internet web site.
If you need to obtain a solut ion to this problem, you may contact our Technical Support department for assistance. Please refer to Product Support and
Customer Service on page 95 for further details.
Again, we must stress, please do not forget, or misplace the Admin profile password.

How User Setup Works

The Administrator can add, edit and delete profiles of other users who browse the Internet through the same computer. After profiling users, the Administrator can customize their individual protection settings, including Internet filtering options and monitor their browsing habits.
To customize protection settings for another user, click the Change user settings task displayed on the McAfee Internet Security Home page, the User Setup screen is displayed. You can add, edit or delete a users profile from this screen. Click any of the buttons available and follow through the ins tructions displayed on screen. Refer to online Help to view more about how to add, edit or delete a users profile.
28 McAfee Internet Security 5.0

Using McAfee VirusScan

McAfee Internet Security uses McAfee VirusScan to address virus-related problems you may encounter through the Internet. This fea ture allows you to set how to perform a virus scan operation on your computer; w hat to do if a virus is found; and how it should alert you once the virus is detected. You can also direct VirusScan to keep a record of actions performed on your computer. For more info r m ation, see McAfee VirusScan Home Edition on page 49

Viewing Activity Logs

McAfee Internet Security now provides a list of activities that an Administrator can view via the Activity Logs feature. This list is generated based on his preferred security and privacy settings for himself and for other profiled users he created. Anything from dates and time that a user logged on, to PC maintenance, and violation (e.g., a user attempting to pass a credit card number) can be viewed at the single click of a button.
The Administrator can print, save or clear this list which contain any of the following:
Log Type Description
Getting Started with McAfee Internet Security 5.0
.
Violation w Displays any activity of a pr of iled user that
violates any of the preset protection settings that the Administrator has indicated (e.g., attempting to pass a credit card number).
Maintenance
Activity
w Displays list of actions that McAf ee Internet
Security performed including the specific feature used to co mplete the task.
w Displays identity of profile d user who browsed
the Internet using the computer. It also displays the day, date and time that the us er logon and off on the computer.
For step-by-step instructions on working with any of the report logs, see McAfee Internet Security online Help.
Product Guide 29
Getting Started with McAfee Internet Security 5.0

Keep your program up-to-date

As technologies advance, we continually provide updates to McAfee software products. Updates include new product content, updates to anti-virus signature files, etc. To ensure the highest level of protection, you should always obtain the latest version of your McAfee product. McAfees Instant Updater component allows you to obtain and apply updates to your McAfee products while connected to the Internet. To learn more about Instant Updater, please see Updating McAfee Internet Security on page 93
If you purchased McAfee Internet Security on CD, you should ru n Update even if youve just installed McAfee Internet Security. In the time between when the CD was created and when you installed it, updates to the product itself as well as new virus patterns are likely to be available.
TIP
McAfee Internet Security comprises of several major components. Updates must be individually obtained and downloaded for each component.
For example, if you are viewing the Firewall component from within the McAfee Internet Security main window, then if you select Check for a Firewall Update, Instant Updater checks for, downloads, and installs updates to McAfee Firewall onl y. This applies to all McAfee Internet Security components.
.
30 McAfee Internet Security 5.0
Loading...
+ 92 hidden pages