Mcafee INTERNET SECURITY 5.0 User Manual

McAfee Internet Security 5.0
VERSION 5.0
PRODUCT GUIDE
COPYRIGHT © 2002 Networks Associates Technology, Inc. and its Affiliated Companies. All Rights Reserved. No
part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means without the written permission of Network Associates, Inc.
ANTIVIRUS ANYWARE AND DESIGN, BOMB SHELTER, CERTIFIED NETWORK EXPERT, CLEAN-UP, CLEANUP WIZARD, CNX, CNX CERTIFICATION CERTIFIED NETWORK EXPERT AND DESIGN, CYBERCOP, CYBERCOP (IN KATAKANA), CYBERMEDIA, CYBERMEDIA UNINSTALLER, DESIGN (STYLIZED N), DISK MINDER, DISTRIBUTED SNIF FER SYSTEM, DISTRIBUTED SNIFFER SYSTEM (IN KATAKANA), DR SOLOMON’S, DR SOLOMON’S LABEL, ENTERPRISE SECURECAST, ENTERPRISE SECURECAST (IN KATAKANA), EZ SETUP, FIRST AID, FORCEFIELD, GMT, GROUPSHIELD, GROUPSHIELD (IN KATAKANA), GUARD DOG, HELPDESK, HOMEGUARD, HUNTER, ISDN TEL/SCOPE, LANGURU, LANGURU (IN KATAKANA), M AND DESIGN, MAGIC SOLUTIONS, MAGIC SOLUTIONS (IN KATAKANA), MAGIC UNIVERSITY, MA GICSPY, MAGICTREE, MCAFEE, MCAFEE (IN KATAKANA), MCAFEE AND DESIGN, MULTIMEDIA CLOAKING, NET TOOLS, NET TOOLS (IN KATAKANA), NETCRYPTO, NETOCTUPUS, NETSCAN, NETSHIELD, NETSTALKER, NETWORK ASSOCIATES, NETXRAY, NOTESGUARD, NUTS & BOLTS, OIL CHANGE, PC MEDIC, PC MEDIC 97, PCNOTARY, PGP, PGP (PRETTY GOOD PRIVACY), PRETTY GOOD PRIVACY, PRIMESUPPORT, RECOVERKEY, RECOVERKEY - INTERNATIONAL, REGISTRY WIZARD, REPORTMAGIC, RINGFENCE, ROUTER P M, SALESMAGIC, SECURECAST , SERVICE LEVEL MANAGER, SERVICEMAGIC, SMARTDESK, SNIFFER, SNIFFER (IN HANGUL), SNIFFMASTER, SNIFFMASTER (IN HANGUL), SNIFFMASTER (IN KATAKANA), SNIFFNET, STALKER, SUPPORTMAGIC, TIS, TMEG, TNV, TVD, TNS, TOTAL NETWORK SECURITY, TOTAL NETWORK VISI BILITY, TOTAL NETWORK VISIBILITY (IN KATAKAN A), TOTAL SERVICE DESK, TOTA L VIRUS DEFENSE, TRUSTED M AIL, UNINSTALLER, VIREX, VIRUS FORUM, VIRUSCAN, VIRU SSCAN, WEBSCAN, WEBSHI ELD, WEBSHIELD (IN KATAKANA), WEBSNIFFER, WEBSTALK ER, WEBWALL, WHO’S WATCHING YOUR NETWORK, WINGAUGE, YOUR E-BUSINESS DEFENDER, ZAC 2000, ZIP MANAGER are registered
trademarks of Net work As socia tes, Inc. and/or its affi liates i n the US an d/or ot her coun tries . All other registered and unregistered trademarks in this document are the sole property of their respective owners. © 2002 Networks Associates Technology, Inc. All Rights Reserved.
Issued August 2002 / Product Guide v5.0
McAfee Perpetual End User License Agr eement – United States of America
NOTICE TO ALL USERS: CA REFULLY READ THE FOLLOWING LEGAL AGREEMENT ("AGREEMENT"), FOR THE LICENSE OF SPECIFIED SOFTWARE ("SOFTWARE") PRODUCED BY NETWORK ASSOCIATES, INC. ("McAfee"). BY CLICKING THE ACCEPT BUTTON OR INSTALLING THE SOFTWARE, YOU (EITHER AN I NDIVIDUAL OR A SINGLE ENTITY) CONSENT TO BE BOUND BY AND BECOME A PARTY TO THIS AGREEMENT. IF YOU DO NOT AGREE TO ALL OF THE TER MS OF THIS AGREEMENT, CLICK THE BUTTON THAT INDICATES THAT YOU DO NOT ACCEPT THE TERMS OF THIS AGREEMENT AND DO NOT INSTALL THE SO FTWARE. (IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO THE PLACE OF PURCHASE FOR A FULL REFUND.)
1. License Grant. Subject to the payment of the applicable license fees, and subject to the terms and conditions of
this Agreement, McAfee hereby grants to you a non-exclusive, non-transferable right to use one copy of the specified version of the Software and the accompanying docume ntation (the "Documenta tion"). You may instal l one copy of t he S oftwar e on one co mpute r, w orkst atio n, pe rsona l di gita l ass istan t, pa ger, "sma rt ph one" or ot her electronic device for which the Software was designed (each, a "Client Device"). If the Software is licensed as a suite or bundle with more than one specified Software product, this license applies to all such specified Software produ ct s, subject to any restri ct ions or usage terms specified on the applicable price list or product packaging that apply to any of such Software products individually.
a. Use
b. Server-Mo de U se
c. Volume License Use
. The Software is licensed as a single product; it may not be used on more than one Client Device or by more than one user at a time, except as set for th in th is Section 1. The Software is "in use" on a Client Device when it is l oaded into th e temporary memory (i.e. , random-a ccess memory or RAM) or installed into the permanent memory (e.g., hard disk, CD-ROM, or other storage device) of that Client Device. This license authorizes you to make one copy of t he Software solely for backup or archiv al purposes, p rovided t hat th e copy yo u make co ntains all of the Sof tware' s propri etar y notice s unalt ered and unobstructed.
. You may use the Software on a Client Device as a server ("Se rver") within a multi-user or n et wor ke d en vi ronm ent (" Se rver -Mo de" ) on ly if s uch use is pe rmit te d i n the a p pl icab le price list or product packaging for the Software. A separate license is required for each Client Device or "seat" that may connect to the Server at any time, regardless of whether such licensed Client Devices or seats are concurrently connected to, accessing or using the Sof t w are. Use of software or hardware that reduces the numbe r of Client Devic es or seats directly accessing or utilizing th e Software (e.g ., " m ultiplexing" or "pooling" software or hardware) d oes not reduce the number of licenses required (i.e., the required number of licenses would equal the number of distinct inputs to the multiple xing or pooling software or hardware " front end "). If the number of Client Devices or seats that can conn ect to th e Soft war e can exce ed th e numbe r of li censes you ha ve obt aine d, the n you mus t have a reasonable mechanism in place to ensure that your use of the Software does not exceed the use limits specified for the licenses you have obtained. This l icen se au th or iz es you t o make o r d ownlo ad one copy of the Documentation for each Client Device or seat that is licensed, provided that each such copy contains all of th e D ocumentation's proprietary notices una ltered and unobstruct ed.
. If the Software is licens ed with volume license terms s pecified in the applic able product invoicing or product packaging for the Software, you may make, use and install as many additional copies of the Software on the number of Client Devices as the volume license te rms specify. You must have a reasona ble mechanism in place to ensure that the number of Client Devices on which the Software has be en installed does no t ex ceed the number of licenses you have obtain ed. This license authorizes you to make or download one copy of the Documentation for each additional copy authorized by the volume license, provided that each su ch copy contains all o f t he D ocumentation' s proprietary noti ce s unaltered and unobst ructed.
Product Guide iii
2. Term. This Agreement is effective for an unlimited duration unless and until earlier terminated as set forth
herein. This Agreement will terminate automatically if you fail to comply with any of the limitations or other requirements described herein. Upon any termination or expiration of this Agreement, you must cease use of the Software and destroy all copies of the Software an d the Documentat ion.
3. Updates. For the time period specified in the applicable product invoicing or product packaging for the
Software, you are entitled to download revisions or updates to the Software when and as Mc Afee publishes t hem via its elect ronic bullet in boar d syste m, websi te or t hrough o ther on line ser vices. For a pe riod of ninety (90) days from the date of the of original purchase of the Software, you are entitled to download one (1) revision or upgrade to the Software when and as McAfee publishes it via its electronic bulletin board system, website or through other online services. After the specified time period, you have no further rights to receive any revisions or upgrades with out purchase of a new lic ense to the Software .
4. Ownership Ri ghts. The Software is protected by U ni t ed St ates copyright laws and international treaty
provisions. McAfee and its suppliers o wn and retain all right, title and intere st in and to the Software, in cludin g all copyrights, patents, trade secret rights, trademarks and other intellectual property rights therein. Your possession, installatio n, or us e of the Software does not trans fer to you any title to the in tellectual p roperty in the Software, and you will not acquire any rights to the Software e xcept as e xpressly s et for th in thi s Agreement. All copies of the Software and Documentation made hereunder must contain the same proprietary notices that appear on and in the Softw ar e and Documentati on.
5. Restrictions. You may not sell, lease, license, rent, lo an or otherwise transf er, with or without consid eration, the
Software. Mc A fee updates its Soft ware frequently and performance dat a for its Software change. Before conducting be nchmark tests rega rding this Softwa re, contact McAfe e to verify that You possess the correct Software for the test and the then current version and editio n of the Software . You agree not to permit any third party (other than t hi rd parties under contract with You whic h contains nondiscl os u r e obligations no less restrictive than thos e set forth herein) to use the Licensed Pro gram in any form and sha ll use all reasonab le efforts to ensure that no im p r oper or unauthorize d use of the Licensed Prog r am is made. You may no t p ermit third parties to benefit from the use or functionality of the Software via a timesharing, service bureau or other arrangement, except to the extent such use is specified in the applicable list price or product packaging for the Software. You m ay not transfer any of th e ri ghts granted to you under this Agreement. You may not re ver se engineer, decompile, or disassemble the Software, except to the extent the forego in g restriction is ex pr essly prohibited by applicable law. You may not mo dify, or crea te derivative wo rks based upon, the Software in whole or in part. You may not copy the Software or Documentation except as expressly permitted in Section 1 above. You may not rem ove any proprieta ry notices or labels on the Software. All ri ghts not expressly set forth hereunder are res erved by McAfee.
6. Warranty and Disclaimer.
a. Limited Warranty
. McAfee warrants that for sixty (60) days from the date of original purchase the media (e.g., diskettes) on which the Software is contained will be free from defects in materials and workmanship.
b. Customer Remedies
. McAfee's and its suppliers' entire liability and your exclusive remedy for any breach of the fo regoing warranty s hall be, at McAfee' s option, either (i) return of the purchase price paid for the license, if any, or (ii) replacement of the defective media in which the Software is contained. You m us t r et ur n the defective media to M cAfee at your expense w ith a copy of your receipt. This limited war ranty is void if the defect has resu lted from accident , abuse, or misapp lication. Any replacement media will be warran te d for the remainder of the original warranty period. Outside the United States, this remedy is not available to the extent McAfee is subject to restrictions under United States export control laws and regulations.
iv McAfee Internet Security 5.0
c. Warranty Disclaimer. Except for the limited warranty set forth herein, THE SOFTWARE IS
PROVIDED "AS IS." TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, MCAFEE DISCLAIMS ALL WARRANTIES, EI THER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NONINFRINGEMENT WITH RESPECT TO THE SOFTWARE AND THE ACCOMPANYING DOCUMENTATION. YOU ASSUME RESPONSIBILITY FOR SELECTING THE SOFTWARE TO ACHIEVE YOUR INTENDED RESULTS, AND FOR THE INSTALLATION OF, USE OF, AND RESULTS OBTAINED FROM THE SOFTWARE. WITHOUT LIMITING THE FOREGOING PROVISIONS, MCAFEE MAKES NO WARRANTY THAT THE SOFTWARE WILL BE ERROR-FREE OR FREE FROM INTERRUPTIONS OR OTHER FAILURES OR THAT THE SOFTWARE WILL MEET YOUR REQUIREMENTS. SOME STATES AND JURISDICTIONS DO NOT ALLOW LIMITATIONS ON IMPLIED WARRANTIES, SO THE ABOVE LIMITATION MAY NOT APPLY TO YOU. The foregoing provisions shall be enforceable to the maximum extent permitted by applicable law.
7. Limitation of Liability. UNDER NO CIRCUMSTANCES AND UNDER NO LEGAL THEORY, WHETHER
IN TORT, CONTRACT, OR OTHERWISE, SHALL MCAFEE OR ITS SUPPLIERS BE LIABLE TO YOU OR TO ANY OTHER PERSON FOR ANY INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES OF ANY CHARACTER INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF GOODWILL, WORK STOPPAGE, COMPUTER FAILURE OR MALFUNCTION, OR FOR ANY AND ALL OTHER DAMAGES OR LOSSES. IN NO EVENT WILL MCAFEE BE LIABLE FOR ANY DAMAGES IN EXCESS OF THE LIST PRICE MCAFEE CHAR GES FOR A LICENSE TO THE SOFTWARE, EVEN IF MCAFEE SHALL HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. THIS LIMITATION OF LIABILITY SHALL NOT APPLY TO LIABILITY FOR DEATH OR PERSONAL INJURY TO THE EXTENT THAT APPLICABLE LAW PROHI BITS SUCH LIMITATION. FURTHERMORE, SOME STATES AND JURISDICTIONS DO NOT ALLOW THE EXCLUSION OR LIMITATION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THIS LIMITATION AND EXCLUSION MAY NOT APPLY TO YOU. The foregoing provisions shall be enforceable to the maximum extent permitted by applic able law.
8. United States Government. Th e Software and accompanying Documentation are deemed to be "commercial
computer software" and "commercial computer software documentation," respectively, pursuant to DFAR Section 227.7202 and FAR Section 12.212, as applicable. Any use, modification, reproduction, release, performance, di splay or disclosure of the Software an d accompanying Do cumentation by th e U ni t ed States Government shall be govern ed solely b y the ter ms of this Agreement and shall b e prohibite d except t o the ex tent expressly permitted by the terms of this Agreement.
9. Export Controls. You are advised that the Software is subject to the U.S. Export Administration Regulations.
You shall not exp ort, import or transfer Software cont rary to U.S. or other applicable laws, w hether directly or indirectly, and will not cause, app ro ve or otherwise facilitate others such as agen ts o r any th ird parties in doing so. You represen t and agrees that neit her the United States Bureau of Export A dministration nor any other federal agency has suspended, revoked or denied your export privileges. You agree not to use or transfer the Software for end use relating to an y nuclear, chemical or biological weapons, or missile technology unless authorized by the U.S. Government by regulation or specific license. Additionally, you acknowledge that the Software is sub j ect to export control regulations in the E ur opean Union and you h ereby declare and agree that the Software will not be used for any other purpose than civil (non-military) purposes. The parties agree to cooperate w ith eac h ot he r with re spec t to any app lic at io n f or a ny req ui re d li cen ses an d ap pr ova ls, ho wev er, yo u acknowledge it is your ultimate responsibility to comply with any and all export and import laws and that McAfee has no further responsibility after the initial sale to you within the original country of sale.
Product Guide v
10. High Risk Activities. The Softwar e i s not fault-tolerant and is not designed o r i nt ended for use in hazardous
environments requiring fa il-safe perf ormance, including wi thout limitatio n, in the operati on of nuclear f acilities, aircraft navigation or communication systems, air traffic control, weapons systems, direct life-support machines, or any other application in which the failure of the Software could lead directly to death, personal injury, or severe physical or property damage (collectively, "High Risk Activities"). McAfee expressly disclaims any express or impli ed w arranty of fitness f o r High Risk Activities .
11. Miscellaneous. This Agreement is governed by the laws of the United States and the State of California,
without reference to conflic t o f laws principles. The applicatio n of th e Unit ed Na tio ns Con v entio n of Contracts for the International Sa le of Goods is e xpress ly exc luded. This Agree ment se ts f orth a ll rig hts for the user of the Software and is the entire agreement between the parties. McAfee reserves the right to periodically audit you to ensure that you are not usi ng an y Soft ware in v io lat io n of t his Agree men t. D uri ng yo ur sta ndar d bus ine ss hour s and upon prior wr itt en notice, McAfee may visit you and you w i ll m ake available to Mc A fee or its representatives any records perta ining to the Softwar e to McAfee. The cost of any requeste d audit will be solely borne by McAfee, unless such aud it di scloses an underpayment or amount due to McAfee in exce ss of five percent (5%) of the initial li cens e f ee fo r th e S of twar e or y ou ar e usin g the Software in an unauthorized manor, in which case you shall pay the cost of the au di t. This Agreement supersedes any other communications w ith respect to the Software and Documentation. This Agreement may not be modified except by a written addendum issued by a duly authorized representative of McAfee. No provision hereof shall be deemed waived unless such waiver shall be in writing and signed by McAfee or a duly authorized representative of McAfee. If any provision of this Agreement is held invalid, the remainder of this Agreement shall continue in full force and effect. The parties c onfirm th a t it is their wish that this Agreement has been writ ten in the English language on ly.
12. MCAFEE CUSTOMER CONTACT. If you have any questions concerning these terms and conditions, or if
you would like to contact McAfee for any other reason, please call (408) 988-3832, fax (408) 970-9727, or write: Network Associ ates, Inc., McAfee Software Division, 3 965 Freedom Circle, Santa Clara, Califo rn ia 95054. http://www.nai.com.
vi McAfee Internet Security 5.0
McAfee Perpetual End User License Agr eement – Canada
NOTICE TO ALL USERS: CA REFULLY READ THE FOLLOWING LEGAL AGREEMENT ("AGREEMENT"), FOR THE LICENSE OF SPECIFIED SOFTWARE ("SOFTWARE") BY NETWORK ASSOCIATES INTERNATIONAL B.V. ("McAfee"). BY CLICKING THE ACCEPT BUTTON OR INSTALLING THE SOFTWARE, YOU (EITHER AN I NDIVIDUAL OR A SINGLE ENTITY) CONSENT TO BE BOUND BY AND BECOME A PARTY TO THIS AGREEMENT. IF YOU DO NOT AGREE TO ALL OF THE TER MS OF THIS AGREEMENT, CLICK THE BUTTON THAT INDICATES THAT YOU DO NOT ACCEPT THE TERMS OF THIS AGREEMENT AND DO NOT INSTALL THE SO FTWARE. (IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO THE PLACE OF PURCHASE FOR A FULL REFUND.)
1. License Grant. Subject to the payment of the applicable license fees, and subject to the terms and conditions of
this Agreement, McAfee hereby grants to you a non-exclusive, non-transferable right to use one copy of the specified version of the Software and the accompanying docume ntation (the "Documenta tion"). You may instal l one copy of t he S oftwar e on one co mpute r, w orkst atio n, pe rsona l di gita l ass istan t, pa ger, "sma rt ph one" or ot her electronic device for which the Software was designed (each, a "Client Device"). If the Software is licensed as a suite or bundle with more than one specified Software product, this license applies to all such specified Software produ ct s, subject to any restri ct ions or usage terms specified on the applicable price list or product packaging that apply to any of such Software products individually which you acknowledge you have received and read.
a. Use
b. Server-Mo de U se
. The Software is licensed as a single product; it may not be used on more than one Client Device or by more than one user at a time, except as set for th in th is Section 1. The Software is "in use" on a Client Device when it is l oaded into th e temporary memory (i.e. , random-a ccess memory or RAM) or installed into the permanent memory (e.g., hard disk, CD-ROM, or other storage device) of that Client Device. This license authorizes you to make one copy of t he Software solely for backup or archiv al purposes, p rovided t hat th e copy yo u make co ntains all of the Sof tware' s propri etar y notice s unalt ered and unobstructed.
. You may use the Software on a Client Device as a server ("Se rver") within a multi-user or n et wor ke d en vi ronm ent (" Se rver -Mo de" ) on ly if s uch use is pe rmit te d i n the a p pl icab le price list or prod uc t p ack ag in g f or t he S of twar e w hic h y ou a ck now le dge y o u hav e r ec eive d and r ea d. A separate licens e is required for each Client Device or "s eat" that may connect to the Server at any time, regardless of whether such licensed Client Devices or seats are concurrently connected to, accessing or using t he Software. Use of software or hardware th at reduces the number of Client Devices or seats directly accessing or utilizing the Software (e.g., "multiplexing" or "pooling" software or hardware) does not reduce the number of licens es required (i.e., the required number of licenses would equal the number of distinct inputs to the multiplexing or pooling software or hardware "front end"). If the number of Client Devices or seats that can connect to the Software can exceed the number of lice nses yo u have obt ained, then you m ust have a reasona ble mecha nism in pl ace to ensure that your use of the Software does not exceed the use limits specified for the licenses you have obtained. This license authorizes you to make or download one copy of the Documentation for each Client Devi ce or sea t that i s licensed , provi ded that each such c opy cont ains all of the Doc umentati on's proprietary noti ce s unaltered and unobst ructed.
Product Guide vii
c. Volume License Use. If the Software is licensed with volume lic ense terms specified in t he applicable
price list or product packaging for the Software, you may make, use and install as many additional copies of the Softw ar e on the number of Client D evices as the volume license authorizes. Y ou must have a reasonable mechanism in place to ensure that t he number of Clien t Devices on which the Software has been installed does not exceed the number of licenses you have obtained. This license authorizes you to m ake or download one co py of the Documentation for each additional copy authorized by th e volume license, provided that each su ch copy contains all o f t he D ocumentation' s proprietary notices unaltered and unobstructed.
2. Term. This Agreement is effective for an unlimited duration unless and until earlier terminated as set forth
herein. This Agreement will terminate automatically if you fail to comply with any of the limitations or other requirements described herein. Upon any termination or expiration of this Agreement, you must cease use of the Software and destroy all copies of the Software an d the Documentat ion.
3. Updates. For th e time period specified in the applicable price list or prod uct packaging for the Software, you are
entitled to download revisions or updates to the Software when and as McAfee publishes them via its electronic bulletin board system, website or through other online services. For a period of ninety (90) days from the date of the of origina l pu rchase of the Software, you are entitled to download one (1) revision or upgrade to the Software whe n and as McAfee publi shes it via its electro nic bulletin board system, websit e or through other online services. After the specified time period, you have no further rights to receive any revisions or upgrades without purchase of a new license to the Software.
4. Ownership Ri ghts. The Software is protected by Uni t ed St ates copyright laws and international treaty
provisions. McAfee and its suppliers o wn and retain all right, title and intere st in and to the Software, in cludin g all copyrights, patents, trade secret rights, trademarks and other intellectual property rights therein. Your possession, installatio n, or us e of the Software does not trans fer to you any title to the in tellectual p roperty in the Software, and you will not acquire any rights to the Software e xcept as e xpressly s et for th in thi s Agreement. All copies of the Software and Documentation made hereunder must contain the same proprietary notices that appear on and in the Softw ar e and Documentati on.
5. Restrictions. You may not sell, leas e, license, rent, lo an or otherwise transf er, with or without consid eration, the
Software. Mc A fee updates its Soft ware frequently and performance dat a for its Software change. Before conducting be nchmark tests rega rding this Softwa re, contact McAfe e to verify that You possess the correct Software for the test and the then current version and edition of the Software. Benchmark tests of former, outdated or inappropriate versions or editions of the Software may yield results that are not reflective of the performance of the current version o r edition of the Software. You agree not to permit any thir d party (other than third parties under contract with you which contract contains nondisclosure obligations no less restrictive than those set forth herein) to use the Software in any form and shall use all reasonable efforts to ensure that there is no improper or un aut horized use of the Sof tware. You may not per m it third parties to benefit from the use or functionalit y of the Software via a timesharing, service bureau o r other arrangement, except to the extent such use is specified in th e applicable list pri ce or product packag in g for the Software. Y ou m ay not transfer any of the rights granted to you under this Agreement. You may not reverse engineer, decompile, or disassemble the Software, except to the extent the foregoing restriction is expressly prohibited by applicable law. The interface information necessary to achieve interopera bility of the Software with indep endently created comp uter programs will be supplied by McAfee on reque st and on payment of suc h reasonable costs and expenses of McAfee in supplying th at i nfor mat i on. Yo u ma y not m odif y, or cre a te de ri vati ve work s ba sed up on, th e Sof twar e in whol e or in part. You may not copy the Software or Documentation except as expressly permitted in Section 1 above. You may not remove or alter any proprietary notices or labels o n the Softwa re or Documen tation . All righ ts not expressly set fo rth hereunder are reserved by McA f ee.
6. Warranty and Disclaimer.
viii McAfee Internet Security 5.0
a. Limi ted Warranty. McAfee warrants that for sixty (60) days from the date of original purchase the
media (e.g., diskettes) on which the Software is contained will be free from defects in materials and workmanship.
b. Customer Remedies
. McAfee's and its suppliers' entire liability and your exclusive remedy for any breach of the fo regoing warranty s hall be, at McAfee' s option, either (i) re t urn of the purchase price paid for the license, if any, or (ii) replacement of the defective media in which the Software is contained. You m us t r et ur n the defective media to M cAfee at your expense w ith a copy of your receipt. This limited war ranty is void if the defect has resu lted from acciden t, abuse, or misapp lication. Any replacement media will be warran te d for the remainder of the original warranty period. Outside the United States, this remedy is not available to the extent McAfee is subject to restrictions under United States export control laws and regulations.
c. Warranty Disclaimer
. Except for the limited warranty set forth herein, THE SOFTWARE IS PROVIDED "AS IS." TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, MCAFEE DISCLAIMS ALL WARRANTIES, REPRESENATIONS AND CONDITIONS, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LI M ITED TO IMP LI ED WARRANTIES OR CONDITIONS OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NONINFRINGEMENT WITH RESPECT TO THE SOFTWARE AND THE ACCOMPANYING DOCUMENTATION. YOU ASSUME RESPONSIBILITY FOR SELECTING THE SOFTWARE TO ACHIEVE YOUR INTENDED RESULTS, AND FOR THE INSTALLATION OF, USE OF, AND RESULTS OBTAINED FROM THE SOFTWARE. WITHOUT LIMITING THE FOREGOING PROVISIONS, MCAFEE MAKES NO WARRANTY, REPRESENTATION OR CONDITION THAT THE SOFTWARE WILL BE ERROR-FRE E OR FREE FROM INTERRUPTIONS OR OTHER FAILURES OR THAT THE SOFTWARE WILL MEET YOUR REQUIREMENTS. SOME STATES AND JURISDICTIONS DO NOT ALLOW LIMITATIONS ON IMPLIED WARRANTIES, SO THE ABOVE LIMITATION MAY NOT APPLY TO YOU.
7. Limitation of Liability. UNDER NO CIRCUMSTANCES AND UNDER NO LEGAL THEORY, WHETHER
IN TORT, CONTRACT, OR OTHERWISE, SHALL MCAFEE OR ITS SUPPLIERS BE LIABLE TO YOU OR TO ANY OTHER PERSON FOR ANY INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES OF ANY CHARACTER INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF GOODWILL, WORK STOPPAGE, COMPUTER FAILURE OR MALFUNCTION, OR FOR ANY AND ALL OTHER DAMAGES OR LOSSES. IN NO EVENT WILL MCAFEE BE LIABLE FOR ANY DAMAGES IN EXCESS OF THE LIST PRICE MCAFEE CHAR GES FOR A LICENSE TO THE SOFTWARE, EVEN IF MCAFEE SHALL HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. THIS LIMITATION OF LIABILITY SHALL NOT APPLY TO LIABILITY FOR DEATH OR PERSONAL INJURY TO THE EXTENT THAT APPLICABLE LAW PROHI BITS SUCH LIMITATION. FURTHERMORE, SOME STATES AND JURISDICTIONS DO NOT ALLOW THE EXCLUSION OR LIMITATION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THIS LIMITATION AND EXCLUSION MAY NOT APPLY TO YOU. The foregoing provisions shall be enforceable to the maximum extent permitted by applic able law.
8. United States Government. The Software and accompanying Documentation are deemed to be "commercial
computer software" and "commercial computer software documentation," respectively, pursuant to DFAR Section 227.7202 and FAR Section 12.212, as applicable. Any use, modification, reproduction, release, performance, di splay or disclosure of the Software an d accompanying Do cumentation by th e U ni t ed States Government shall be govern ed solely b y the ter ms of this Agreement and shall b e prohibite d except t o the ex tent expressly permitted by the terms of this Agreement.
Product Guide ix
9. Export Controls. You have been advised that the Software is subject to the U. S. Export Administrat ion
Regulations and applicable loca l export contro l laws. Yo u shall not export, import or trans fer Pro ducts con trary to U.S. or other applicable local laws , whether directly or indirectly, and will not cause, approve or otherwise facilitate others such a s agen ts or an y third par ties i n doing s o. If appl icable to you, you re present a nd agr ee that neither the Uni ted S tates Bureau of Expo rt Admi nistr atio n nor any other fe dera l agenc y has suspend ed, r evoked or denied your export privileges. You agree not to use or transfer the Software for end use relating to any nuclear, chemical or biological weapons, or missile technology unless authorized by the U.S. Government and any other applicable local authority by regula tion or specifi c license. Additionall y, you acknowledge tha t the Software is subject to exp ort cont rol reg ul at ion s in t he Eur ope an Unio n an d you he reb y de cl are an d ag ree t hat the Sof twar e will not be used for any other purpose than civil (non-military) purposes. The parties agree to cooperate with each other with respect to any application for any required licenses and approvals, however, you acknowledge it is your ultimate responsibi lity to comply with any and all e xport and import laws and that McAfee has no furthe r responsibility after the initial sale to you within the original country of sale.
10. High Risk Activities. The Software is not fault-tolerant and is not designed o r i nt ended for use in hazardous
environments requiring fa il-safe perf ormance, including wi thout limitatio n, in the operati on of nuclear f acilities, aircraft navigation or communication systems, air traffic control, weapons systems, direct life-support machines, or any other application in which the failure of the Software could lead directly to death, personal injury, or severe physical or property damage (collectively, "High Risk Activities"). McAfee expressly disclaims any express or implied warranty or condition of fitness for High Risk Activities.
11. Miscellaneous. This Agreement is governed by the la w s o f t he N etherlands. The app lication of the United
Nations Conven tion of Contract s for the In ternation al Sale of Goods is ex pressly ex cluded. D isputes wi th respe ct to this Agreement, as well as with respect to its conclusion and execution, will be submitted exclusively to the competent court in Amsterdam. This Agreement s ets forth al l rights for the user of the Soft ware and is the ent ire agreement between the parties. McAfee reserves the right to periodically audit you to ensure that you are not using any Software in violation of this Agreement. Durin g your standard business hours an d up on pr io r written notice, McAfee may visit you and yo u w i ll m ake available to McAfee or its represe nt at ives any records pertaining to the Software to McAf ee. The cost of any req ues ted audit will be solely borne by McAfee, unless such audit discloses an underpayment or amount due to McAfee in excess of five percent (5%) of the initial license fee for the Software or you are using the Software in an unauthorized manor, in which case you shall pay the cost of the audit. This Agreement supersedes any other communications with respect to the Software and Documentation. This Agreement may n ot be modified except by a writt en addendum issued by a duly authori zed representative of McAfee. No pr ovi s ion hereof shall be deemed waived un le ss such waiver shall be in writing and signed by McA fee or a d uly auth orize d rep rese ntati ve o f McAf ee. I f an y pr ovis ion of thi s Ag reeme nt is hel d invalid, the remainder of this Agreement shall continue in full force and effect. The parties have required that this Agreement and all documents relating thereto be drawn up in English. Les parties ont demandé que cette convention ainsi que tous les doc um ents que s'y attachent soient rédigés en anglais.
12. MCAFEE CUSTOMER CONTACT. If you have any questions concerning these terms and conditions, or if
you would like to contact McAfee for any other reason, pl ease call +31 20 586 61 00 or write: McAfee, Gatwickstraat 25, 1043 GL Amsterdam, Netherlands. You will find our In ternet web-site at http:// www.nai.com.
x McAfee Internet Security 5.0
Contents
1
Welcome to McAfee Internet Security 5.0 . . . . . . . . . . . . . . . . . . 15
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
What’s included with McAfee Internet Security? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
What’s new in this release? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
About this manual . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
McAfee Internet Security and your online connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
McAfee Internet Security features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
2
Installing McAfee Internet Security . . . . . . . . . . . . . . . . . . . . . . . 21
Before you begin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
System requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Installation steps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Troubleshooting installation problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Removing or modify ing your McA fee In ter n et Securi ty i nstall at io n . . . . . . . . . . . . . . . . . . 25
Important information about Windows XP migration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
3
Getting Started with McAfee Internet Security 5.0 . . . . . . . . . . . 27
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
The Title bar and Tool bar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Status information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
About Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
About the McAfee list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
How to use the McAfe e In tern et Sec ur it y Co nfigu ra ti on Assi sta nt . . . . . . . . . . . . . . . . . . . 34
How the McAfee In te rnet Sec ur it y Administrator Wo rk s . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Self-Administrating users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
The Administrator's password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
Forgotten passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
How User Setup Works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
Using McAfee VirusScan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Viewing Activity Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Product Guide xi
Contents
4
Keep your program up-to-date . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
What Mcafee Internet Security does while your computer is running . . . . . . . . . . . . . . . . . 39
Responding to McAfee Internet Security Alert Messages . . . . . . . . . . . . . . . . . . . . . 39
Using Browser Buddy to manage your web site passwords . . . . . . . . . . . . . . . . . . . 39
Using File Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Security Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
What Gatekeeper Does . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
What File Guardian Does . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
What Password Manager Does . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
Privacy Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
What Cookie Blocker Does . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
What Identity Protector Does . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
What Web Trail Cleaner Does . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
McAfee VirusScan Home Edition . . . . . . . . . . . . . . . . . . . . . . . . . 57
What’s new in this release? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
What comes with McAfee VirusScan? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Getting Started . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
The Title bar and Tool bar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
Status information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
The Task pane . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
Other McAfee VirusScan features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
About VShield Scanner . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
VShield automatic protection settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
How to Start and St op VS hie ld Scan ne r . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
Using Quarantine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
How to managing quarantined files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
Safe & Sound . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
Safe & Sound configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Emergency disk creation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
Using VirusScan With a Wireless Device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
How VirusScan protects your wireless device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
5
McAfee Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
What’s new in this release? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
How McAfee Firewall works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
xii McAfee Internet Security 5.0
Frequently asked questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
Getting Started with McAfee Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
The Configuration Assistant . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
The McAfee Firewall Home page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
Other McAfee Firewall features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
McAfee Firewall Configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
Program configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
System configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
McAfee Firewalls Intrusion Detection System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
How to Configure the Intrusion Detection System . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
Common attacks recognized by IDS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
6
McAfee Internet Security’s Shared Features . . . . . . . . . . . . . . . . 97
QuickClean Lite . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
McAfee Shredder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
7
Updating McAfee Internet Security . . . . . . . . . . . . . . . . . . . . . . 101
About Instant Updater . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
Instant Updater features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
Contents
A
How to contact McAfee . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
www.McAfee-at-Home.com . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
Customer Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
Technical Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
Virus definition renewal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
B
Internet Security and Privacy . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
Networks and the Internet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
About Privacy and Security on the Web . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
Privacy on the Web . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
Security on the Web . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
Computer Viruses and the Web . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
Types of Viruses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
Frequently Asked Questions About Internet Privacy . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114
C
Your McAfee Internet Security To-do List . . . . . . . . . . . . . . . . . 117
Privacy & Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
Product Guide xiii
Contents
Virus Detection and Prevention Tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
Use a Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
Tips to maintaining your computer and its software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
xiv McAfee Internet Security 5.0

Welcome to McAfee Internet Security 5.0

The Internet provides a vast wealth of information and entertainment at your fingertips. Yet, as soon as you connect, your computer is exposed to a multitude of privacy and security threats. Protect your privacy and secure your computer and your data with McAfee Internet Security. Incorporating McAfee's award-winning technologies, McAfee Internet Security provides one of the most comprehensive sets of privacy and security tools you can buy. McAfee Internet Security destroys viruses, outwits hackers, secures your personal information, privatizes your Web browsing, blocks ads and pop ups, manages your cookies and pass words, locks down your files, folde rs and drives, filters objectionable content, and puts you in control of the communications in and out of your PC. McAfee Internet Security provides powerful protection for today's Int e rnet users.

Introduction

In the last few years the Inter net has changed from a communications network that government entities and universities used almost exclusively, to an information treasure house that people of all ages and occupations can now access. With an Internet account, you can send electronic mail (e-mail) around the world in seconds, do research without leaving home, meet new friends in an online chat room, or shop without getting out of your bathrobe. However, with all these conveniences come a certain element of risk. When you use the Internet, information is transmitted from your computer to other computers on the Internet – information you may not want other people to have. And those computers can also send files to your computer that may contain viruses. While most of these files are harmless, some can invade your privacy or even damage the data on your computers hard drive.
1
McAfee Internet Security addresses any of these potential risks with its comprehensive features designed to protect your privacy and security when using the Internet.
With its new features, you can now also act as an Administrator and apply customized protection settings not only for yourself, but for other users of your computer and easily monitor potential risks they may encounter while browsing the Internet.
Product Guide 15
Welcome to McAfee Internet Security 5.0

What’s included with McAfee Internet Security?

n The Administrator: As the Administrator, you are able to set up
protection settings for other users of your computer. You can add, edit and delete a users profilethen setup individual privacy, security and Internet filtering options that McAfee Internet Security will apply whenever any of these users are browsing the Web through your computer.
n Activity Logs: Activity Logs allow you to view a list of all the
interactions that you and other profiled users of your com puter had with McAfee Internet Security, including the date and time of the activity. You can print, save or clear this list.
n Security Check: You can run an extensive check of your computer for
any privacy or security problems via this feature. After McAfee Internet Security performs the check, it displays any problem found, provides additional information about the problem, and guides you through on how to solve the problem.
n VirusScan: McAfee Internet Security uses McAfee VirusS can to a ddress
virus-related problems you may encounter through the Internet. This feature allows you to set how to perform a virus scan operation on your computer; what to do if a virus is found; and how it should alert you once the virus is detected. You can also direct VirusScan to keep a record of actions performed on your computer.
n Firewall: McAfee Internet Security incorporates McAfee Firewall to
protect your computer while it is connected to the Internet. McAfee Firewall is a highly-flexible, easy-to-use program. Whether you are connected to the Internet via DSL, cable modem or standard dial-up, Internet communication in to and out of your PC is secure.
n QuickClean Lite: Remove unnecessary files using QuickClean Lite. The
QuickClean Lite wizard enables you to clean your computer of unnecessary f iles and free valuable hard disk spa c e.
n Shredder: For privacy and security reasons, you may want to be positive
that the information stored in files you delete is permanently erased from your computer. Shredder does this for you by security wiping deleted files so they cannot be restored or rebuilt using an “undelete” type of utility.
16 McAfee Internet Secu rity 5.0

Whats new in this release?

This release of McAfee Internet Security includes the following new features and functional enhancements.
n Includes VirusScan Home Edition 7 - Includes the latest version of the
award winning VirusScan anti-virus software to protect your system from viruses, Trojans, Internet wo rms, harmful scripts, and other malware. With automated updates and exclusive H.A.W.K. (Hostile Activity Watch Kernel) pr otections, Vi rusScan keeps y o ur computing free of even the latest threats.
n Includes McAfee Firewall 4 - Includes the latest version of McAfee
Firewall. McAfee Firewall enables you to control the communications in and out of your PC and helps keep hackers at bay. With powerful Application Control, Intrusion Detection, and easy Home Networking and Custom Rule Creation Wizards, McAfee Firewall provides essential security for your Internet connection.
n Spyware/Adware Protection - Helps enhance your privacy by rooting
out snooper programs that attempt to track your Web surfing habits. Now you can easily find and shut down these tracking programs that often piggyback on popular freeware utilities and games.
n Extended Stealth Program Protect ion - Helps keep your PC free of
hidden key loggers that try to capture and steal your passwords and a whole host of even more insidious programs that may be watching and recording everything you do on your PC. Adds an essential layer of protection against this growing threat to your privacy and security.
Welcome to McAfee Internet Security 5.0
n Pop-Up Bloc ker - Puts an end to thos e p esky a nd annoying p o p- up ad s
so prevalent on the Internet. Now you'll be able to surf the Internet without these and other ads getting in your way and slowing you down.
n Allow/Block Applications Per User - Lets you to control which
applications are available to different family members. Parents can readily use installed programs while blocking access to younger family members, protecting the family PC while restricting access to questionab le material.
n Filtering of Usenet Newsgroups - Usenet is said to exemplify the best
and worst of the Internet. Now you can take charge of which newsgroups and content various family members might be exposed to and filter out objectionable material while retaining access to the wealth of information Usenet provides.
n MRU Cleaner - Deletes the telltale trail left behind the files you've
opened and viewed recently. Enhances your privacy by clearing MRU's (Most Recently Used) of Windows based utilities and many other popular programs.
Product Guide 17
Welcome to McAfee Internet Security 5.0
n Usability Enhancements - McAfee Internet Security 5.0 includes user
interface enhancements to make it easier than ever to protect your online security and privacy.

About this manual

This manual provides the basic information you need to install, set up and get started with McAfee Internet Security 5.0. More de tailed information a bout how to perform tasks within McAfee Internet Security is provided via online Help. You can get Help while working with the different windows and dialog boxes.
You can also view the Readme.txt file which contains other general information, known issues, etc., about this product.

McAfee Internet Security and your online connection

You must have an Internet connection through a local network or a modem t o use all McAfee Internet Security features. Some networks have an Internet connection that you can use by connecting to the network – either directly or through dial–up networking. Your computer mu st hav e a mod em installed if you don’t connect through a network.
You can establish an Internet connection through an Internet Service Provider (ISP) such as MSN, AOL, or Earthlink, etc. An ISP acts as a middleman between you and the Internet. Your computer connects (using your modem) to the ISPs equipment, which in turn connects your compu ter to the Inter net.
In addition, you must also have a br owser. A browser is software, such as Microsoft Intern et Explore r or Netscape Navigator, tha t allows y ou to view text and graphics and download files from Web sites.
18 McAfee Internet Secu rity 5.0
Welcome to McAfee Internet Security 5.0

McAfee Internet Security features

This section briefly describes other features of McAfee Internet Security that protect you from the most common Internet threats.
Only the designated administrator or a user with administrative rights can have access to these features which allow them to customize protection settings for themselves and in the case of the Administrator, protection for other profiled users of the same computer.
Protection from privacy threats
n Identity Protector monitors your Internet connection and warns you
before private i nformation is sent to an nonsecure Internet site. It stops programs and other people that use your computer (like your kids) from sending your name and credit card numbers over the Internet without your approval.
n Cookie Blocker prevents Web sites from storing cookies on your hard
drive. Third-party Web sites use cookies to track your Web browsing habits. You can choose your level of interaction with Cookie Blocker.
n Web Trail Cleaner cleans your Web browsing trails such as cached files;
list of URLs (Uniform Resource Locator, also known as Web address) visited; and history fileswhen you close your browser. This feature prevents other users of your computer from tracking your online movements by viewing the files and URL addresses left over from your Internet browsing.
n Referer Filter prevents search information that you request at one Web
site from being passed along to the next site you visit. Without Referer Filter, your browser may be allowing the transfer of your search request information from one Web site to another.
Protection from security threat s
n Gatekeeper allows you to cont rol the programs that have a ccess to your
Internet connection. Programs on your PC can be programmed to access to the Internet without your consent.
n File Guardian protects files that contain your sensitive data from being
opened, renamed, copied, moved, or deleted. Programs, such as ActiveX and Java programs, can scan your PC for personal information or delete files without your permission.
File Guardian also limits access to protected files ei ther to programs you specify or through file encryption. It can limit the programs that can access your tax, online banking, or personal accounting data files.
Product Guide 19
Welcome to McAfee Internet Security 5.0
n Password Manager stores your Web site login names and passwords for
protected Web sites in one secure location. When you are visiting a site that requires this information, you can drag it from Browser Buddy to the form displayed in your browser. No more storing your login names and passwords in an nonsecure location, such as post-it notes on yo ur monitor or in a text file on your Windows desktop.
n Browser Buddy is convenient tool with a dual purpose. First, Browser
Buddy lets you view a summary of cookie activity. Just choose a Web site that you have visited from the drop-down list. Second, Browser Buddy gives you access to the passwords that you have stored in Password Manager. When you log on a password-controlled Web Site, you can drag and drop a user name and pas sword from Browser Buddy to the appropriate box in the login form. To access Browser Buddy, right-click the McAfee Guardian icon in the Windows system tray and click Browser Buddy in the pop-up menu.
Protection from virus threa ts
Using McAfee VirusScan, the following features are available:
n Scan to start the default virus scan task immediately, or conf igure a virus
scan task that suits your ne eds.
n Scheduler to launch the McAfee VirusScan Scheduler. This utility
enables you to configure and run unattended virus scan operations.
n Virus info to display virus information via the McAfee Web site.
Safeguard your computer against intrusions and attacks
Protect yourself while online with the advanced security of McAfee Firewall. Easy-to-use, yet highly secure, McAfee Firewall safeguards your PC's connection to the Internet whether you connect via DSL, cable modem, or dial-up. McAfee Firewall gives you t he powerful tools you need to control the communications into and out of your PC.
20 McAfee Internet Secu rity 5.0

Installing McAfee Internet Security

Before you begin

McAfee distributes McAfee Internet Security 5.0 in two formats:
1 As an archived file that you can download from the McAfee web site. 2 On CD-ROM.
Although the method you use to transfer files from an archive obtained via download differs from the method you us e to transfer files from a CD that is placed in your CD-ROM drive, the installation steps followed after that a re the same for both distribution types. Review the system requirements shown below to verify that this software will run on your computer.

System requirements

To install this product, you require the following:
Desktop and notebook computers
n Windows 98, Windows Me, Windows 2000 Professional, W indows XP
Home Edition, or Windows XP Professional.
2
n Internet Explorer 4.01, Service Pack 2 or higher required for Windows
NT; IE 5.01 or later recommended.
n 71 megabytes (MB) of hard disk space. n 32 MB of RAM. n An Intel Pentium-class or compatible processor rated at 100 MHz or
higher.
n CD-ROM drive. n Internet access for product updating.
Additional requirements for wireless devices
McAfee Internet Security includes the latest version of McAfee VirusScan software. In order to fully protect your wireless device from viruses, trojans, and worms, etc., your wireless device requires the following:
Product Guide 21
Installing McAfee Internet Security
Palm OS and Palm requirements
McAfee VirusScan for Palm Desktop with HotSync Manager 3.0 will install and run on any IBM PC or PC-compatible computer equipped with Palm Desktop 3.0 or later. The latest version of Palm Desktop and HotSync 3.0 is a free download from Palm's site (at www.palm.com). The device-resident portion is quite simple and should work on any device with the Palm OS.
Windows CE or Pocket PC System requirements
McAfee VirusScan for Windows CE or Pocket PC will install and run on any IBM PC or PC-compatible computer equipped with ActiveSync 3.0 or later. Any CE device with ActiveSync 3 will function properly.
Symbian EPOC System requirements
McAfee VirusScan for Symbians EPOC will install and run on any IBM PC or PC-compatible computer equipped with PsiWin 2.3 (or equivalent for non-Psion EPOC devices. All EPOC devices should ship with PsiWin 2.3 /EPOC Connect 5. These include:
n Psion Revo n Psion Series 5mx n Psion Series 7 n Psion netBook n Oregon Scientific Osaris n Ericsson MC218 n Ericsson R380
If you have an older device but the current PsiWin/EPOC Connect software, McAfee VirusScan for Symbians EPOC will function properly, including the Psion HC, the MC series, the Workabout series, all Psion Series 3 models, the Psion Sienna, the Psion Series 5, the Geofox One, and the Phillips Illium.
If you do not have PsiWin 2.3, Symbian offers a free product called EPOC Connect Lite which also works.
22 McAfee Internet Secu rity 5.0

Installation steps

After inserting the McAfee Internet Security 5.0 installation CD into your computers CD-ROM drive, an Autorun image should automatically display. To install McAfee Internet Security software immediately, click Install McAfee Internet Security, then skip to Step 5 to continue with Setup.
Use the steps b e low to i nst al l you r sof twa re.
1 If your computer runs Windows 2000 Professional, or Windows XP, log
on to your computer as a user with administrative rights. You mus t have administrative rights to install this software.
2 Insert t he McAfee I nternet Security 5.0 CD in to your computer’s
CD-ROM drive. If the Installation Wizard does not automatically display, go to Step 3. Otherwise, skip to Step 4.
3 Use the following procedure if the Autorun installation menu does not
display, or, if you obtained your software via download at a McAfee web site.
a From the Windows Start menu, select Run.
b Type <X>:\SETUP.EXE in the text box provided, then click OK.
Installing McAfee Internet Security
The Run dialog box displays.
4 Here, <X> represents the drive letter for your CD-ROM drive or the path
to the folder that contains your extracted McAfee Firewall files. To search for the correct files on your hard disk or CD-ROM, click Browse.
a Before proceeding with the installation, Setup first checks to see
whether your computer has the Microsoft Windows Installer (MSI) utility running as part of your system software. If your computer runs Windows XP, the current version of MSI already exists on your system. If your computer runs an earlier Windows release, you may still have MSI in your computer if you previously installed other software that uses MSI. In either of these cases, Setup will display its first wizard pane l immediately. Skip to Step 5 t o continue.
b If Setup does not find MSI or an earlier version of MSI is installed
in your computer, it installs files necessary to continue the installation, then prompts you to restart your computer. Click Restart System. When your computer restarts, Setup will continue from where it left off.
5 Refer to steps displayed on the Installation Wizard to complete your
installation.
Product Guide 23
Installing McAfee Internet Security
NOTE
If your computer does not have the required fonts to view the End Users License Agreement (EULA), then you may locate the appropriate EULA on your McAf ee software installation CD. You must read and agree to the terms of the agreement to complete your installation.

Troubleshooting installation problems

A failed installation can cause software problems that are difficult to track down. The major causes of installation failure are:
n Attempting to install while other software is running. n Temporary files that conflict with the installation. n Hard drive errors.
Follow the procedure outlined below to minimize the affect that these common conditions may have on your installation.
Step 1: Close other software
Disable all software running in the background:
1 Hold down the Ctrl and Alt keys on your keyboard, and then press the
Delete key once. The Close Program dialog box appears.
2 Click End Task for every item on the list except Explorer. 3 Repeat steps 2 and 3 until youve closed everything except Explorer. 4 When you see only Explorer in the Close Program dialog box, click
Cancel.
Step 2: Remove t empor ary f iles
Delete the contents of the Windows Temp folder:
1 Double-click the My Computer icon on your desktop. The My Compute r
window opens. Double-click the C: drive. You are now viewing the contents of your hard drive.
2 Double-click the Windows folder. 3 In the Windows folder, double-click the Temp folder. 4 In the menu, click Edit, then click Select All. All of the items in your
Temp folder are highlighted.
5 Press the Delete key on your keyboard to delete the files. If Windows
asks about deleting files, click Yes.
24 McAfee Internet Secu rity 5.0
Installing McAfee Internet Security
6 In the Windows taskbar, click Start, then click Shut Down. 7 Click Restart the computer, then click Yes in the Shut Down Windows
dialog box to restar t your PC.
Step 3: Clean your hard drive
Run the Windows hard drive utilities, ScanDisk and Disk Defragmenter to identify and fix any error s on you r hard drive:
1 Click Start on the Windows taskbar, point to Programs, then Accessories,
then System Tools, and click ScanDisk .
2 In the ScanDisk window, select Standard and Automatically fix errors. 3 Click Advanced. In the Advanced Settings dialog box, make sure the
following settings are selected:
M Only if errors found M Replace log M Delete M Free
4 Ignore the other options, and click OK. Click Start. ScanDisk begins
scanning your drive for errors. Depending on the size of your hard drive, ScanDisk may take several minutes to complete its job.
5 When ScanDisk is finished, close ScanDisk. 6 Click Start on the Windows taskbar, point to Programs, then Accessories,
then System Tools, and click Disk Defragmenter.
7 Click OK to start Disk Defragmenter. Depending on the speed of your
computer and the size of your drive, this may take several minutes to complete.
8 Close Disk Defragmenter when it has finished defragmenting your disk.

Removing or modifying your McAfee I nternet Security installation

If your computers operating system is...
n Windows 2000 Professional n Windows XP Home Edition n Windows XP Professional Edition
Product Guide 25
Installing McAfee Internet Security
... you must log on to your computer using a profile with administr ative rights. Then do the following.
1 From the Windows Control Panel, start the Add/Remove applet. 2 Select McAfee Internet Security and click:
M Remove to remove McAfee Internet Security from your computer. M Change to modify your McAfee Internet Security installation.
3 Refer to steps displayed on the McAfee Internet Security Installation
Wizard to complete your changes. Restart your computer as directed by setup.

Important information about Windows XP migration

Upgrading your computer's operating system from any version of Windows to Windows XP causes all McAfee products installed before migration to become disabled after migration to Windows XP.
You will be made aware of this situation as you make your first attempt to start a McAfee product (after migration) - you will be instructed to reinstall the product.
As such, you will need to uninstall all McAfee products and reinstall using your installation CD or the software obtained from McAfee via download.
26 McAfee Internet Secu rity 5.0

Getting Started with McAfee Internet Security 5.0

McAfee Internet Security is a simple program to use. In fact, this one chapter covers the main things you need to know about using McAfee Internet Security . You begin with answering a few questions via the Interview so that McAfee Internet Security can effectively use its feature to protect you from Internet threats.
3

Introduction

The McAfee Internet Security 5.0 Home page is your central entry point to access and use all of McAfee Internet Securitys tasks, wizards, and components. This screen displays three regions that provide you with dynamic information about current status and navigation links to all tasks.
Product Guide 27
Getting Started with McAfee Internet Security 5.0

The Title bar and Tool bar

Title bar
The Home page displays most of your standard Windows elements; that which includes:
n The title bar displays the name of the program that is currently running. n Close and minimize buttons. McAfee Internet Security 5.0s interface is
of fixed length and width. You cannot resize the interface.
Tool bar
The tool bar displays four browser-like buttons that are common to all screens.
n Back. Click Back to return to the last screen viewed. n Home. Click Home to go to the McAfee Internet Security Home page
from any screen.
n Next. In conjunction with the Back button, use Next to go to any
previously viewed screen during your current session.
n Help. Click Help to view its submenu. The Help submenu may include
any of the following items.
Help submenu item Select this item to...
Help on this page w View online Help for the screen you are currently
Contents and index Help on the Web
McAfee at Home on the Web
About McAfee Internet Security

Status information

Depending upon your configuration, the McAfee Internet Security 5.0 Home page displays other helpful information such as:
n The name or user name of the person currently logged in represented by
Welcome (name)...
n Running status:
28 McAfee Internet Secu rity 5.0
viewing.
w View online Help for McAfee Internet Security. w Start your Internet browser and go directly to the
McAfee Help Web site at McAfeeHelp.com.
w Start your Internet browser and go directly to
McAfee-at-home.com.
w Version information about McAfee Internet
Security.
Getting Started with McAfee Internet Security 5.0
M If McAfee Internet Security is not running displays, click Start
McAfee Internet Security to start the program.
M If McAfee Internet Security is running displays, click Stop McAfee
Internet Security to stop the program.
n Update status:
M If McAfee Internet Security is up-to-date displays, you are using
the most current version of McAfee Internet Security 5.0.
M If Check for an update displays, click Download update to start
McAfee Instant Updater and check for an update to McAfee Internet Security 5.0.
n Number of warnings logged.
M If one or more warnings were logged and not reviewed, click View
warnings to start the Activity log page.
M For more information about Activity logs, please refer to online
Help.
McAfee Firewall st atu s
In order to view McAfee Firewall status information, you must first activate McAfee Firewall. Activation requires that you perform a few preliminary configuration steps; the Firewall Configuration Assistant guides you through this process.

About Tasks

If the Network Traffic monitor does not display on the McAfee Internet Security home page, click Activate McAfee Firewall to start the McAfee Firewall Configuration Assistant.
For more information about the Network Traffic monitor or the McAfee Firewall Configuration assistant, please refer to McAfee Firewall on page 75.
The Task pane displays links that allow you to start McAfee Internet Securi ty’s Tasks. Depending upon your configuration, the Task pane displays McAfee, links that allow you start the Home page for any other current McAfee product that you have installed in your computer.
Starting a task is as easy as clicking its link. The Task list allows you to start McAfee Internet Securitys major components. Although the tasks you can perform will vary based upon your computers operating system and its configuration, primary tasks include:
Change user settings
Select this task to perform the following:
Product Guide 29
Getting Started with McAfee Internet Security 5.0
n Add or remove a user. n Change a user or the Administrators settings.
The User Setting s pr operties sheet
The User Settings property sheet allows the Administrator to configure their own personal settings or any other us ers settings. Self-administrating users can only change their personal settings.
There are four tabs on the user settings property s heet Each tab allows you t o configure settings - grouped by their classification.
n Privacy settings:
Click the Privacy Settings tab to configure your Internet privacy level. For example, you can filter Cookies, Web bugs and block annoying ads and pop up windows encountered while browsing th e Internet.
You can also configure Web Trail cleaner to remove records stored on your computer that were created as you used the Internet. Records of this type include Temporary Internet Files and historical records such as URLs visited, created by your Internet browser.
The Privacy settings sheet allows you to protec t personal information about each user that you want to protect from prying eyes and programs while browsing the Internet.
n Security Settings:
Click the Security Setting tab to monitor your Internet connection and safeguard your computer against suspicious and potential malicious activities. Additionally, you can configure McAfee Internet Security to alert you if you visit harmful Web sites; or if a program in your computer attempt to access th e Internet without your knowl edge.
n From this page of the Change User Settings property sheet, you can
setup File Guardian to protect files, folders, programs, and drives from unauthorized a ccess.
n User Preferences:
The User Preferences tab on the Change User Settings property sheet enables all users to configure how McAfee Internet Security responds to particular events. Here you configure how McAfee Internet Security starts, ho w it should alert you, and manage user passwords.
30 McAfee Internet Secu rity 5.0
+ 98 hidden pages