Mcafee INTERNET SECURITY 5.0 User Manual

McAfee Internet Security 5.0
VERSION 5.0
PRODUCT GUIDE
COPYRIGHT © 2002 Networks Associates Technology, Inc. and its Affiliated Companies. All Rights Reserved. No
part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means without the written permission of Network Associates, Inc.
ANTIVIRUS ANYWARE AND DESIGN, BOMB SHELTER, CERTIFIED NETWORK EXPERT, CLEAN-UP, CLEANUP WIZARD, CNX, CNX CERTIFICATION CERTIFIED NETWORK EXPERT AND DESIGN, CYBERCOP, CYBERCOP (IN KATAKANA), CYBERMEDIA, CYBERMEDIA UNINSTALLER, DESIGN (STYLIZED N), DISK MINDER, DISTRIBUTED SNIF FER SYSTEM, DISTRIBUTED SNIFFER SYSTEM (IN KATAKANA), DR SOLOMON’S, DR SOLOMON’S LABEL, ENTERPRISE SECURECAST, ENTERPRISE SECURECAST (IN KATAKANA), EZ SETUP, FIRST AID, FORCEFIELD, GMT, GROUPSHIELD, GROUPSHIELD (IN KATAKANA), GUARD DOG, HELPDESK, HOMEGUARD, HUNTER, ISDN TEL/SCOPE, LANGURU, LANGURU (IN KATAKANA), M AND DESIGN, MAGIC SOLUTIONS, MAGIC SOLUTIONS (IN KATAKANA), MAGIC UNIVERSITY, MA GICSPY, MAGICTREE, MCAFEE, MCAFEE (IN KATAKANA), MCAFEE AND DESIGN, MULTIMEDIA CLOAKING, NET TOOLS, NET TOOLS (IN KATAKANA), NETCRYPTO, NETOCTUPUS, NETSCAN, NETSHIELD, NETSTALKER, NETWORK ASSOCIATES, NETXRAY, NOTESGUARD, NUTS & BOLTS, OIL CHANGE, PC MEDIC, PC MEDIC 97, PCNOTARY, PGP, PGP (PRETTY GOOD PRIVACY), PRETTY GOOD PRIVACY, PRIMESUPPORT, RECOVERKEY, RECOVERKEY - INTERNATIONAL, REGISTRY WIZARD, REPORTMAGIC, RINGFENCE, ROUTER P M, SALESMAGIC, SECURECAST , SERVICE LEVEL MANAGER, SERVICEMAGIC, SMARTDESK, SNIFFER, SNIFFER (IN HANGUL), SNIFFMASTER, SNIFFMASTER (IN HANGUL), SNIFFMASTER (IN KATAKANA), SNIFFNET, STALKER, SUPPORTMAGIC, TIS, TMEG, TNV, TVD, TNS, TOTAL NETWORK SECURITY, TOTAL NETWORK VISI BILITY, TOTAL NETWORK VISIBILITY (IN KATAKAN A), TOTAL SERVICE DESK, TOTA L VIRUS DEFENSE, TRUSTED M AIL, UNINSTALLER, VIREX, VIRUS FORUM, VIRUSCAN, VIRU SSCAN, WEBSCAN, WEBSHI ELD, WEBSHIELD (IN KATAKANA), WEBSNIFFER, WEBSTALK ER, WEBWALL, WHO’S WATCHING YOUR NETWORK, WINGAUGE, YOUR E-BUSINESS DEFENDER, ZAC 2000, ZIP MANAGER are registered
trademarks of Net work As socia tes, Inc. and/or its affi liates i n the US an d/or ot her coun tries . All other registered and unregistered trademarks in this document are the sole property of their respective owners. © 2002 Networks Associates Technology, Inc. All Rights Reserved.
Issued August 2002 / Product Guide v5.0
McAfee Perpetual End User License Agr eement – United States of America
NOTICE TO ALL USERS: CA REFULLY READ THE FOLLOWING LEGAL AGREEMENT ("AGREEMENT"), FOR THE LICENSE OF SPECIFIED SOFTWARE ("SOFTWARE") PRODUCED BY NETWORK ASSOCIATES, INC. ("McAfee"). BY CLICKING THE ACCEPT BUTTON OR INSTALLING THE SOFTWARE, YOU (EITHER AN I NDIVIDUAL OR A SINGLE ENTITY) CONSENT TO BE BOUND BY AND BECOME A PARTY TO THIS AGREEMENT. IF YOU DO NOT AGREE TO ALL OF THE TER MS OF THIS AGREEMENT, CLICK THE BUTTON THAT INDICATES THAT YOU DO NOT ACCEPT THE TERMS OF THIS AGREEMENT AND DO NOT INSTALL THE SO FTWARE. (IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO THE PLACE OF PURCHASE FOR A FULL REFUND.)
1. License Grant. Subject to the payment of the applicable license fees, and subject to the terms and conditions of
this Agreement, McAfee hereby grants to you a non-exclusive, non-transferable right to use one copy of the specified version of the Software and the accompanying docume ntation (the "Documenta tion"). You may instal l one copy of t he S oftwar e on one co mpute r, w orkst atio n, pe rsona l di gita l ass istan t, pa ger, "sma rt ph one" or ot her electronic device for which the Software was designed (each, a "Client Device"). If the Software is licensed as a suite or bundle with more than one specified Software product, this license applies to all such specified Software produ ct s, subject to any restri ct ions or usage terms specified on the applicable price list or product packaging that apply to any of such Software products individually.
a. Use
b. Server-Mo de U se
c. Volume License Use
. The Software is licensed as a single product; it may not be used on more than one Client Device or by more than one user at a time, except as set for th in th is Section 1. The Software is "in use" on a Client Device when it is l oaded into th e temporary memory (i.e. , random-a ccess memory or RAM) or installed into the permanent memory (e.g., hard disk, CD-ROM, or other storage device) of that Client Device. This license authorizes you to make one copy of t he Software solely for backup or archiv al purposes, p rovided t hat th e copy yo u make co ntains all of the Sof tware' s propri etar y notice s unalt ered and unobstructed.
. You may use the Software on a Client Device as a server ("Se rver") within a multi-user or n et wor ke d en vi ronm ent (" Se rver -Mo de" ) on ly if s uch use is pe rmit te d i n the a p pl icab le price list or product packaging for the Software. A separate license is required for each Client Device or "seat" that may connect to the Server at any time, regardless of whether such licensed Client Devices or seats are concurrently connected to, accessing or using the Sof t w are. Use of software or hardware that reduces the numbe r of Client Devic es or seats directly accessing or utilizing th e Software (e.g ., " m ultiplexing" or "pooling" software or hardware) d oes not reduce the number of licenses required (i.e., the required number of licenses would equal the number of distinct inputs to the multiple xing or pooling software or hardware " front end "). If the number of Client Devices or seats that can conn ect to th e Soft war e can exce ed th e numbe r of li censes you ha ve obt aine d, the n you mus t have a reasonable mechanism in place to ensure that your use of the Software does not exceed the use limits specified for the licenses you have obtained. This l icen se au th or iz es you t o make o r d ownlo ad one copy of the Documentation for each Client Device or seat that is licensed, provided that each such copy contains all of th e D ocumentation's proprietary notices una ltered and unobstruct ed.
. If the Software is licens ed with volume license terms s pecified in the applic able product invoicing or product packaging for the Software, you may make, use and install as many additional copies of the Software on the number of Client Devices as the volume license te rms specify. You must have a reasona ble mechanism in place to ensure that the number of Client Devices on which the Software has be en installed does no t ex ceed the number of licenses you have obtain ed. This license authorizes you to make or download one copy of the Documentation for each additional copy authorized by the volume license, provided that each su ch copy contains all o f t he D ocumentation' s proprietary noti ce s unaltered and unobst ructed.
Product Guide iii
2. Term. This Agreement is effective for an unlimited duration unless and until earlier terminated as set forth
herein. This Agreement will terminate automatically if you fail to comply with any of the limitations or other requirements described herein. Upon any termination or expiration of this Agreement, you must cease use of the Software and destroy all copies of the Software an d the Documentat ion.
3. Updates. For the time period specified in the applicable product invoicing or product packaging for the
Software, you are entitled to download revisions or updates to the Software when and as Mc Afee publishes t hem via its elect ronic bullet in boar d syste m, websi te or t hrough o ther on line ser vices. For a pe riod of ninety (90) days from the date of the of original purchase of the Software, you are entitled to download one (1) revision or upgrade to the Software when and as McAfee publishes it via its electronic bulletin board system, website or through other online services. After the specified time period, you have no further rights to receive any revisions or upgrades with out purchase of a new lic ense to the Software .
4. Ownership Ri ghts. The Software is protected by U ni t ed St ates copyright laws and international treaty
provisions. McAfee and its suppliers o wn and retain all right, title and intere st in and to the Software, in cludin g all copyrights, patents, trade secret rights, trademarks and other intellectual property rights therein. Your possession, installatio n, or us e of the Software does not trans fer to you any title to the in tellectual p roperty in the Software, and you will not acquire any rights to the Software e xcept as e xpressly s et for th in thi s Agreement. All copies of the Software and Documentation made hereunder must contain the same proprietary notices that appear on and in the Softw ar e and Documentati on.
5. Restrictions. You may not sell, lease, license, rent, lo an or otherwise transf er, with or without consid eration, the
Software. Mc A fee updates its Soft ware frequently and performance dat a for its Software change. Before conducting be nchmark tests rega rding this Softwa re, contact McAfe e to verify that You possess the correct Software for the test and the then current version and editio n of the Software . You agree not to permit any third party (other than t hi rd parties under contract with You whic h contains nondiscl os u r e obligations no less restrictive than thos e set forth herein) to use the Licensed Pro gram in any form and sha ll use all reasonab le efforts to ensure that no im p r oper or unauthorize d use of the Licensed Prog r am is made. You may no t p ermit third parties to benefit from the use or functionality of the Software via a timesharing, service bureau or other arrangement, except to the extent such use is specified in the applicable list price or product packaging for the Software. You m ay not transfer any of th e ri ghts granted to you under this Agreement. You may not re ver se engineer, decompile, or disassemble the Software, except to the extent the forego in g restriction is ex pr essly prohibited by applicable law. You may not mo dify, or crea te derivative wo rks based upon, the Software in whole or in part. You may not copy the Software or Documentation except as expressly permitted in Section 1 above. You may not rem ove any proprieta ry notices or labels on the Software. All ri ghts not expressly set forth hereunder are res erved by McAfee.
6. Warranty and Disclaimer.
a. Limited Warranty
. McAfee warrants that for sixty (60) days from the date of original purchase the media (e.g., diskettes) on which the Software is contained will be free from defects in materials and workmanship.
b. Customer Remedies
. McAfee's and its suppliers' entire liability and your exclusive remedy for any breach of the fo regoing warranty s hall be, at McAfee' s option, either (i) return of the purchase price paid for the license, if any, or (ii) replacement of the defective media in which the Software is contained. You m us t r et ur n the defective media to M cAfee at your expense w ith a copy of your receipt. This limited war ranty is void if the defect has resu lted from accident , abuse, or misapp lication. Any replacement media will be warran te d for the remainder of the original warranty period. Outside the United States, this remedy is not available to the extent McAfee is subject to restrictions under United States export control laws and regulations.
iv McAfee Internet Security 5.0
c. Warranty Disclaimer. Except for the limited warranty set forth herein, THE SOFTWARE IS
PROVIDED "AS IS." TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, MCAFEE DISCLAIMS ALL WARRANTIES, EI THER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NONINFRINGEMENT WITH RESPECT TO THE SOFTWARE AND THE ACCOMPANYING DOCUMENTATION. YOU ASSUME RESPONSIBILITY FOR SELECTING THE SOFTWARE TO ACHIEVE YOUR INTENDED RESULTS, AND FOR THE INSTALLATION OF, USE OF, AND RESULTS OBTAINED FROM THE SOFTWARE. WITHOUT LIMITING THE FOREGOING PROVISIONS, MCAFEE MAKES NO WARRANTY THAT THE SOFTWARE WILL BE ERROR-FREE OR FREE FROM INTERRUPTIONS OR OTHER FAILURES OR THAT THE SOFTWARE WILL MEET YOUR REQUIREMENTS. SOME STATES AND JURISDICTIONS DO NOT ALLOW LIMITATIONS ON IMPLIED WARRANTIES, SO THE ABOVE LIMITATION MAY NOT APPLY TO YOU. The foregoing provisions shall be enforceable to the maximum extent permitted by applicable law.
7. Limitation of Liability. UNDER NO CIRCUMSTANCES AND UNDER NO LEGAL THEORY, WHETHER
IN TORT, CONTRACT, OR OTHERWISE, SHALL MCAFEE OR ITS SUPPLIERS BE LIABLE TO YOU OR TO ANY OTHER PERSON FOR ANY INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES OF ANY CHARACTER INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF GOODWILL, WORK STOPPAGE, COMPUTER FAILURE OR MALFUNCTION, OR FOR ANY AND ALL OTHER DAMAGES OR LOSSES. IN NO EVENT WILL MCAFEE BE LIABLE FOR ANY DAMAGES IN EXCESS OF THE LIST PRICE MCAFEE CHAR GES FOR A LICENSE TO THE SOFTWARE, EVEN IF MCAFEE SHALL HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. THIS LIMITATION OF LIABILITY SHALL NOT APPLY TO LIABILITY FOR DEATH OR PERSONAL INJURY TO THE EXTENT THAT APPLICABLE LAW PROHI BITS SUCH LIMITATION. FURTHERMORE, SOME STATES AND JURISDICTIONS DO NOT ALLOW THE EXCLUSION OR LIMITATION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THIS LIMITATION AND EXCLUSION MAY NOT APPLY TO YOU. The foregoing provisions shall be enforceable to the maximum extent permitted by applic able law.
8. United States Government. Th e Software and accompanying Documentation are deemed to be "commercial
computer software" and "commercial computer software documentation," respectively, pursuant to DFAR Section 227.7202 and FAR Section 12.212, as applicable. Any use, modification, reproduction, release, performance, di splay or disclosure of the Software an d accompanying Do cumentation by th e U ni t ed States Government shall be govern ed solely b y the ter ms of this Agreement and shall b e prohibite d except t o the ex tent expressly permitted by the terms of this Agreement.
9. Export Controls. You are advised that the Software is subject to the U.S. Export Administration Regulations.
You shall not exp ort, import or transfer Software cont rary to U.S. or other applicable laws, w hether directly or indirectly, and will not cause, app ro ve or otherwise facilitate others such as agen ts o r any th ird parties in doing so. You represen t and agrees that neit her the United States Bureau of Export A dministration nor any other federal agency has suspended, revoked or denied your export privileges. You agree not to use or transfer the Software for end use relating to an y nuclear, chemical or biological weapons, or missile technology unless authorized by the U.S. Government by regulation or specific license. Additionally, you acknowledge that the Software is sub j ect to export control regulations in the E ur opean Union and you h ereby declare and agree that the Software will not be used for any other purpose than civil (non-military) purposes. The parties agree to cooperate w ith eac h ot he r with re spec t to any app lic at io n f or a ny req ui re d li cen ses an d ap pr ova ls, ho wev er, yo u acknowledge it is your ultimate responsibility to comply with any and all export and import laws and that McAfee has no further responsibility after the initial sale to you within the original country of sale.
Product Guide v
10. High Risk Activities. The Softwar e i s not fault-tolerant and is not designed o r i nt ended for use in hazardous
environments requiring fa il-safe perf ormance, including wi thout limitatio n, in the operati on of nuclear f acilities, aircraft navigation or communication systems, air traffic control, weapons systems, direct life-support machines, or any other application in which the failure of the Software could lead directly to death, personal injury, or severe physical or property damage (collectively, "High Risk Activities"). McAfee expressly disclaims any express or impli ed w arranty of fitness f o r High Risk Activities .
11. Miscellaneous. This Agreement is governed by the laws of the United States and the State of California,
without reference to conflic t o f laws principles. The applicatio n of th e Unit ed Na tio ns Con v entio n of Contracts for the International Sa le of Goods is e xpress ly exc luded. This Agree ment se ts f orth a ll rig hts for the user of the Software and is the entire agreement between the parties. McAfee reserves the right to periodically audit you to ensure that you are not usi ng an y Soft ware in v io lat io n of t his Agree men t. D uri ng yo ur sta ndar d bus ine ss hour s and upon prior wr itt en notice, McAfee may visit you and you w i ll m ake available to Mc A fee or its representatives any records perta ining to the Softwar e to McAfee. The cost of any requeste d audit will be solely borne by McAfee, unless such aud it di scloses an underpayment or amount due to McAfee in exce ss of five percent (5%) of the initial li cens e f ee fo r th e S of twar e or y ou ar e usin g the Software in an unauthorized manor, in which case you shall pay the cost of the au di t. This Agreement supersedes any other communications w ith respect to the Software and Documentation. This Agreement may not be modified except by a written addendum issued by a duly authorized representative of McAfee. No provision hereof shall be deemed waived unless such waiver shall be in writing and signed by McAfee or a duly authorized representative of McAfee. If any provision of this Agreement is held invalid, the remainder of this Agreement shall continue in full force and effect. The parties c onfirm th a t it is their wish that this Agreement has been writ ten in the English language on ly.
12. MCAFEE CUSTOMER CONTACT. If you have any questions concerning these terms and conditions, or if
you would like to contact McAfee for any other reason, please call (408) 988-3832, fax (408) 970-9727, or write: Network Associ ates, Inc., McAfee Software Division, 3 965 Freedom Circle, Santa Clara, Califo rn ia 95054. http://www.nai.com.
vi McAfee Internet Security 5.0
McAfee Perpetual End User License Agr eement – Canada
NOTICE TO ALL USERS: CA REFULLY READ THE FOLLOWING LEGAL AGREEMENT ("AGREEMENT"), FOR THE LICENSE OF SPECIFIED SOFTWARE ("SOFTWARE") BY NETWORK ASSOCIATES INTERNATIONAL B.V. ("McAfee"). BY CLICKING THE ACCEPT BUTTON OR INSTALLING THE SOFTWARE, YOU (EITHER AN I NDIVIDUAL OR A SINGLE ENTITY) CONSENT TO BE BOUND BY AND BECOME A PARTY TO THIS AGREEMENT. IF YOU DO NOT AGREE TO ALL OF THE TER MS OF THIS AGREEMENT, CLICK THE BUTTON THAT INDICATES THAT YOU DO NOT ACCEPT THE TERMS OF THIS AGREEMENT AND DO NOT INSTALL THE SO FTWARE. (IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO THE PLACE OF PURCHASE FOR A FULL REFUND.)
1. License Grant. Subject to the payment of the applicable license fees, and subject to the terms and conditions of
this Agreement, McAfee hereby grants to you a non-exclusive, non-transferable right to use one copy of the specified version of the Software and the accompanying docume ntation (the "Documenta tion"). You may instal l one copy of t he S oftwar e on one co mpute r, w orkst atio n, pe rsona l di gita l ass istan t, pa ger, "sma rt ph one" or ot her electronic device for which the Software was designed (each, a "Client Device"). If the Software is licensed as a suite or bundle with more than one specified Software product, this license applies to all such specified Software produ ct s, subject to any restri ct ions or usage terms specified on the applicable price list or product packaging that apply to any of such Software products individually which you acknowledge you have received and read.
a. Use
b. Server-Mo de U se
. The Software is licensed as a single product; it may not be used on more than one Client Device or by more than one user at a time, except as set for th in th is Section 1. The Software is "in use" on a Client Device when it is l oaded into th e temporary memory (i.e. , random-a ccess memory or RAM) or installed into the permanent memory (e.g., hard disk, CD-ROM, or other storage device) of that Client Device. This license authorizes you to make one copy of t he Software solely for backup or archiv al purposes, p rovided t hat th e copy yo u make co ntains all of the Sof tware' s propri etar y notice s unalt ered and unobstructed.
. You may use the Software on a Client Device as a server ("Se rver") within a multi-user or n et wor ke d en vi ronm ent (" Se rver -Mo de" ) on ly if s uch use is pe rmit te d i n the a p pl icab le price list or prod uc t p ack ag in g f or t he S of twar e w hic h y ou a ck now le dge y o u hav e r ec eive d and r ea d. A separate licens e is required for each Client Device or "s eat" that may connect to the Server at any time, regardless of whether such licensed Client Devices or seats are concurrently connected to, accessing or using t he Software. Use of software or hardware th at reduces the number of Client Devices or seats directly accessing or utilizing the Software (e.g., "multiplexing" or "pooling" software or hardware) does not reduce the number of licens es required (i.e., the required number of licenses would equal the number of distinct inputs to the multiplexing or pooling software or hardware "front end"). If the number of Client Devices or seats that can connect to the Software can exceed the number of lice nses yo u have obt ained, then you m ust have a reasona ble mecha nism in pl ace to ensure that your use of the Software does not exceed the use limits specified for the licenses you have obtained. This license authorizes you to make or download one copy of the Documentation for each Client Devi ce or sea t that i s licensed , provi ded that each such c opy cont ains all of the Doc umentati on's proprietary noti ce s unaltered and unobst ructed.
Product Guide vii
c. Volume License Use. If the Software is licensed with volume lic ense terms specified in t he applicable
price list or product packaging for the Software, you may make, use and install as many additional copies of the Softw ar e on the number of Client D evices as the volume license authorizes. Y ou must have a reasonable mechanism in place to ensure that t he number of Clien t Devices on which the Software has been installed does not exceed the number of licenses you have obtained. This license authorizes you to m ake or download one co py of the Documentation for each additional copy authorized by th e volume license, provided that each su ch copy contains all o f t he D ocumentation' s proprietary notices unaltered and unobstructed.
2. Term. This Agreement is effective for an unlimited duration unless and until earlier terminated as set forth
herein. This Agreement will terminate automatically if you fail to comply with any of the limitations or other requirements described herein. Upon any termination or expiration of this Agreement, you must cease use of the Software and destroy all copies of the Software an d the Documentat ion.
3. Updates. For th e time period specified in the applicable price list or prod uct packaging for the Software, you are
entitled to download revisions or updates to the Software when and as McAfee publishes them via its electronic bulletin board system, website or through other online services. For a period of ninety (90) days from the date of the of origina l pu rchase of the Software, you are entitled to download one (1) revision or upgrade to the Software whe n and as McAfee publi shes it via its electro nic bulletin board system, websit e or through other online services. After the specified time period, you have no further rights to receive any revisions or upgrades without purchase of a new license to the Software.
4. Ownership Ri ghts. The Software is protected by Uni t ed St ates copyright laws and international treaty
provisions. McAfee and its suppliers o wn and retain all right, title and intere st in and to the Software, in cludin g all copyrights, patents, trade secret rights, trademarks and other intellectual property rights therein. Your possession, installatio n, or us e of the Software does not trans fer to you any title to the in tellectual p roperty in the Software, and you will not acquire any rights to the Software e xcept as e xpressly s et for th in thi s Agreement. All copies of the Software and Documentation made hereunder must contain the same proprietary notices that appear on and in the Softw ar e and Documentati on.
5. Restrictions. You may not sell, leas e, license, rent, lo an or otherwise transf er, with or without consid eration, the
Software. Mc A fee updates its Soft ware frequently and performance dat a for its Software change. Before conducting be nchmark tests rega rding this Softwa re, contact McAfe e to verify that You possess the correct Software for the test and the then current version and edition of the Software. Benchmark tests of former, outdated or inappropriate versions or editions of the Software may yield results that are not reflective of the performance of the current version o r edition of the Software. You agree not to permit any thir d party (other than third parties under contract with you which contract contains nondisclosure obligations no less restrictive than those set forth herein) to use the Software in any form and shall use all reasonable efforts to ensure that there is no improper or un aut horized use of the Sof tware. You may not per m it third parties to benefit from the use or functionalit y of the Software via a timesharing, service bureau o r other arrangement, except to the extent such use is specified in th e applicable list pri ce or product packag in g for the Software. Y ou m ay not transfer any of the rights granted to you under this Agreement. You may not reverse engineer, decompile, or disassemble the Software, except to the extent the foregoing restriction is expressly prohibited by applicable law. The interface information necessary to achieve interopera bility of the Software with indep endently created comp uter programs will be supplied by McAfee on reque st and on payment of suc h reasonable costs and expenses of McAfee in supplying th at i nfor mat i on. Yo u ma y not m odif y, or cre a te de ri vati ve work s ba sed up on, th e Sof twar e in whol e or in part. You may not copy the Software or Documentation except as expressly permitted in Section 1 above. You may not remove or alter any proprietary notices or labels o n the Softwa re or Documen tation . All righ ts not expressly set fo rth hereunder are reserved by McA f ee.
6. Warranty and Disclaimer.
viii McAfee Internet Security 5.0
a. Limi ted Warranty. McAfee warrants that for sixty (60) days from the date of original purchase the
media (e.g., diskettes) on which the Software is contained will be free from defects in materials and workmanship.
b. Customer Remedies
. McAfee's and its suppliers' entire liability and your exclusive remedy for any breach of the fo regoing warranty s hall be, at McAfee' s option, either (i) re t urn of the purchase price paid for the license, if any, or (ii) replacement of the defective media in which the Software is contained. You m us t r et ur n the defective media to M cAfee at your expense w ith a copy of your receipt. This limited war ranty is void if the defect has resu lted from acciden t, abuse, or misapp lication. Any replacement media will be warran te d for the remainder of the original warranty period. Outside the United States, this remedy is not available to the extent McAfee is subject to restrictions under United States export control laws and regulations.
c. Warranty Disclaimer
. Except for the limited warranty set forth herein, THE SOFTWARE IS PROVIDED "AS IS." TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, MCAFEE DISCLAIMS ALL WARRANTIES, REPRESENATIONS AND CONDITIONS, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LI M ITED TO IMP LI ED WARRANTIES OR CONDITIONS OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NONINFRINGEMENT WITH RESPECT TO THE SOFTWARE AND THE ACCOMPANYING DOCUMENTATION. YOU ASSUME RESPONSIBILITY FOR SELECTING THE SOFTWARE TO ACHIEVE YOUR INTENDED RESULTS, AND FOR THE INSTALLATION OF, USE OF, AND RESULTS OBTAINED FROM THE SOFTWARE. WITHOUT LIMITING THE FOREGOING PROVISIONS, MCAFEE MAKES NO WARRANTY, REPRESENTATION OR CONDITION THAT THE SOFTWARE WILL BE ERROR-FRE E OR FREE FROM INTERRUPTIONS OR OTHER FAILURES OR THAT THE SOFTWARE WILL MEET YOUR REQUIREMENTS. SOME STATES AND JURISDICTIONS DO NOT ALLOW LIMITATIONS ON IMPLIED WARRANTIES, SO THE ABOVE LIMITATION MAY NOT APPLY TO YOU.
7. Limitation of Liability. UNDER NO CIRCUMSTANCES AND UNDER NO LEGAL THEORY, WHETHER
IN TORT, CONTRACT, OR OTHERWISE, SHALL MCAFEE OR ITS SUPPLIERS BE LIABLE TO YOU OR TO ANY OTHER PERSON FOR ANY INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES OF ANY CHARACTER INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF GOODWILL, WORK STOPPAGE, COMPUTER FAILURE OR MALFUNCTION, OR FOR ANY AND ALL OTHER DAMAGES OR LOSSES. IN NO EVENT WILL MCAFEE BE LIABLE FOR ANY DAMAGES IN EXCESS OF THE LIST PRICE MCAFEE CHAR GES FOR A LICENSE TO THE SOFTWARE, EVEN IF MCAFEE SHALL HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. THIS LIMITATION OF LIABILITY SHALL NOT APPLY TO LIABILITY FOR DEATH OR PERSONAL INJURY TO THE EXTENT THAT APPLICABLE LAW PROHI BITS SUCH LIMITATION. FURTHERMORE, SOME STATES AND JURISDICTIONS DO NOT ALLOW THE EXCLUSION OR LIMITATION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THIS LIMITATION AND EXCLUSION MAY NOT APPLY TO YOU. The foregoing provisions shall be enforceable to the maximum extent permitted by applic able law.
8. United States Government. The Software and accompanying Documentation are deemed to be "commercial
computer software" and "commercial computer software documentation," respectively, pursuant to DFAR Section 227.7202 and FAR Section 12.212, as applicable. Any use, modification, reproduction, release, performance, di splay or disclosure of the Software an d accompanying Do cumentation by th e U ni t ed States Government shall be govern ed solely b y the ter ms of this Agreement and shall b e prohibite d except t o the ex tent expressly permitted by the terms of this Agreement.
Product Guide ix
9. Export Controls. You have been advised that the Software is subject to the U. S. Export Administrat ion
Regulations and applicable loca l export contro l laws. Yo u shall not export, import or trans fer Pro ducts con trary to U.S. or other applicable local laws , whether directly or indirectly, and will not cause, approve or otherwise facilitate others such a s agen ts or an y third par ties i n doing s o. If appl icable to you, you re present a nd agr ee that neither the Uni ted S tates Bureau of Expo rt Admi nistr atio n nor any other fe dera l agenc y has suspend ed, r evoked or denied your export privileges. You agree not to use or transfer the Software for end use relating to any nuclear, chemical or biological weapons, or missile technology unless authorized by the U.S. Government and any other applicable local authority by regula tion or specifi c license. Additionall y, you acknowledge tha t the Software is subject to exp ort cont rol reg ul at ion s in t he Eur ope an Unio n an d you he reb y de cl are an d ag ree t hat the Sof twar e will not be used for any other purpose than civil (non-military) purposes. The parties agree to cooperate with each other with respect to any application for any required licenses and approvals, however, you acknowledge it is your ultimate responsibi lity to comply with any and all e xport and import laws and that McAfee has no furthe r responsibility after the initial sale to you within the original country of sale.
10. High Risk Activities. The Software is not fault-tolerant and is not designed o r i nt ended for use in hazardous
environments requiring fa il-safe perf ormance, including wi thout limitatio n, in the operati on of nuclear f acilities, aircraft navigation or communication systems, air traffic control, weapons systems, direct life-support machines, or any other application in which the failure of the Software could lead directly to death, personal injury, or severe physical or property damage (collectively, "High Risk Activities"). McAfee expressly disclaims any express or implied warranty or condition of fitness for High Risk Activities.
11. Miscellaneous. This Agreement is governed by the la w s o f t he N etherlands. The app lication of the United
Nations Conven tion of Contract s for the In ternation al Sale of Goods is ex pressly ex cluded. D isputes wi th respe ct to this Agreement, as well as with respect to its conclusion and execution, will be submitted exclusively to the competent court in Amsterdam. This Agreement s ets forth al l rights for the user of the Soft ware and is the ent ire agreement between the parties. McAfee reserves the right to periodically audit you to ensure that you are not using any Software in violation of this Agreement. Durin g your standard business hours an d up on pr io r written notice, McAfee may visit you and yo u w i ll m ake available to McAfee or its represe nt at ives any records pertaining to the Software to McAf ee. The cost of any req ues ted audit will be solely borne by McAfee, unless such audit discloses an underpayment or amount due to McAfee in excess of five percent (5%) of the initial license fee for the Software or you are using the Software in an unauthorized manor, in which case you shall pay the cost of the audit. This Agreement supersedes any other communications with respect to the Software and Documentation. This Agreement may n ot be modified except by a writt en addendum issued by a duly authori zed representative of McAfee. No pr ovi s ion hereof shall be deemed waived un le ss such waiver shall be in writing and signed by McA fee or a d uly auth orize d rep rese ntati ve o f McAf ee. I f an y pr ovis ion of thi s Ag reeme nt is hel d invalid, the remainder of this Agreement shall continue in full force and effect. The parties have required that this Agreement and all documents relating thereto be drawn up in English. Les parties ont demandé que cette convention ainsi que tous les doc um ents que s'y attachent soient rédigés en anglais.
12. MCAFEE CUSTOMER CONTACT. If you have any questions concerning these terms and conditions, or if
you would like to contact McAfee for any other reason, pl ease call +31 20 586 61 00 or write: McAfee, Gatwickstraat 25, 1043 GL Amsterdam, Netherlands. You will find our In ternet web-site at http:// www.nai.com.
x McAfee Internet Security 5.0
Contents
1
Welcome to McAfee Internet Security 5.0 . . . . . . . . . . . . . . . . . . 15
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
What’s included with McAfee Internet Security? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
What’s new in this release? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
About this manual . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
McAfee Internet Security and your online connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
McAfee Internet Security features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
2
Installing McAfee Internet Security . . . . . . . . . . . . . . . . . . . . . . . 21
Before you begin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
System requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Installation steps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Troubleshooting installation problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Removing or modify ing your McA fee In ter n et Securi ty i nstall at io n . . . . . . . . . . . . . . . . . . 25
Important information about Windows XP migration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
3
Getting Started with McAfee Internet Security 5.0 . . . . . . . . . . . 27
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
The Title bar and Tool bar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Status information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
About Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
About the McAfee list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
How to use the McAfe e In tern et Sec ur it y Co nfigu ra ti on Assi sta nt . . . . . . . . . . . . . . . . . . . 34
How the McAfee In te rnet Sec ur it y Administrator Wo rk s . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Self-Administrating users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
The Administrator's password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
Forgotten passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
How User Setup Works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
Using McAfee VirusScan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Viewing Activity Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Product Guide xi
Contents
4
Keep your program up-to-date . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
What Mcafee Internet Security does while your computer is running . . . . . . . . . . . . . . . . . 39
Responding to McAfee Internet Security Alert Messages . . . . . . . . . . . . . . . . . . . . . 39
Using Browser Buddy to manage your web site passwords . . . . . . . . . . . . . . . . . . . 39
Using File Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Security Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
What Gatekeeper Does . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
What File Guardian Does . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
What Password Manager Does . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
Privacy Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
What Cookie Blocker Does . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
What Identity Protector Does . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
What Web Trail Cleaner Does . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
McAfee VirusScan Home Edition . . . . . . . . . . . . . . . . . . . . . . . . . 57
What’s new in this release? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
What comes with McAfee VirusScan? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Getting Started . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
The Title bar and Tool bar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
Status information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
The Task pane . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
Other McAfee VirusScan features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
About VShield Scanner . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
VShield automatic protection settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
How to Start and St op VS hie ld Scan ne r . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
Using Quarantine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
How to managing quarantined files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
Safe & Sound . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
Safe & Sound configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Emergency disk creation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
Using VirusScan With a Wireless Device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
How VirusScan protects your wireless device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
5
McAfee Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
What’s new in this release? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
How McAfee Firewall works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
xii McAfee Internet Security 5.0
Frequently asked questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
Getting Started with McAfee Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
The Configuration Assistant . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
The McAfee Firewall Home page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
Other McAfee Firewall features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
McAfee Firewall Configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
Program configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
System configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
McAfee Firewalls Intrusion Detection System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
How to Configure the Intrusion Detection System . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
Common attacks recognized by IDS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
6
McAfee Internet Security’s Shared Features . . . . . . . . . . . . . . . . 97
QuickClean Lite . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
McAfee Shredder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
7
Updating McAfee Internet Security . . . . . . . . . . . . . . . . . . . . . . 101
About Instant Updater . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
Instant Updater features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
Contents
A
How to contact McAfee . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
www.McAfee-at-Home.com . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
Customer Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
Technical Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
Virus definition renewal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
B
Internet Security and Privacy . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
Networks and the Internet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
About Privacy and Security on the Web . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
Privacy on the Web . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
Security on the Web . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
Computer Viruses and the Web . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
Types of Viruses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
Frequently Asked Questions About Internet Privacy . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114
C
Your McAfee Internet Security To-do List . . . . . . . . . . . . . . . . . 117
Privacy & Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
Product Guide xiii
Contents
Virus Detection and Prevention Tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
Use a Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
Tips to maintaining your computer and its software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
xiv McAfee Internet Security 5.0

Welcome to McAfee Internet Security 5.0

The Internet provides a vast wealth of information and entertainment at your fingertips. Yet, as soon as you connect, your computer is exposed to a multitude of privacy and security threats. Protect your privacy and secure your computer and your data with McAfee Internet Security. Incorporating McAfee's award-winning technologies, McAfee Internet Security provides one of the most comprehensive sets of privacy and security tools you can buy. McAfee Internet Security destroys viruses, outwits hackers, secures your personal information, privatizes your Web browsing, blocks ads and pop ups, manages your cookies and pass words, locks down your files, folde rs and drives, filters objectionable content, and puts you in control of the communications in and out of your PC. McAfee Internet Security provides powerful protection for today's Int e rnet users.

Introduction

In the last few years the Inter net has changed from a communications network that government entities and universities used almost exclusively, to an information treasure house that people of all ages and occupations can now access. With an Internet account, you can send electronic mail (e-mail) around the world in seconds, do research without leaving home, meet new friends in an online chat room, or shop without getting out of your bathrobe. However, with all these conveniences come a certain element of risk. When you use the Internet, information is transmitted from your computer to other computers on the Internet – information you may not want other people to have. And those computers can also send files to your computer that may contain viruses. While most of these files are harmless, some can invade your privacy or even damage the data on your computers hard drive.
1
McAfee Internet Security addresses any of these potential risks with its comprehensive features designed to protect your privacy and security when using the Internet.
With its new features, you can now also act as an Administrator and apply customized protection settings not only for yourself, but for other users of your computer and easily monitor potential risks they may encounter while browsing the Internet.
Product Guide 15
Welcome to McAfee Internet Security 5.0

What’s included with McAfee Internet Security?

n The Administrator: As the Administrator, you are able to set up
protection settings for other users of your computer. You can add, edit and delete a users profilethen setup individual privacy, security and Internet filtering options that McAfee Internet Security will apply whenever any of these users are browsing the Web through your computer.
n Activity Logs: Activity Logs allow you to view a list of all the
interactions that you and other profiled users of your com puter had with McAfee Internet Security, including the date and time of the activity. You can print, save or clear this list.
n Security Check: You can run an extensive check of your computer for
any privacy or security problems via this feature. After McAfee Internet Security performs the check, it displays any problem found, provides additional information about the problem, and guides you through on how to solve the problem.
n VirusScan: McAfee Internet Security uses McAfee VirusS can to a ddress
virus-related problems you may encounter through the Internet. This feature allows you to set how to perform a virus scan operation on your computer; what to do if a virus is found; and how it should alert you once the virus is detected. You can also direct VirusScan to keep a record of actions performed on your computer.
n Firewall: McAfee Internet Security incorporates McAfee Firewall to
protect your computer while it is connected to the Internet. McAfee Firewall is a highly-flexible, easy-to-use program. Whether you are connected to the Internet via DSL, cable modem or standard dial-up, Internet communication in to and out of your PC is secure.
n QuickClean Lite: Remove unnecessary files using QuickClean Lite. The
QuickClean Lite wizard enables you to clean your computer of unnecessary f iles and free valuable hard disk spa c e.
n Shredder: For privacy and security reasons, you may want to be positive
that the information stored in files you delete is permanently erased from your computer. Shredder does this for you by security wiping deleted files so they cannot be restored or rebuilt using an “undelete” type of utility.
16 McAfee Internet Secu rity 5.0

Whats new in this release?

This release of McAfee Internet Security includes the following new features and functional enhancements.
n Includes VirusScan Home Edition 7 - Includes the latest version of the
award winning VirusScan anti-virus software to protect your system from viruses, Trojans, Internet wo rms, harmful scripts, and other malware. With automated updates and exclusive H.A.W.K. (Hostile Activity Watch Kernel) pr otections, Vi rusScan keeps y o ur computing free of even the latest threats.
n Includes McAfee Firewall 4 - Includes the latest version of McAfee
Firewall. McAfee Firewall enables you to control the communications in and out of your PC and helps keep hackers at bay. With powerful Application Control, Intrusion Detection, and easy Home Networking and Custom Rule Creation Wizards, McAfee Firewall provides essential security for your Internet connection.
n Spyware/Adware Protection - Helps enhance your privacy by rooting
out snooper programs that attempt to track your Web surfing habits. Now you can easily find and shut down these tracking programs that often piggyback on popular freeware utilities and games.
n Extended Stealth Program Protect ion - Helps keep your PC free of
hidden key loggers that try to capture and steal your passwords and a whole host of even more insidious programs that may be watching and recording everything you do on your PC. Adds an essential layer of protection against this growing threat to your privacy and security.
Welcome to McAfee Internet Security 5.0
n Pop-Up Bloc ker - Puts an end to thos e p esky a nd annoying p o p- up ad s
so prevalent on the Internet. Now you'll be able to surf the Internet without these and other ads getting in your way and slowing you down.
n Allow/Block Applications Per User - Lets you to control which
applications are available to different family members. Parents can readily use installed programs while blocking access to younger family members, protecting the family PC while restricting access to questionab le material.
n Filtering of Usenet Newsgroups - Usenet is said to exemplify the best
and worst of the Internet. Now you can take charge of which newsgroups and content various family members might be exposed to and filter out objectionable material while retaining access to the wealth of information Usenet provides.
n MRU Cleaner - Deletes the telltale trail left behind the files you've
opened and viewed recently. Enhances your privacy by clearing MRU's (Most Recently Used) of Windows based utilities and many other popular programs.
Product Guide 17
Welcome to McAfee Internet Security 5.0
n Usability Enhancements - McAfee Internet Security 5.0 includes user
interface enhancements to make it easier than ever to protect your online security and privacy.

About this manual

This manual provides the basic information you need to install, set up and get started with McAfee Internet Security 5.0. More de tailed information a bout how to perform tasks within McAfee Internet Security is provided via online Help. You can get Help while working with the different windows and dialog boxes.
You can also view the Readme.txt file which contains other general information, known issues, etc., about this product.

McAfee Internet Security and your online connection

You must have an Internet connection through a local network or a modem t o use all McAfee Internet Security features. Some networks have an Internet connection that you can use by connecting to the network – either directly or through dial–up networking. Your computer mu st hav e a mod em installed if you don’t connect through a network.
You can establish an Internet connection through an Internet Service Provider (ISP) such as MSN, AOL, or Earthlink, etc. An ISP acts as a middleman between you and the Internet. Your computer connects (using your modem) to the ISPs equipment, which in turn connects your compu ter to the Inter net.
In addition, you must also have a br owser. A browser is software, such as Microsoft Intern et Explore r or Netscape Navigator, tha t allows y ou to view text and graphics and download files from Web sites.
18 McAfee Internet Secu rity 5.0
Welcome to McAfee Internet Security 5.0

McAfee Internet Security features

This section briefly describes other features of McAfee Internet Security that protect you from the most common Internet threats.
Only the designated administrator or a user with administrative rights can have access to these features which allow them to customize protection settings for themselves and in the case of the Administrator, protection for other profiled users of the same computer.
Protection from privacy threats
n Identity Protector monitors your Internet connection and warns you
before private i nformation is sent to an nonsecure Internet site. It stops programs and other people that use your computer (like your kids) from sending your name and credit card numbers over the Internet without your approval.
n Cookie Blocker prevents Web sites from storing cookies on your hard
drive. Third-party Web sites use cookies to track your Web browsing habits. You can choose your level of interaction with Cookie Blocker.
n Web Trail Cleaner cleans your Web browsing trails such as cached files;
list of URLs (Uniform Resource Locator, also known as Web address) visited; and history fileswhen you close your browser. This feature prevents other users of your computer from tracking your online movements by viewing the files and URL addresses left over from your Internet browsing.
n Referer Filter prevents search information that you request at one Web
site from being passed along to the next site you visit. Without Referer Filter, your browser may be allowing the transfer of your search request information from one Web site to another.
Protection from security threat s
n Gatekeeper allows you to cont rol the programs that have a ccess to your
Internet connection. Programs on your PC can be programmed to access to the Internet without your consent.
n File Guardian protects files that contain your sensitive data from being
opened, renamed, copied, moved, or deleted. Programs, such as ActiveX and Java programs, can scan your PC for personal information or delete files without your permission.
File Guardian also limits access to protected files ei ther to programs you specify or through file encryption. It can limit the programs that can access your tax, online banking, or personal accounting data files.
Product Guide 19
Welcome to McAfee Internet Security 5.0
n Password Manager stores your Web site login names and passwords for
protected Web sites in one secure location. When you are visiting a site that requires this information, you can drag it from Browser Buddy to the form displayed in your browser. No more storing your login names and passwords in an nonsecure location, such as post-it notes on yo ur monitor or in a text file on your Windows desktop.
n Browser Buddy is convenient tool with a dual purpose. First, Browser
Buddy lets you view a summary of cookie activity. Just choose a Web site that you have visited from the drop-down list. Second, Browser Buddy gives you access to the passwords that you have stored in Password Manager. When you log on a password-controlled Web Site, you can drag and drop a user name and pas sword from Browser Buddy to the appropriate box in the login form. To access Browser Buddy, right-click the McAfee Guardian icon in the Windows system tray and click Browser Buddy in the pop-up menu.
Protection from virus threa ts
Using McAfee VirusScan, the following features are available:
n Scan to start the default virus scan task immediately, or conf igure a virus
scan task that suits your ne eds.
n Scheduler to launch the McAfee VirusScan Scheduler. This utility
enables you to configure and run unattended virus scan operations.
n Virus info to display virus information via the McAfee Web site.
Safeguard your computer against intrusions and attacks
Protect yourself while online with the advanced security of McAfee Firewall. Easy-to-use, yet highly secure, McAfee Firewall safeguards your PC's connection to the Internet whether you connect via DSL, cable modem, or dial-up. McAfee Firewall gives you t he powerful tools you need to control the communications into and out of your PC.
20 McAfee Internet Secu rity 5.0

Installing McAfee Internet Security

Before you begin

McAfee distributes McAfee Internet Security 5.0 in two formats:
1 As an archived file that you can download from the McAfee web site. 2 On CD-ROM.
Although the method you use to transfer files from an archive obtained via download differs from the method you us e to transfer files from a CD that is placed in your CD-ROM drive, the installation steps followed after that a re the same for both distribution types. Review the system requirements shown below to verify that this software will run on your computer.

System requirements

To install this product, you require the following:
Desktop and notebook computers
n Windows 98, Windows Me, Windows 2000 Professional, W indows XP
Home Edition, or Windows XP Professional.
2
n Internet Explorer 4.01, Service Pack 2 or higher required for Windows
NT; IE 5.01 or later recommended.
n 71 megabytes (MB) of hard disk space. n 32 MB of RAM. n An Intel Pentium-class or compatible processor rated at 100 MHz or
higher.
n CD-ROM drive. n Internet access for product updating.
Additional requirements for wireless devices
McAfee Internet Security includes the latest version of McAfee VirusScan software. In order to fully protect your wireless device from viruses, trojans, and worms, etc., your wireless device requires the following:
Product Guide 21
Installing McAfee Internet Security
Palm OS and Palm requirements
McAfee VirusScan for Palm Desktop with HotSync Manager 3.0 will install and run on any IBM PC or PC-compatible computer equipped with Palm Desktop 3.0 or later. The latest version of Palm Desktop and HotSync 3.0 is a free download from Palm's site (at www.palm.com). The device-resident portion is quite simple and should work on any device with the Palm OS.
Windows CE or Pocket PC System requirements
McAfee VirusScan for Windows CE or Pocket PC will install and run on any IBM PC or PC-compatible computer equipped with ActiveSync 3.0 or later. Any CE device with ActiveSync 3 will function properly.
Symbian EPOC System requirements
McAfee VirusScan for Symbians EPOC will install and run on any IBM PC or PC-compatible computer equipped with PsiWin 2.3 (or equivalent for non-Psion EPOC devices. All EPOC devices should ship with PsiWin 2.3 /EPOC Connect 5. These include:
n Psion Revo n Psion Series 5mx n Psion Series 7 n Psion netBook n Oregon Scientific Osaris n Ericsson MC218 n Ericsson R380
If you have an older device but the current PsiWin/EPOC Connect software, McAfee VirusScan for Symbians EPOC will function properly, including the Psion HC, the MC series, the Workabout series, all Psion Series 3 models, the Psion Sienna, the Psion Series 5, the Geofox One, and the Phillips Illium.
If you do not have PsiWin 2.3, Symbian offers a free product called EPOC Connect Lite which also works.
22 McAfee Internet Secu rity 5.0

Installation steps

After inserting the McAfee Internet Security 5.0 installation CD into your computers CD-ROM drive, an Autorun image should automatically display. To install McAfee Internet Security software immediately, click Install McAfee Internet Security, then skip to Step 5 to continue with Setup.
Use the steps b e low to i nst al l you r sof twa re.
1 If your computer runs Windows 2000 Professional, or Windows XP, log
on to your computer as a user with administrative rights. You mus t have administrative rights to install this software.
2 Insert t he McAfee I nternet Security 5.0 CD in to your computer’s
CD-ROM drive. If the Installation Wizard does not automatically display, go to Step 3. Otherwise, skip to Step 4.
3 Use the following procedure if the Autorun installation menu does not
display, or, if you obtained your software via download at a McAfee web site.
a From the Windows Start menu, select Run.
b Type <X>:\SETUP.EXE in the text box provided, then click OK.
Installing McAfee Internet Security
The Run dialog box displays.
4 Here, <X> represents the drive letter for your CD-ROM drive or the path
to the folder that contains your extracted McAfee Firewall files. To search for the correct files on your hard disk or CD-ROM, click Browse.
a Before proceeding with the installation, Setup first checks to see
whether your computer has the Microsoft Windows Installer (MSI) utility running as part of your system software. If your computer runs Windows XP, the current version of MSI already exists on your system. If your computer runs an earlier Windows release, you may still have MSI in your computer if you previously installed other software that uses MSI. In either of these cases, Setup will display its first wizard pane l immediately. Skip to Step 5 t o continue.
b If Setup does not find MSI or an earlier version of MSI is installed
in your computer, it installs files necessary to continue the installation, then prompts you to restart your computer. Click Restart System. When your computer restarts, Setup will continue from where it left off.
5 Refer to steps displayed on the Installation Wizard to complete your
installation.
Product Guide 23
Installing McAfee Internet Security
NOTE
If your computer does not have the required fonts to view the End Users License Agreement (EULA), then you may locate the appropriate EULA on your McAf ee software installation CD. You must read and agree to the terms of the agreement to complete your installation.

Troubleshooting installation problems

A failed installation can cause software problems that are difficult to track down. The major causes of installation failure are:
n Attempting to install while other software is running. n Temporary files that conflict with the installation. n Hard drive errors.
Follow the procedure outlined below to minimize the affect that these common conditions may have on your installation.
Step 1: Close other software
Disable all software running in the background:
1 Hold down the Ctrl and Alt keys on your keyboard, and then press the
Delete key once. The Close Program dialog box appears.
2 Click End Task for every item on the list except Explorer. 3 Repeat steps 2 and 3 until youve closed everything except Explorer. 4 When you see only Explorer in the Close Program dialog box, click
Cancel.
Step 2: Remove t empor ary f iles
Delete the contents of the Windows Temp folder:
1 Double-click the My Computer icon on your desktop. The My Compute r
window opens. Double-click the C: drive. You are now viewing the contents of your hard drive.
2 Double-click the Windows folder. 3 In the Windows folder, double-click the Temp folder. 4 In the menu, click Edit, then click Select All. All of the items in your
Temp folder are highlighted.
5 Press the Delete key on your keyboard to delete the files. If Windows
asks about deleting files, click Yes.
24 McAfee Internet Secu rity 5.0
Installing McAfee Internet Security
6 In the Windows taskbar, click Start, then click Shut Down. 7 Click Restart the computer, then click Yes in the Shut Down Windows
dialog box to restar t your PC.
Step 3: Clean your hard drive
Run the Windows hard drive utilities, ScanDisk and Disk Defragmenter to identify and fix any error s on you r hard drive:
1 Click Start on the Windows taskbar, point to Programs, then Accessories,
then System Tools, and click ScanDisk .
2 In the ScanDisk window, select Standard and Automatically fix errors. 3 Click Advanced. In the Advanced Settings dialog box, make sure the
following settings are selected:
M Only if errors found M Replace log M Delete M Free
4 Ignore the other options, and click OK. Click Start. ScanDisk begins
scanning your drive for errors. Depending on the size of your hard drive, ScanDisk may take several minutes to complete its job.
5 When ScanDisk is finished, close ScanDisk. 6 Click Start on the Windows taskbar, point to Programs, then Accessories,
then System Tools, and click Disk Defragmenter.
7 Click OK to start Disk Defragmenter. Depending on the speed of your
computer and the size of your drive, this may take several minutes to complete.
8 Close Disk Defragmenter when it has finished defragmenting your disk.

Removing or modifying your McAfee I nternet Security installation

If your computers operating system is...
n Windows 2000 Professional n Windows XP Home Edition n Windows XP Professional Edition
Product Guide 25
Installing McAfee Internet Security
... you must log on to your computer using a profile with administr ative rights. Then do the following.
1 From the Windows Control Panel, start the Add/Remove applet. 2 Select McAfee Internet Security and click:
M Remove to remove McAfee Internet Security from your computer. M Change to modify your McAfee Internet Security installation.
3 Refer to steps displayed on the McAfee Internet Security Installation
Wizard to complete your changes. Restart your computer as directed by setup.

Important information about Windows XP migration

Upgrading your computer's operating system from any version of Windows to Windows XP causes all McAfee products installed before migration to become disabled after migration to Windows XP.
You will be made aware of this situation as you make your first attempt to start a McAfee product (after migration) - you will be instructed to reinstall the product.
As such, you will need to uninstall all McAfee products and reinstall using your installation CD or the software obtained from McAfee via download.
26 McAfee Internet Secu rity 5.0

Getting Started with McAfee Internet Security 5.0

McAfee Internet Security is a simple program to use. In fact, this one chapter covers the main things you need to know about using McAfee Internet Security . You begin with answering a few questions via the Interview so that McAfee Internet Security can effectively use its feature to protect you from Internet threats.
3

Introduction

The McAfee Internet Security 5.0 Home page is your central entry point to access and use all of McAfee Internet Securitys tasks, wizards, and components. This screen displays three regions that provide you with dynamic information about current status and navigation links to all tasks.
Product Guide 27
Getting Started with McAfee Internet Security 5.0

The Title bar and Tool bar

Title bar
The Home page displays most of your standard Windows elements; that which includes:
n The title bar displays the name of the program that is currently running. n Close and minimize buttons. McAfee Internet Security 5.0s interface is
of fixed length and width. You cannot resize the interface.
Tool bar
The tool bar displays four browser-like buttons that are common to all screens.
n Back. Click Back to return to the last screen viewed. n Home. Click Home to go to the McAfee Internet Security Home page
from any screen.
n Next. In conjunction with the Back button, use Next to go to any
previously viewed screen during your current session.
n Help. Click Help to view its submenu. The Help submenu may include
any of the following items.
Help submenu item Select this item to...
Help on this page w View online Help for the screen you are currently
Contents and index Help on the Web
McAfee at Home on the Web
About McAfee Internet Security

Status information

Depending upon your configuration, the McAfee Internet Security 5.0 Home page displays other helpful information such as:
n The name or user name of the person currently logged in represented by
Welcome (name)...
n Running status:
28 McAfee Internet Secu rity 5.0
viewing.
w View online Help for McAfee Internet Security. w Start your Internet browser and go directly to the
McAfee Help Web site at McAfeeHelp.com.
w Start your Internet browser and go directly to
McAfee-at-home.com.
w Version information about McAfee Internet
Security.
Getting Started with McAfee Internet Security 5.0
M If McAfee Internet Security is not running displays, click Start
McAfee Internet Security to start the program.
M If McAfee Internet Security is running displays, click Stop McAfee
Internet Security to stop the program.
n Update status:
M If McAfee Internet Security is up-to-date displays, you are using
the most current version of McAfee Internet Security 5.0.
M If Check for an update displays, click Download update to start
McAfee Instant Updater and check for an update to McAfee Internet Security 5.0.
n Number of warnings logged.
M If one or more warnings were logged and not reviewed, click View
warnings to start the Activity log page.
M For more information about Activity logs, please refer to online
Help.
McAfee Firewall st atu s
In order to view McAfee Firewall status information, you must first activate McAfee Firewall. Activation requires that you perform a few preliminary configuration steps; the Firewall Configuration Assistant guides you through this process.

About Tasks

If the Network Traffic monitor does not display on the McAfee Internet Security home page, click Activate McAfee Firewall to start the McAfee Firewall Configuration Assistant.
For more information about the Network Traffic monitor or the McAfee Firewall Configuration assistant, please refer to McAfee Firewall on page 75.
The Task pane displays links that allow you to start McAfee Internet Securi ty’s Tasks. Depending upon your configuration, the Task pane displays McAfee, links that allow you start the Home page for any other current McAfee product that you have installed in your computer.
Starting a task is as easy as clicking its link. The Task list allows you to start McAfee Internet Securitys major components. Although the tasks you can perform will vary based upon your computers operating system and its configuration, primary tasks include:
Change user settings
Select this task to perform the following:
Product Guide 29
Getting Started with McAfee Internet Security 5.0
n Add or remove a user. n Change a user or the Administrators settings.
The User Setting s pr operties sheet
The User Settings property sheet allows the Administrator to configure their own personal settings or any other us ers settings. Self-administrating users can only change their personal settings.
There are four tabs on the user settings property s heet Each tab allows you t o configure settings - grouped by their classification.
n Privacy settings:
Click the Privacy Settings tab to configure your Internet privacy level. For example, you can filter Cookies, Web bugs and block annoying ads and pop up windows encountered while browsing th e Internet.
You can also configure Web Trail cleaner to remove records stored on your computer that were created as you used the Internet. Records of this type include Temporary Internet Files and historical records such as URLs visited, created by your Internet browser.
The Privacy settings sheet allows you to protec t personal information about each user that you want to protect from prying eyes and programs while browsing the Internet.
n Security Settings:
Click the Security Setting tab to monitor your Internet connection and safeguard your computer against suspicious and potential malicious activities. Additionally, you can configure McAfee Internet Security to alert you if you visit harmful Web sites; or if a program in your computer attempt to access th e Internet without your knowl edge.
n From this page of the Change User Settings property sheet, you can
setup File Guardian to protect files, folders, programs, and drives from unauthorized a ccess.
n User Preferences:
The User Preferences tab on the Change User Settings property sheet enables all users to configure how McAfee Internet Security responds to particular events. Here you configure how McAfee Internet Security starts, ho w it should alert you, and manage user passwords.
30 McAfee Internet Secu rity 5.0
Getting Started with McAfee Internet Security 5.0
n Parental Controls:
This page of the Change User Settings property sheet displays for restricted user profiles - only. In other words, this page does not display if the user possesses a self-administrating profile or is the McAfee Internet Security Administrator.
Here you will enable or disable parental controls, and set the content ratings for the selected user. Other tasks tha t you can p erform f rom this section of the Change User Settings property sheet include:
M Filter Web sites, chat, and instant messaging for content, that which
includes the blocking of access to proxy sites.
M Identify the time-of-day a restricted user profile is allowed to access
the Internet.
M Explicitly block or allow a restricted user profile the ability to use
specific programs installed in the computer and limit their access to Internet Newsgroups.
Perform a Security Check
After completing the interview, youll want to find out how your PC may be at risk. Security Check examines your PC for privacy and security problems and then guides you through fixing any problem it finds. If you are using the settings suggested by McAfee Internet Security in the interview, you only need to run Security Check right after installat ion and then every month or so. If you reduce the level of protection, you should run Security Check more frequently.
You can also change the Security Check settings to customize how you want this feature to work on your computer.
View Activity Log
McAfee Internet Security now provides a list of activities that an Administrator can view via the Activity Logs feature. This list is generated based on his preferred security and privacy settings for himself and for other profiled users he created. Anything from dates and time that a user logged on, to PC maintenance, and violation (e.g., a user attempting to pass a credit card number) can be viewed at the single click of a button.
Product Guide 31
Getting Started with McAfee Internet Security 5.0
The Administrator can print, save or clear this list which contain any of the following:
Activity log tab Description
Violations w Displays any activity of a pr of iled user that
All
Firewall
For step-by-step instructions on working with any of the report logs, see McAfee Internet Security online Help.
Set Startup Options
This task allows you to start and st op McAfee Internet Secur ity manu ally and to configure McAfee Internet Security to start as Windows starts.
violates any of the preset protection settings that the Administrator has indicated (e.g., attempting to pass a credit card number). It also displays the day, date and time that the us er logon and off on the computer.
w Displays list of actions that McAf ee Internet
Security performed including the specific feature used to complete the task.
w Displays detailed loggin g in fo rm a tion as it
relates to McAfee Firewall.
Configuration Assistant
Select this task to start the McAfee Internet Security Configuration Assistant. The Configuration Assistant provides you with an easy means of customizing your McAfee Internet Security settings.
Other Tasks
McAfee Internet Security 5.0 is a fully integrated suite that protects and secures your computer and connection to the Internet. In addition to the wizards and features described earlier in this chapter, McAfee Internet Security also includes utilities such as QuickClean Lite, McAfee Shredder, Instant Updater.
Although you can start McAfee Internet Securitys shared feature s from the the Windows Start Menu, you can also start these programs directly from the Other Tasks Task list item.
From the Other Tasks screen you can start:
n McAfee Instant Updater. n QuickClean Lite
32 McAfee Internet Secu rity 5.0
n Shredder n Safe & Sound (Please note, the link to start this utility displays only if
your computers operating systems is Windows 98 or Windows Me.).
n Visual Trace (You must install McAfee Firewall to see this link).

About the McAfee list

The McAfee list displays links to start the Home page to any other supported McAfee product. With this release of McAfee Internet Security 5.0, click the Firewall and VirusScan Home Edition links to start the respective program.
Getting Started with McAfee Internet Security 5.0
Product Guide 33
Getting Started with McAfee Internet Security 5.0

How to use the McAfee Internet Security Configuration Assistant

Although McAfee Internet Security is set up to use security and privacy settings that are appropriate for most users, some features require your input.
Each interview screen either tells you about a McAfee Internet Security feature, asks you to enter information, or asks you how you want McAfee Internet Security to respond to certain situations.
On each interview screen you can click Back to return to a previous screen or click Next to move to the next screen. In the final interview screen, you click Finish to save the settings you selected and close the Interview.
What information do es Mc Afee I nte rnet Secur it y ask m e to ent e r?
The McAfee Internet Security interview asks you to enter the personal and financial information that you want to protect. All the information you enter into McAfee Internet Security is stored in an encrypted form on your hard disk – it is never sent to McAfee Software.
You may want to gather your personal information before you start the interview. During the interview, McAfee Internet Security allows you to enter:
n A password that you can use to protect your McAfee Internet Security
information.
n Information about other users of your computer. If you are the
Administrator, you can create user profiles and set protection settings that McAfee Internet Security uses whenever a user is using the Internet via your computer.
n Personal and financial information that you want to protect from being
sent out over the Internet without your knowledge:
w Name w Social Security number w Address w E-mail address w Telephone number w Other financial number s such as bank account,
n Any Web site login names and passwords that you want to store in
Password Manager.
34 McAfee Internet Secu rity 5.0
brokerage account, credit card, phone card, and so on.
Getting Started with McAfee Internet Security 5.0
n For optimal protection by Identity Protector, include all dashes (such as
Social Security number, bank account numbers, brokerage a ccounts, and ATM cards). For e xample, if you enter 123-45-6789 as your social secur ity number, McAfee Internet Security will recognize the number with or without the dashes. If you enter 123456789, McAfee Internet Security wont alert you if the number is sent out with dashes (123-45-6789). Credit cards do not need dashes because you type the numbers into separate boxes.

How the McAfee Internet Security Administrator Works

Since McAfee Internet Security now offers multi-user logon capabilities, this feature allows one user to act as the administrator of personal information, protection and security settings entered via the McAfee Internet Security features. This is particularly useful if for example, you would want to filter, block or monitor certain types of information that you do not want your children to access when browsing the Internet.
Creating the McAfee Internet Security Administrator account can only be done in the Interview feature of McAfee Internet Security. And only the designated Administrator can access and change information and protection settings of the computer.
After this setup is complete, the Administrator can add other us ers and set the levels of security and protection for each user profile.
TIP
When adding user profiles, the Administrator can designate a user as a Self-Administrator.
See the McAfee Internet Security online Help to view step-by-step instructions on how to set an Administrator account.

Self-Administrating users

The McAfee Internet Security Administrator may designate another us er as a Self-Administrator. This feature may be used if for example, the user is an adult and is deemed responsible enough to customize their privacy and protection settings.
Self-administrating users cannot change the Privacy, Security, or User Preferences settings for any other McAfee Internet Security user.
See the McAfee Internet Security online Help to view step-by-step instructions on how to designat e a user as a Self-Admi n istrator.
Product Guide 35
Getting Started with McAfee Internet Security 5.0

The Administrator's password

As Windows starts, McAfee Internet Security prompts you to enter the password set during the Interview. Without the password, the owner of the Administrator profile cannot log into and start McAfee Internet Security.
Although the owner of the Administrator profile cannot log in, users with a self-administrating or restricted user profiles can continue to use McAfee Internet Security normally. However, if the McAfee Internet Security administrator cannot log in, he or she cannot add, delete, or modify the settings for any user profile, including their own. Additionally, McAfee Internet Security settings cannot be modified.
Therefore, it is very highly recommended that the owner of the Administrator profile create a password that they will not forget, or, write the password down on a piece of paper and store it in a secure location.

Forgotten passwords

Please do not lose or forget the Administrator's password.
As described above, you must use the Administrator's profile to effectively use and configure McAfee Internet Security. Due to the high security risk it poses to you, we cannot describe the solution to recovering a lost or forgotten Administrator profile password in this Product Guide, via online Help, or at our Internet web site.
If you need to obtain a solut ion to this problem, you may contact our Technical Support departmen t at 1-900-3-AT- HOME (1-900-3 28-4663). Please be a dvised that there is a $2.95 per minu te cost fo r this telep hone call and the first two (2) minutes are free*.
Again, we must stress, please do not forget, or misplace the Admin profile password.
*Phone number, prices, availability and technical support options are subject to
change without notice.

How User Setup Works

The Administrator can add, edit and delete profiles of other users who browse the Internet through the same computer. After profiling users, the Administrator can customize their individual protection settings, including Internet filtering options and monitor their browsing habits.
36 McAfee Internet Secu rity 5.0
To customize protection settings for another user, click the Change user settings task displayed on the McAfee Internet Security Home page, the User Setup screen is displayed. You can add, edit or delete a users profile from this screen. Click any of the buttons available and follow through the instructions displayed on screen. Refer to online Help to view more about how to add, edit or delete a users profile.

Using McAfee VirusScan

McAfee Internet Security uses McAfee VirusScan to address virus-related problems you may encounter through the Internet. This fea ture allows you to set how to perform a virus scan operation on your computer; w hat to do if a virus is found; and how it should alert you once the virus is detected. You can also direct VirusScan to keep a record of actions performed on your computer. For more info r m ation, see

Viewing Activity Logs

McAfee Internet Security now provides a list of activities that an Administrator can view via the Activity Logs feature. This list is generated based on his preferred security and privacy settings for himself and for other profiled users he created. Anything from dates and time that a user logged on, to PC maintenance, and violation (e.g., a user attempting to pass a credit card number) can be viewed at the single click of a button.
Getting Started with McAfee Internet Security 5.0
McAfee VirusScan Home Edition on page 57.
The Administrator can print, save or clear this list which contain any of the following:
Log Type Description
Violation w Displays any activity of a pr of iled user that
violates any of the preset protection settings that the Administrator has indicated (e.g., attempting to pass a credit card number).
Maintenance
Activity
w Displays list of actions that McAf ee Internet
Security performed including the specific feature used to co mplete the task.
w Displays identity of profile d user who browsed
the Internet using the computer. It also displays the day, date and time that the us er logon and off on the computer.
For step-by-step instructions on working with any of the report logs, see McAfee Internet Security online Help.
Product Guide 37
Getting Started with McAfee Internet Security 5.0

Keep your program up-to-date

As technologies advance, we continually provide updates to McAfee software products. Updates include new product content, updates to anti-virus signature files, etc. To ensure the highest level of protection, you should always obtain the latest version of your McAfee product. McAfees Instant Updater component allows you to obtain and apply updates to your McAfee products while connected to the Internet. To learn more about Instant Updater, please see
If you purchased McAfee Internet Security on CD, you should ru n Update even if youve just installed McAfee Internet Security. In the time between when the CD was created and when you installed it, updates to the product itself as well as new virus patterns are likely to be available.
TIP
McAfee Internet Security comprises of several major components. Updates must be individually obtained and downloaded for each component.
For example, if you are viewing the Firewall component from within the McAfee Internet Security main window, then if you select Check for a Firewall Update, Instant Updater checks for, downloads, and installs updates to McAfee Firewall onl y. This applies to all McAfee Internet Security components.
Updating McAfee Internet Security on page 101.
38 McAfee Internet Secu rity 5.0
Getting Started with McAfee Internet Security 5.0

What Mcafee Inter net Sec urity does while your computer is running

While you use your PC, McAfee Internet Security is on the lookout for potential privacy and security problems and takes action when it finds a problem. McAfee Internet Security uses the settings stored in Protection Settings to determine what to monitor and how to react.

Responding to McAfee Internet Security Alert Messages

To protect your privacy and security, McAfee Internet Security works as you work. When McAfee Internet Security detects a potential problem, it either handles the problem automatically or warns you with an alert message based on your McAfee Internet Security settings.
Each alert message tells you what potential problem triggered the message and McAfee Internet Securitys recommendation on how to respond. If you want more information about the problem, click the Question Mark button and then click anywhere inside the alert message.
If you find over time that you are being alerted to potential security risks too often, you can adjust the alert message s ettings in Protection S ettings . Cookie Blocker and Gatekeeper require a period of adjustm e nt before McAfee Internet Security has learned to address your concerns with the least amount of disruption.
Using the McAfee Guardian shortcut menu
Even when you arent running the main McAfee Internet Security program, you still have quick access to several features using the McAfee Guardian shortcut menu. Right-click the Guardian icon located in the Windows system tray to display this menu. You can then do any of the following:
n Start McAfee Internet Security. n Display Browser Buddy, which lets you retrieve your Internet
passwords and displays statistics on how many cookies have been allowed or blocked, and how often it has cleared search information.
n Display Windows help for McAfee Internet Security. n Encrypt and decrypt files that File Guardian prote c ts.

Using Browser Buddy to manage your web site passwords

You can depend on McAfee Internet Security to help you easily navigate through the intricacies of the Web. For example, when you connect to Web sites that require a name and pa ssword, you can use Browser Bud dy to:
Product Guide 39
Getting Started with McAfee Internet Security 5.0
n Drag your user name or password from Password Manager and drop it
on the login form for the Web site.
n Add new password information for a Web site.
Browser Buddy can also tell you how many cookies have been allowed or rejected by Cookie Blocker and how many times a search information you initiated from one Web site, was blocked by Referer filter and not passed to another Web site.
Browser Buddy always remains displayed on top of any programs open on your screen. If Browser Buddy is located in an awkward position, you can close it and reopen it as needed.
To add a new user name and password
1 In Browser Buddy, select Add New Entry from t h e Password Manager
drop-down list. The Enter password to save dialog bo x displays.
2 In the Web site text box, enter the Web site address; in the Us er name text
box, type the name by which you identify yourself to this Web site, this may correspond to User Name, Member ID, Member Name, Login ID, or Login Name, and so on.
3 In the Password text box, type the password that confirms your identity.
In Password Manager, McAfee Internet Security displays one asterisk for each character in your password.
4 Click OK.
To retrieve your user name and password
1 In Browser Buddy, select the site name if it doesnt appear automatically
in the Current Web Site list.
2 Drag your user name or password from the Password Manager box to
appropriate field in your Web sites login form. The text appears in the field. ( If the site that you are logging into d isplays
your password t ex t as a series of asteri sks (*), McAfee Internet Security will display one asterisk for each character in your password.)
3 Continue logging in as usual to the Web site.
40 McAfee Internet Secu rity 5.0

Using File Encryption

File encryption translates a file into a “secret” code that makes the file unreadable. You must decode or decrypt the file before you can use it. The file encryption in McAfee Internet Security is designed so that you can easily encrypt or decrypt all of the files that you designate for encryption in File Guardian.
Before you can encrypt a file, you must add it to the Guarded Files list in File Guardian. For step-by-step instructions on adding a file to the Guarded Files list, see McAfee Internet Security Help.
To encrypt or decrypt fi les
n Right-click the McAfee Guardian icon on the Windows taskbar, then
click Encrypt File Guardian files or Decrypt File Guardian files.
Getting Started with McAfee Internet Security 5.0
Product Guide 41
Getting Started with McAfee Internet Security 5.0

Security Features

McAfee Internet Securitys security features safeguard your Internet connection and protect the files on your PC from prying eyes and destructive programs.

What Gatekeeper Does

Gatekeeper lets you control what programs on your PC can have access to your Internet connection. Gatekeeper can also warn you about any of these potentially harmful actions:
n Your browser is directed to a harmful siteone that has been known to
contain virus-infected files (e.g., Trojan horses, prank or destructive ActiveX controls, or other security concerns).
n A program silently uses your modem to connect to another computer. n A program starts up another program. n A program sends out over the Internet a nu mber that follows a common
credit card number pattern.
Responding to Gatekeeper Alert Messages
McAfee Internet Security can display five different Gatekeeper-related alert messages. If you are using the default settings suggested by the Interview, you will see the messages related to Internet access, harmful sites, programs starting another program, and programs sending out credit card-like numbers.
Internet Access A ler t Me ssa g e
Each time you start a program that attempts to use your Internet connection, McAfee Internet Security checks to see if that pr ogram is in the list of programs allowed to access the Internet. If the program is not in the list, McAfee Internet Security displays an alert message to tell you that the program is trying to connect to the Internet and asks you how to deal with the program.
Because McAfee Internet Security displays an alert the first time you start an Internet program, you may want to start each of the Internet-connected programs you use regularly in order to get those alerts out of the way at one time.
42 McAfee Internet Secu rity 5.0
Getting Started with McAfee Internet Security 5.0
You can respond to the Internet access alert message in the following ways:
If you choose ... Then McAfee Internet Security ...
This time only w allows the program to access the Internet this time only
and warns you the next time it tries to access the Internet.
Allow always
Not this time w prevents the program f ro m accessing the Internet. This
w allows the program to access the Internet at any time.
In Protection Settings for Gatekeeper, the program is added to the list of program s al lo w ed to automatically access the Internet . If you decide later that you do no t want this program to use your Internet connect i on, select its name and click Remove.
choice stays in effect unt i l the next time you restart Windows or for Internet Explorer 4 users, until you close your browser. Use this opt i on if you w a nt Mc Af ee Internet Security to warn you the next time the program tries to access the Internet.
Harmful Site Alert Message
Before you can connect to a harmful site, McAfee Internet Security displays an alert message, Your browser is visiti ng Sitena me, a Web si te that may h arm your PC or data.
You must immediately close your browser to end your browsers connection to this site. The faster you close your browser, the less time the site has to transfer harmful data to your PC.
If you want to view the Web site anyway, click Continue.
Program Starts Another Program Message
When another program starts to run another program, McAfee Internet Security checks to see if youve authorized this action. If you havent allowed the program to always open the other program, McAfee Internet Security displays an alert message .
You can respond to the alert message in the following ways:
If you choose ... Then McAfee Internet Security ...
Allow always
w allows the program to start the other program.
Product Guide 43
Getting Started with McAfee Internet Security 5.0
If you choose ... Then McAfee Internet Security ...
Not this time w prevents the program f ro m st ar ting the ot her pr ogram
This time only
Any Credit Card Number Goes Out Message
When a program sends a number resembling a credit card number over the Internet, an alert message is displayed.
You can respond to the alert message in the following ways:
If you choose ... Then McAfee Internet Security ...
just this time.
w allows the program to start the other program just thi s
time.
Not this time
This time only
w prevents the program from sending the number this
time.
w allows the program to send the number just this time.
Why should I change my Gatekeeper settings?
The Gatekeeper settings suggested by the Interview will display the fewest number of aler t messages. If you are using an older browser versi on or just want a higher level of security, you may want to change your settings under the following circumstances:
Use this option If you ...
Going to harmful sites.
My modem dials silently.
Program tries to launch another program.
w want to be warned when the site that you are going to
has been known to cause damage, e.g. contains virus-infected files, T ro ja n horses, prank or destruc tive ActiveX controls, or other security concerns. (To keep McAfee Internet Security’s list of harmful sites current and effective, use Instant Update monthly.)
w want to be warned whe n a pr ogr am i s using your
modem to dial out.
w want to be warned when a program starts up another
program. Many newer programs will warn you before doi ng t his,
but older programs ma y not do so. For example, Internet Explorer 4 uses helper programs to di splay documents.
44 McAfee Internet Secu rity 5.0
Getting Started with McAfee Internet Security 5.0
Use this option If you ...
Any credit card number goes out.
These programs are always allowed access to the Internet

What File Guardian Does

File Guardian can protect files that contain your sensitive data from being opened, renamed, copied, mo ved, or deleted. For added protecti on, you can even encrypt files protected by File Guardian. McAfee Internet Security can also alert you if a program attempts one of the following potentially harmful activities:
n A program attempts to reformat your hard drive. n An ActiveX control attempts to delete files on your hard drive. n An ActiveX control attempts to scan files on your hard drive. n A program attempts to access your system password files.
When McAfee Internet Security displays an alert message, you can decide if the program should be allowed to continue the operation or not.
w want to be warned before any nu m ber tha t resembles a
credit card number is sent out over the Internet.
w want to see a list of what programs you have allowed to
automatically acce ss the Internet. (A program is added to the list when you click Acc ept Alw ays in the Internet access alert message.)
If you change yo ur mind, you can r emove a progr am from the list. You will be warned the next time that program tries to access the Internet.
Responding to File Guardian Alert Messages
McAfee Internet Security can display five diff erent File Guardian-related alert messages. If you are using the default setting suggested by the Interview, you will only see: guarded file; ActiveX scan; ActiveX delete; and drive format messages.
Guarded File Alert Mess age
Using File Guardian, you can set which files to guard on your hard drive and what programs can be used to open the files. If an unauthorized application attempts to access a guarded file, McAfee Internet Security disp lays an alert message that tells you what application is trying to open which file.
Product Guide 45
Getting Started with McAfee Internet Security 5.0
You can then decide whether you want to give the program in question access to the file. If you did not run the unauthorized program yourself, you should immediately investigate the program to determine its source.
If you choose ... Then McAfee Internet Security ...
Allow always w permits the program to open the file and adds the
Not this time
ActiveX Scan Alert Message
There are legitimate reasons for a llowing an ActiveX control to read through, or scan, all of your files. For example, you can go to one site on the Web that uses an ActiveX control to look for viruses on your PC. However, if a site begins to scan your files without warning you, McAfee Internet Security gives you a chance to think about how much you trust the site.
When McAfee Internet Security detects an ActiveX control scanning the files on your PC, it dis plays an alert message that tells you what ActiveX controls are scanning your hard drive.
program to the list of progr am s that are authorized to access the file without further warnings.
w stops the program from o pening the file and warns you
the next time the program tries to open the file.
You can respond to the alert message in the following ways:
If you choose ... Then McAfee Internet Security ...
Not this time
This time only
w Stops the ActiveX control from running this time.
If you change your mind, reload the page in your browser and click This time only the next time McAfee Internet Security displays its ActiveX scan message.
w Permits the ActiveX cont ro l to scan your drive just this
time.
ActiveX Delete Alert Message
There are legitimate reasons for allowing an ActiveX control to delete files. For example, if a control installs special software on your PC to let you interact with its Web site, the control may need to delete files that it created for temporary use. However, if a site doesnt warn you and begins to delete files, McAfee Internet Security gives you a chance to see what file is being deleted and think about how much you trust the site.
When McAfee Internet Security detects an ActiveX control deleting files on your PC, it displays an alert message that tells you the name of the control.
46 McAfee Internet Secu rity 5.0
Getting Started with McAfee Internet Security 5.0
You can respond to the alert message in the following ways:
If you choose ... Then McAfee Internet Security ...
Not this time w Stops the ActiveX control from running this time.
If you change your mind, reload the page in your browser and click Allow this time the next time McAfee Internet Security displays its ActiveX delete message.
This time only
w Permits the ActiveX control to delete files just this time.
Drive Format Alert Message
When a format command is started, McAfee Internet Security doesnt know whether you told your PC to format a Zip disk or whether a rogue ActiveX control has started to format your hard disk. You know that this activity is legitimate when you start the formatting command or if you know that a program you are using needs to format a hard disk (or a Zip or Jaz disk).
When McAfee Internet Security detects a format command, it displays an alert message that tells you which program started the format command.
If you dont know why your disk is being formatted, note the name of the program in the alert message and then turn off your computer using its power switch. If the program has the letters OCX as part of its name, it is an ActiveX control. Do not restart your browser until you have run a Security CheckUp and removed the suspicious ActiveX control from your PC.
Click Continue if you want the program to format your disk.
Why should I change my File Guardian settings?
You may want to change your settings under the following circumstances:
Use this option If you ...
ActiveX scans my drive
ActiveX deletes files from my drive
w want to be warned when an ActiveX control looks
through the files on your PC. This may happen legitimately if the control needs to find
a file to use. If you are concerned, check with the si te that sent you the control.
w want to be warned when an ActiveX control deletes a
files. This may happen legitimately if the control is deleting
older or temporary files that it uses. If you are concerned, check wi t h th e sit e th at sent you the control.
Product Guide 47
Getting Started with McAfee Internet Security 5.0
Use this option If you ...
My drive is bei ng formatted
Password files are accessed
Guarded files
TIP
For step-by-step instructions on adding, editing, or removing files in the Guarded Files list, allowing a program to access a guarded file, or encrypting or decrypting files, see McAfee Internet Security Help.
w want to be warned when any program tries to format any
of your drives. An alert message appears whenever you form at a
floppy disk, other removable media, or hard dis k. You may want to turn this option off temporarily if you are going to format a lot of disk s and dont want to see any messages.
w want to be warned when any program accesses your
Windows password files (i.e., any file with the.pwl extension located in the Windows directory).
Windows func t i ons that are pa ssword-protected use these password files.
w want to prevent any program from opening a file or files.
For further protection , yo u can have McAfee Internet Security include the f ile when you encrypt files.
You can protect indiv idual files, files in a specific fold er , files of the same type, files on t he same drive.

What Password Manager Does

Password Manager lets you store your various Web site login names and passwords in one secure location. When you are visiting a Web site that requires this information, you can drag it from the Browser Buddy to the form displayed in your browser.
In Protection Settings, you can:
w Add a record w Remove a record w Edit a record w View a list of stored login name s and passwords
Whether you wish to add, edit, or remove a password or record, the McAfee Internet Security Inductive User Interface guides you through the steps.
48 McAfee Internet Secu rity 5.0

Privacy Features

McAfee Internet Securitys Privacy features protec t browsing and personal information that you dont want anybody to access as a result of your surfing through the Internet.

What Cookie Blocker Does

Cookies are small files that your Web browser stores on your PC at the request of a Web server. Each time you view a Web page from the Web server, your browser sends the cookie back to the server. These cookies can act like a tag, which lets the Web server track what pages you view and how often you return to them. Some Web sites, such as Microsoft Expedia, use cookies to store your password and preferences so that you can automatically log on to the site.
McAfee Internet Securitys Cookie Blocker offers three options for controlling the use of cookies on your computer. McAfee Internet Security can:
n Reject all cookies n Accept all cookies n Display an alert message each time a cookie is sent to your browser. The
alert displays the name of the entity trying to set the cookie, and provides you the option either to accept the cookie or not.
Getting Started with McAfee Internet Security 5.0
When setting up Cookie Blocker in Protection Settings, you can select one option for direct sites and another for indirect sites. Direct sites are those that you deliberately access. For example: typing the URL address in the location bar of your Web browser; clicking a link in a Web page; or selecting from your list of bookmarks or favorite sites. Indirect sites are those that you access because the site you are connecting to directly displays cont ent from another site as part of its own content. For example, if you went directly to Cool_site.com, it could display an ad from Ads-r-us.com (the indirect site) in a separate frame in the Cool_site page.
If during the Interview, you accepted McAfee Internet Security’s recommendation on how to respond to cookies, Cookie blocker will:
M Automatically allow cookies to be accepted from direct sites. M Blocks cookies when indirect sites try to set a cookie.
Responding to a Cookie Blocker Alert Message
If during the Interview, you set McAfee Internet Security to prompt you for action then it will display the Cookie Blocker alert message the first time a site tries to set a cookie.
Product Guide 49
Getting Started with McAfee Internet Security 5.0
You can respond to the alert message in the following ways:
If you choose ... Then McAfee Internet Security ...
Allow always w accepts the cookie and adds the site to the Allowed list.
Never accept
Each time you visit a site that appears in either the Allowed or Rejected list, McAfee Internet Security adds the number of cookies accepted or rejected to the list. You can see the totals for a Web site in the Browser Buddy.
If you change your mind about a site, you can remove it from the Allowed or Rejected list in the Cookie Blocker settings. The next time that you visit that site it will be as if you are visiting it for the first time. If you want to remove cookies for a site from which youve previously accepted cookies, run a Security Check and remove the cookies for that site.
The next time you go to that site, all cookies from that site are allowed automatically.
w rejects the cookie and adds the site to the Rejected list.
The next time you go to that site, all cookies from that site are refused automatically.(In some cases, the cookie may be written to your local hard disk, but your privacy is protected be cause the cookie is never sent back to the re questing pag e.)
50 McAfee Internet Secu rity 5.0
TIP
You can run Security Check so that it only looks for cookies. On the Perform an Internet Security Check of Your Computer window, select Change How My Computer is Checked. In this window, clear all options except Cookies. Click OK and select Check My computer Now. After you are finished with the CheckUp, don’t forget to revert to your previous settings.
Getting Started with McAfee Internet Security 5.0
Why should I change my Cookie Blocker se ttings ?
If you want a good level of privacy protection without having to see any Cookie Block er alert messag es, configur e your settin gs to always acc ept cookies from sites that you visit directly; and to always block cookies from sites that you havent visited directly.
If you ... Then choose this option.
Want the least number of cookies set and highest assurance of privacy.
Always want to know when cookies are sent.
Are not concerned at all about cookies.

What Identity Protector Does

It is easy to forget that when you send information over the Interne t, it doesn’t go directly from your computer to the computer that is storing the Web page information. Instead, the information can pass through many computers before it reaches its final destination.
Identity Protector can keep your software from sending any personal information over the Internet to an unsecure site. Although you d ont have to worry about a site when it using a secure connecti on, there are many Web sites that use a secure connection only when dealing with credit card transactions.
w Reject for both Direct Sites and Indirect Sites.
If a site requires you to accept a cookie, you can change this setting temporarily to Prompt.
w Prompt for both Direct Site s and Indirect Sites. Be
prepared to respond to a large number of alert messages.
After you respond to the Cookie Blocker alert message, you wont see additional al er t me ssages for that site.
w Either turn off Cookie B locker or change the Indirect
Sites setting to Accept. You should choose the second method if you want to
keep a total of the cookies added to your PC, which you can view in the Browser Buddy.
If more than one person is using your computer, make sure that you create a McAfee Internet Security password. If the person using your computer doesnt enter the McAfee Internet Se curity password, it automatically replaces any protected personal information sent to an unsecure site with the text, xxxx. For example, if your child tries to order an item online without entering your McAfee Internet Security password, it replaces your credit card number with xxxx xxxx xxxx.
Identity Protector offers three optional responses whenever an application tries to send out information over the Internet to an unsecure site:
n Let the information go out.
Product Guide 51
Getting Started with McAfee Internet Security 5.0
n Block the information from going out. n Display an alert message when any application tries to send the
information over the Internet to an unsecure site. This is the response that McAfee Internet Security sets up when you add information to protect in the McAfee Internet Security Interview.
Responding to an Identity Protector Alert Message
During the Interview, McAfee Internet Security asked you to enter your personal and financial information that you want to protect. McAfee Internet Security displays the Identity Protector alert message the first time an application tries to send out this information to an unsecure site.
You can respond to the alert message in the following ways:
If you choose ... Then McAfee Internet Security ...
This time only w Allows the information to go out just this time. Not this time
Why should I change my Identity Protector settings?
You may want to change your settings under the following circumstances:
w Prevents the informa tio n from going out this time.
If you ... Then use this option
Are the only person using your PC and you dont want to be alerted every time.
Have more than one person using your PC.
You want to be warned any time this information is being sent out.
52 McAfee Internet Secu rity 5.0
w Enter all of the information that you want to prevent from
going out and select Allow Always. Create a McAfee Internet Security password. If the
McAfee Internet Security password is not entered after you start Windows, an unauthorized user of your PC cant view or send out your personal in f or m at io n.
w Enter all of the information that you may want to prevent
from going out and select Allow Al w a ys or Ask Before Blocking. For information that you always want to prevent from going out, select Block Always.
Create a McAfee Internet Security password. If the McAfee Internet Security password is not entered after you start Windows, any i nf or m at i on entered in Identity Protector will be blocked from being sent out.
w Enter all of the information that you may want to prevent
from going out and select Ask Before Blocking.
A Note About Passwords
When McAfee Internet Security asks for your password and you enter it, the password stays in effect until one of the following events takes place. For all Windows operating systems:
n You log out of McAfee Internet Security. n You log out of your computer. n You shut down your computer.
Fast User Switching is a Windows XP feature that makes it possible for you to quickly switch between users without having to log off the computer. Multiple users can share a computer and use it simul taneously, s witching back and forth without closing the programs they are running.
If you are using Windows XP with Fast User Switching enabled, McAfee Internet Security detects a fast user switch and as such, requires each respective user to input their password in order to use password required tasks.

What Web Trail Cleaner Does

As you surf the Internet, your browser stores info rmation that makes your browsing experience more satisfying. It uses the information as follows:
Getting Started with McAfee Internet Security 5.0
If your browser uses ... To ...
Cached files
URLs visited
History
w Speed up the display of W eb page elements
such as graphics.
w Display a list of sites that youve visited using
Web addresses.
w Display a list of sites that youve visited using
Web site names.
Then ...
n The files left on your PC can be viewed by others and depending on your
browsers settings, can take up many megabytes of disk space.
n If you accepted McAfee Internet Securitys recommendation during the
interview, McAfee Internet Security di splays the Web Tr ail Cleaner alert message when you close your browser.
Product Guide 53
Getting Started with McAfee Internet Security 5.0
Responding to the Web Trail Cleaner Alert Message
You can respond to the alert message in the following ways.
If you choose ... Then McAfee Internet Security ...
Clean w Deletes all of the cached files, history and URL
Dont clean
By default, McAfee Internet Security selects the s ites that are not bookmarked (that is, part of your list of favorite sites) because it is less likely that you’ll return to these sites. If you dont retu rn to a site, the ca ched files for the site are never used againthey just sit and ta ke up disk space until they are ultimat ely deleted by your browser.
If you later want to delete the files that youve left behind, run the McAfee Internet Securitys Security Check.
information associated with the selected Web site (Domain).
Select a site for cle ani ng by selecting the che ck box next to the site name.
w Closes the Alert messag e and continues closing your
browser.
Why should I change my Web Trail Clea ner sett ings?
You may want to change your settings under the following circumstances:
If you ... Then use this option
Want to see exactly what files are being deleted.
Want to remove all traces of your browsing.
Want to remove files only for Web sites that you havent book marked or added to your list of favorites.
w Prompt to Clean Up after clo si ng
Web browser.
w Automatically Clean Up after closing
Web browser. (Clear the check box for Keep bookmarked items.”)
w Automatically Clean Up after closing
Web browser. Keep bookmarked items .
What Referer Filter Does
When you perform a search in your Web browser, the search information displays in the address box of your Web browser. When you go to another site, the browser retains the search information and the next site you visit can extract it without your knowledge. Referer filter blocks this information from being passe d along to the next site.
54 McAfee Internet Secu rity 5.0
Getting Started with McAfee Internet Security 5.0
If you have Referer Filter selected in the Security Settings of McAfee Internet Security, it automatically removes search information before you go to another Web site. McAfee Internet Security does not di splay an aler t message for this feature, but you can see the number of times Referer Filter blocks this information in the Browser Buddy.
Product Guide 55
Getting Started with McAfee Internet Security 5.0
56 McAfee Internet Secu rity 5.0

McAfee VirusScan Home Edition

Stop viruses and keep your PC safe with McAfee VirusScan! When you're surfing the Internet, there's more to worry about than just viruses. You need to be able to control the communications into and out of your PC to ensure that your computer is safe. VirusScan includes extra firewall protection to keep your computer safe when you're connected to the Internet. VirusScan destroys threats at all entry points to your PC including email and synchronization with your PDA. It constantly monitors and stops virus-like activity on your computer to prevent any new threats from spreading. If you've got an Internet connection, you need more than just an ti-virus protection, you need VirusScan!

Whats new in this release?

n Hostile Activity Watch Kern el (HAWK) constantly monitors your
computer for virus-like activity providing even more protection from Internet-based threats. It looks for events that may indicate new mass-mailers are present, or attachments with double file extensions.
HAWK has been enhanced to include email clients other than just Microsoft Outlook - it now supports Outlook Express, Eudora, and other email that uses SMTP (Simple Mail Transfer Protocol) - this includes many popular email clients however does not include Internet-based email (like Hotmail, for example).
4
n Script Stopper: Many of the fastest spreading viruses, like I Love You,
use scripts to infect your PC. VirusScan 7 stops new malicious threats from infecting your system with Script Stopper constant monitoring to detect actions that are often included in script-based viruses, Script Stopper activity and will stop the actions that are initiated on your computer without your knowl edge. Script Stopper malicious script actions to keep your computer safe from script -initiated threats.
n Integrated with Windows Ex plorer: VirusScan 7 includes a Windows
Explorer plug-in that lets you quickly scan files and access other VirusScan features directly from Windows Explorer making it easier than ever to use award-winning VirusScan technology.
alerts you of the attempted
. Using HAWK's
detects, alerts, and blocks
Product Guide 57
McAfee VirusScan Home Edition
n Microsoft Office Integration: VirusScan 7 scans Microsoft Office 2000+
documents to provide extra protection to users of Microsoft Word, Excel, and PowerPoint (2000+) in the event that VShield background scanning must be disabled.
n Usability enhancements: McAfee VirusScan includes many user
interface enhancements to make it easier than ever to keep your computer and electronic files virus free.
58 McAfee Internet Secu rity 5.0
McAfee VirusScan Home Edition

What comes with McAfee VirusScan?

McAfee VirusScan consists of several components that combine one or more related programs, each of which play a part in defending your computer against viruses and other malicious software. These components are:
n The VirusScan Home page. This is your central entry point in using all
of tasks and components. The Home page provides relevant information such as your computers current Automatic Protection Settings status and version information about your virus definitions. The Home page also informs you if an update to McAfee VirusScan is available for download and the total number o f scan oper ations performed.
n On-Demand Sc a nn ing (ODS). On-demand scanning enables you to
scan at any time. For example, if you suspect you have come in c ontact with an infected file, but have not accessed the file, you may manually scan the suspect file, folder, drive, etc.
To perform an on-demand scan, simp ly sel ect th e Scan for vi ru ses now task from the McAfee VirusScan Home page.
n The VShield Scanner. This is an On-access Scanning (OAS) component
that gives you continuous anti-virus pro tectio n fro m vir us es tha t arr ive on floppy disks, from your network, or from various sources on the Internet. The VShield scanner starts when you sta rt your compu ter, and stays in memory until you shut down. A flexible set of property pages lets you tell the scanner which parts of your system to examine, what to look for, which parts to leave alone, and how to respond to any infected files it finds. In addition, the scanner can alert you when it finds a virus, and can summarize each of its actions.
n Hostile Activity Watch Kern el. HAWK monitors your computer for
suspicious activity that may indicate a virus is present on your system. As opposed to VirusScan, which cleans the virus, HAWK prevents viruses, worms, and trojans from spreading furt her. HAWK moni tors e-mail clients such as Outlook, Outlook Express, Eudora, and any other client that supports SMTP (Simple Mail Transfer Protocol), but does not support Internet-based e-mail such as MSNs Hotmail.
HAWK incorporates McAfees Script Stopper
to detect, alert, and
block malicious script actions to keep your computer safe from script-initiated threats.
n Safe & Sound. This component allows you to create backup sets in
protected volume files, which is the safest and preferred type of backup. A protected volume file is a sectioned-off area of the drive, sometimes called a logical drive.
Product Guide 59
McAfee VirusScan Home Edition
n Quarantine. This component allows you to move infected files to a
quarantine folder. This moves infected files from areas where they can be accessed and enables you to clean or delete them at your convenience.
n The E-mail Scan extension. This component allows you to scan your
Microsoft Exchange or Outlook mailbox, or public folders to which you have access, directly on the server. This invaluable “x-ray peek into your mailbox means that VirusScan software can find potential infections before they make their way to your desktop, which can stop a Melissa-like virus in its tracks.
n The Emergency Disk creation utility. This essential utility helps you to
create a floppy disk that you can use to boot your computer into a virus-free environment, then scan essential system areas to remove any viruses tha t could load at startup.
n Bootable CD. The VirusScan Installation CD includes a CD version of
the emergency startup disk. If your computer is configured to start using its CD drive, then you can use the CD to boot your computer in to a virus-free environment th en scan for viruses that load during startup.
NOTE
Safe & Sound is a VirusScan utility that is only functional when McAfee VirusScan is installed in conjunction with a Windows 98, Windows 98 SE, or Windows Me operating system.
n McAfee Instant Update r. Enables your computer to automatically
communicate with McAfee while you are connected to the internet and inquire of the availability of product updates, updates to anti-virus signature files, and updates to the VirusScan scan engine. You will also use this feature to register your McAfee product.
n Wireless device protection. In addition to total anti-virus protection for
your PC, VirusScan protects your wireless device and PC from harmful viruses transferred during the synchronization process.
n Command-line Scanner s . This component consists of a set of
full-featured scanners you can use to run targeted sca n operat ions f rom the MS-DOS Prompt or Command Prompt windows, or from protected MS-DOS mode. The set includes:
M SCAN.EXE, a scanner for 32-bit environments only. This is the
primary command-line interface. When you run this file, it first checks its environment to see whether it can run by itself. If your computer is running in 16-bit or protected mode, it will transfer control to one of the other scanners.
60 McAfee Internet Secu rity 5.0
McAfee VirusScan Home Edition
M SCANPM.EXE, a scanner for 16-bit and 32-bit environments. This
scanner provides you with a full set of scanning options for 16-bit and 32-bit protected-mode DOS environments. It also includes support for extended memory and flexible memory allocations. SCAN.EXE will transfer control to this scanner when its specialized capabilities can enable your scan operation to run more efficiently.
M SCAN86.EXE, a scanner for 16-bit environments only. This scanner
includes a limited set of capabilities geared to 16-bit environments. SCAN.EXE will transfer control to this scanner if your computer is running in 16-bit mode, but without special memory configurations.
M BOOTSCAN.EXE, a smaller, specialized scanner for use primarily
with the Emergency Disk utility. This scanner ordinarily runs from a floppy disk you create to provide you with a virus-free boot environment.
All of the command-line scanners allow you to initiate targeted scan operations from an MS-DOS Prompt or Command Prompt window, or from protected MS-DOS mode. Ordinarily, you'll use the VirusScan application's graphical user interface (GUI) to perform most scanning operations, but if you have trouble starting Windows or if the VirusScan GUI components will not run in your environment, you can use the command-line scanners as a backup.
Product Guide 61
McAfee VirusScan Home Edition

Getting Started

The McAfee VirusScan Home page is your central entry point to access and use all of McAfee VirusScans tasks, wizards, and components. T h is screen displays three regions that provide you with dynamic information about current status and navigation links to all tasks.

The Title bar and Tool bar

Title bar
The Home page displays most of your standard Windows elements; that which includes:
n The title bar displays the name of the program that is currently running. n Close and minimize buttons. McAfee VirusScans interface is of fixed
length and width. You cannot resize the interface.
Tool bar
The tool bar displays four browser-like buttons that are common to all screens.
n Back. Click Back to return to the last screen viewed.
62 McAfee Internet Secu rity 5.0
McAfee VirusScan Home Edition
n Home. Click Home to go to the McAfee VirusScan Home page from any
screen.
n Next. In conjunction with the Back button, use Next to go to any
previously viewed screen during your current session.
n Help. Click Help to view its submenu. The Help submenu may include
any of the following items.
Help submenu item Select this item to...
Help on this page
Contents and index Virus Information Library
Help on the Web
McAfee at Home on the Web
About McAfee VirusScan

Status information

Depending upon your configuration, the McAfee VirusScan Home page displays other helpful information such as:
n Status of automatic file scanning. This message lets you know if you
n Update availability. If an update for McAfee VirusScan is available, or
w View online Help for the screen you are currently
viewing.
w View online Help for McAfee VirusScan. w Start your Internet browser and go directly to the
McAfee AVERT Virus Information Library Web site.
w Start your Internet browser and go directly to the
McAfee Help Web site at McAfee H el p.com.
w Start your Internet browser and go directly to
McAfee-at-home.com.
w Version information about McAfee VirusScan.
computer is or is not protected by automatic file scanning. If you are not protected, Click here to enable automatic file scanning” displays. You can click this message to instantaneously enable automatic file scanning.
if you have not registered this product with McA fee, a message displays describing as such. Additionally , virus definition files (DATs) version information displays here as well.
If there is an update to McAfee VirusScan available, Click here to update McAfee VirusScan displays. You can click this message to start McAfee Instant Updater and update this product.
n The total number of scanning operations performed. The number
represented by this status message indicates the total number of scan operations performed since you installed McAfee VirusScan.
Product Guide 63
McAfee VirusScan Home Edition

The Task pane

The Task pane displays links that allow you to start McAfee VirusScan’s Tasks and Advanced Tasks. Depending upon your configuration, the Task pane displays McAfee, links that allow you start the Home page for any other current McAfee product that you have installed in your computer.
About Tasks
Starting a task is as easy as clicking its link. The Task list allows you to start McAfee VirusScans major components. Although the tasks you can perform will vary based upon your computers operating system and its configuration, primary tasks include:
n Scan for viruses now: This task allows you to scan your entire computer
for viruses. Here you can also choose to scan a specific drive, folder, or file. When the scan is complete, VirusScan scan Summary Report displays.
n Configure automatic protection settings: Select this task to configure
VShield background scan settings.
n Check for a VirusScan update: This task s tarts McAfee Instant U pdater
and checks to see if there is an update to McAfee VirusScan available.
n Other Tasks: Depending upon your McAfee VirusScan configuration,
this task provides you a quick and convenient method to start McAfee VirusScans shared features.
About Advanced Tasks
Similar to the primary Task list, the Advanced task list may vary depending upon your version of Windows, its configuration, and other software that may be installed in your computer. McAfee VirusScan s advanced tasks include:
n Configure and scan my wireless device: Select this task to configure and
defend your wireless device against viruses.
n Manage quarantined files: Select this task to manage files infected with
a virus. Here you can choose to add, remove, clean, and delete infected and quarantined fi l es.
n View and edit scheduled scans: This advanced task allows you to
schedule scan events. You can use the default settings fo r scan events or create a custom list of scan events.
n View VirusScan’s activity logs: Activity logs contains records about
VirusScan settings, scan results, and historical records of scans performed. Select this task to view these records.
64 McAfee Internet Secu rity 5.0
n Configure Instant Updater: Instant Updater is the mechanism used to
register your product and to communicate with McAfee to check for an update to virus definition files (DATs), the virus scanning engine, and for updates to the McAfee VirusScan p roduct. Select this ad vanced t ask to check for updates to McAfee VirusScan.
About the McAfee list
The McAfee list displays links to start the Home page to any other supported McAfee product.

Other McAfee VirusScan features

The VShield Tray Icon
The VShield icon located in the Windows system tray allows you to perform several tasks.
n Launch VirusScan: Select this option to Start McAfee VirusScan, if it is
not running.
n View VirusScan Status: Select this option to view the VirusScan
background scanner (VShield) property sheet. Here you can view real-time statu s i nformation about V irusScans background scan modules.
McAfee VirusScan Home Edition
n Disable VirusScan: Select this option to stop VirusScans background
scanner (VShield).
n About VirusSca n : This option provides you with version information
about McAfee VirusScan.
Windows Explorer plug-in
With functionality similar to that of the VShield system tray icon, you can display a VirusScan toolbar in Windows Explorer.
To display the VirusScan toolbar, right-click the Windows Explorer toolbar and select McAfee VirusScan. The VirusScan toolbar allows you to:
n Scan objects displayed in Windows Explorer. For example, you can
select a file, group of files, folder, or a drive.
To use this feature, select the object you want to scan in Windows Explorer. Click the VirusScan toolbar drop-down arrow and click Scan for Viruses.
n View current VirusScan Status information. To vi ew real-time sc an data
about System scan, E-mail scan, and HAWK.
Product Guide 65
McAfee VirusScan Home Edition

About VShield Scanner

The VShield scanner has unique capabilities that make it an integral part of the VirusScan comprehensive anti-virus software security package. These capabilities include:
n On-access scanning: This means that the scanner looks for viruses in
files that you open, copy, sav e, or otherwise modify, and files that you read from or write to floppy disks and network drives. It therefore can detect and stop viruses as soon as they appear on your system, including those that arrive via e-mail. This means you can make the VShield scanner both your first line of anti-virus defense, and your backstop protection in between each scan operation that you perform. The VShield scanner detects viruses in memory and as they attempt to execute from within infected files.
n Automatic operation: The VShield scanner integrates with a range of
browser software and e-mail client applications. VShield Scanner starts when you start your computer, and stays in memory until you shut it or your system down.

VShield automatic protection settings

The VShield scanner consists of related modules, each of which has a specialized function. You can configure settings for all of these modules in the VShield properties sheet.
System Scan
The System scanner looks for viruses on your hard disk as you work with your computer. It tracks files as your system or other computers read files from your hard disk or write files to it. It can also scan floppy disks and network drives mapped to your system.
The System scanner provides scanning protections against viruses embedded in or attached to e-mail messages as well as well as files that you download from the Internet. The System scanners functionality replaces that which was included in the Download and Internet scanners included with previous versions of McAfee VirusScan.
E-mail Scan
The E-mail scanner monitors e-mail messages and message attachments that you receive via interoffice e-mail systems, and via the Internet. It scans your Microsoft Exchange or Outlook mailbox systems.
66 McAfee Internet Secu rity 5.0
McAfee VirusScan Home Edition
Hostile Activity Watch Kernel
HAWK monitors your computer for suspicious activity that may indicate a virus is present on your system. As opposed to VirusScan, which cleans the virus, HAWK prevents viruses, worms, and t rojans from spreading further.
Hostile Activity Watch Kernel (HAWK) is a VirusScan option that enables constant monitoring for suspicious activity that m ay indicate a virus is present on your system. Suspicious activity includes:
n An attempt to forward e-mail to a large portion of your address book. n Attempts to forward multiple e-mail messages in rapid succession.
E-mail attachments containing program files (executable files with an .exe file extension) or scripts that can be used to mask the actual type document transmitted to you.
By monitoring for these typically malicious activities, HAWK notifies y ou and lets you take action before damage occurs. HAWK can prevent viruses, worms, and trojans from spreading further, while VirusS can cleans the virus to remove it from your computer.
About Script Stopper
Script Stopper™ is a VirusScan protection mechanism associated with the HAWK. Script Stopper routines, perform. For example, Script Stopper
detects malicious activities script methods or
detects scripts that try to:
n Delete, open, or make files in your computer. n Send e-mail messages without your knowledge or consent. n Access your computers registry.
Script Stop per allows you to creat e a list of trus ted scripts. If you encounter a script that is acting in a hostile manner, an Alert mess age displays . At such time, you can block the script from running now, and at any time in the future.
If you recognize the script, you can allow it to run. If you allow a script to run, and indicate that you recognize the script, McAfee VirusScan adds the script to its records of trusted scripts. If there are scripts th at you frequent ly use, or want to allow to run, you can add scripts to a trusted database directly from the Script Stoppe r
property sheet in the HAWK scan module.

How to Start and Stop VShield Scanner

Using the VShield tray ic on
The VShield icon located in the Windows system tray allows you to start and stop automatic file protection. To do this right-click the VShield icon and select:
Product Guide 67
McAfee VirusScan Home Edition
n Launch VirusScan to Start McAfee VirusScan, and to enable automatic
file protection.
n Disable VirusScan to disable automatic file protection. Please note,
automatic file protection, by default, restarts without your intervention within 10 minutes of disablement.
Using the Windows Control Panel applet
1 With the VShield Scanner running, from the Windows task bar select
Start > Settings > Control Panel. The Windows Control Panel displays.
2 Double–click the VirusScan icon.
The VirusScan Services dialog box displays.
3 Select the Service tab and click Stop.
VShield Scanner stops.
4 By default, setup configures McAfee VirusScan to start as Windows
starts. If you do not want McAfee VirusScan to start as Windows s tarts , clear the check box next to Load on startup.
TIP
To maintain the highest level of anti-virus protection, it is not recommended that you disable automatic file protection.
5 Click Apply to save your settings. 6 Click OK to close the VirusScan Services dialog box.
VShield Scanner, by default, is configured to automatically start each time your computer starts. To prevent VShield Scanner to run at startup, clear the Load on startup check box.
68 McAfee Internet Secu rity 5.0
TIP
You can start or re-start the VShield Scanner using the steps described above.

Using Quarantine

Many VirusScan components allow you to move infected files to a quarantine folder. This moves infected files from areas where they can be accessed and enables you to clean or delete them at your convenience.

How to managing quarantined files

This list describes the options available to you when managing quarantined files:
n Add. Select this option to browse for and quarantine a suspected file. n Clean. Select this option to remove the virus code from infected file. If
the virus cannot be removed, it will notify you in its message area.
n Restore. Select this option to restore a file to its original location. Please
note, this option does not clean the file. Make sure the file is not infected before selecting Restore.
n Delete. Select this option to delete the infected file. Make sure to note the
file location so you have a record of the deleted files. You will need to restore deleted files from backup copies.
WARNING
Choose Delete only if a ba ckup copy of the file is available. To learn more about how to restore Windows sy stem files, please visit www.avertlabs.com.
McAfee VirusScan Home Edition
n Submit quarantined files to AVERT via WebImmune: Select this
option to submit new viruses to McAfees investigative labs.
NOTE
McAfee is committed to providing you with effective and up-to-date tools you can use to protect your system. To that end, we invite you to report any new viruses, Java c lasses, ActiveX controls, or dangerous web sites that Viru sSc a n does not now det e ct.
If you have found what you suspect to be a new or unidentified virus, send the infected file to McAfee Labs Anti-Virus Emergency Response Team for analysis, usi ng WebImmune. For more information about WebImmune, please visit www.webimmune.net.
Product Guide 69
McAfee VirusScan Home Edition

Safe & Sound

Safe & Sound is a unique backup utility that automatically creates backup files of your documents as you work on them. You can configure Safe & Sound to back up to a different drive, across a network connection, or to a protected area within your local (c:\) drive. If your files become corrupted due to a virus, or your system crashes, or if you lose your files, McAfees Safe & Sound utility provides you the ability to recover files using the Safe & Sound Windows or DOS recover utility.
Please note, Safe & Sound is a VirusScan utility that is only functional when McAfee VirusScan is installed in conjunction with a Windows 98, Windows
98 SE, or Windows Me operating syst em. How Safe & Sound creates automatic backups:
TIP
You can also attempt to obtain an antidote from A.V.E.R.T. using WebImmune at www.webimmune.net.
Network Associates reserves the right to use any information you supply as it deems appropriate without incurring any obligations whatsoever.
When you select to have Safe & Sound automatically create a backup set for you, it creates the first backup set while you are stepping through the Safe & Sound Wizard. Thereafter, while the Enable Automatic Backup option is selected, it continues to update your backup set at the time delay you’ve specified. If you chose to make Mirror backups, Safe & Sound updates your backup set at the same time that you re-save the original source files.
Defining your backup strategy
After you decide which backup type you want to use (either a protected volume file or a directory backup set), the most important q uestions you must answer when defining your own backup strategy are:
Where will you store the backup set?
In todays computer marketplace, you may discover that it is as cost effectiv e to acquire a separate backup hard drive where you can keep a current mirror backup copy of one or mor e other drives that you use on your PC.
In addition, you may want the backup copy to be stored at a remote location, for increased protection. As long as Safe & Sound can access a logical drive mapped on your PC, it can store the backup set there. That is, the backup set can be stored on a shared network drive.
What files are important (which files must be backed up)?
70 McAfee Internet Secu rity 5.0
Safe & Sound automatically selects files that are typically important to include in a backup set. However, you can select other files or types of files to include in your backup set.
How often should you or safe & sound make these backups?
The more recent your backup set, the happier youll be if your PC does encounter a problem that compromises the data on your primary drives. However, you may want to keep the default Write-behind Delay of 20 minutes to give you time to recover a previous version of a file if you ever need to

Safe & Sound configuration

The Safe & Sound setup wizards guides you through your initial setup. Please access online Help for information about Safe & Sound configuration.
McAfee VirusScan Home Edition
Product Guide 71
McAfee VirusScan Home Edition

Emergency disk c reatio n

As it installs itself, VirusScan software will examine your computers memory and your hard disks boot sectors to verify that it can safely copy its files to your hard disk without risking their infection. During that installation, Setup offers to create an Emergency Disk you can use to start your system in a virus-free environment. Should the VirusScan software itself be come infected, or if you want to be sure your computer is clean before you install any other software, create and use an Emergency Disk to start your computer.
VirusScan software comes with an Emergency Disk wizard that makes disk creation simple and fast.
The Emergency Disk you create includes BOOTSCAN.EXE, a specialized, small-footprint command-line scanner that can scan your hard disk boot sectors and Master Boot Record (MBR). BOOTSCAN.EXE work s with specialized set of virus definiti on (.DAT) files that focus on ferre ting out boot-sector viruses. If you have already installed VirusScan software with default Setup options, youll find these .DAT files in this location on your hard disk:
C:\Program Files\Co m m on Fi l es\Network Associates\V i ru sScan Engine\4.0.xx
The special .DAT files have these names:
M EMCLEAN.DAT M EMNAMES.DAT M EMSCAN.DAT
McAfee periodically updates these .DAT files to detect new boot-sector viruses. You can download updated Emergency .DAT files from this location:
http://www.mcafeeb2b.com/naicommon/avert/avert-research-center/tools.asp
McAfee recommends that you download new Emergency .DAT files directly to a newly formatted floppy disk in order to reduce the risk of infection.
72 McAfee Internet Secu rity 5.0
McAfee VirusScan Home Edition

Using VirusScan With a Wireless Device

Introduction

As the demand for wireless devices continue to grow, it carries with it, the threat of compromising your data against viruses especially whenever you exchange information between your PC and your wireless device.
Wireless devices that are currently available in the ma rket today are primarily designed as a more convenient alternative in storing and retrieving information such as personal activities, peoples addresses, telephone numbers, appointments, expenses, etc. Either at work or at home, you can easily keep track of records in all of these areas by simply us ing your wireless device. You can even set an alarm to alert you of important meetings, events or tasks to do during the day, week or month.

How VirusScan protects your wireless device

McAfee VirusScan is an application designed to protect your data by scanning the files on your wireless device every time a data exchange or update is performed with your computer. It protects your system from viruses that may have been placed on your wireless device during the use of features such as infrared transfers and wireless transactions. McAfee VirusScan supports most types of wireless devices using Palm OS, Pocket PC, Windows CE, and EPOC operating systems (please refer to the following table).
Table 4-1. Examples of wireless device s th at McAfe e VirusScan supports
Operating System Wireless Device Manufacturer
Palm OS
Palm OS
Palm OS w Clie
Pocket PC Pocket PC
Pocket PC
w Palm VII Series w Palm V Seri es w Palm III Series w Palm M Seri es
w Visor w Visor Edge
Palm, Inc.
HandSpring
Sony
w E-115 w iPAQ
w iPAQ H3600 Series w Aero w Aero 2100 Series
w PPT 2700 Series Symbol Technologies
Casio
Compaq
Product Guide 73
McAfee VirusScan Home Edition
Table 4-1. Examples of wireless device s th at McAfe e VirusScan supports
Operating System Wireless Device Manufacturer
Pocket PC w Jornada 540
w Jornada 680 w Jornada 720
Pocket PC
Windows CE Windows CE
w E125 w EM500
w PenCentra 130 Fujitso w HPW-600 ET
Hewlett-Packard
Cassiopeia
Hitachi
Windows CE w WorkPad z50 IBM EPOC
EPOC
w Psion Series 5MX w Psion - Revo
w Mako Diamond
Psion PLC
TIP
For more information about protecting your wireless device, please refer to online Help for McAfee VirusScan.
74 McAfee Internet Secu rity 5.0

McAfee Firewall

Introduction

Protect yourself while online with the advanced security of McAfee Firewall. Easy-to-use, yet highly configurable, McAfee Firewall secures your PCs connection to the Internet whether you connect via DSL, cable modem or dial-up. With intrusion detection, color coded security alerts, customizable audible alerts, detailed logging, and an application scan for Internet enabled applications, McAfee Firewall gives you the power you need to control the communications into and out of your PC, ensuring tha t your online experience is as safe as it is enjoyable.
McAfee Firewall:
n Controls file and print share access. n Shows who is connecting to your computer if you allow sharing. n Stops floods and other attack packets from being received by the
Operating System.
n Blocks untrusted applications from communicating over the network.
5
n Provides detailed information about which sites you have contacted and
the type of connection that was made.
n Can be set to block all traffic or traffic from a spec ific IP address
immediately.

Whats new in this release?

n Firewall security check: Examines yo ur security sett i ngs for possible
vulnerabilities.
n Enhanced hacker tracin g with the addition of McAfees Visual Trace
technology.
n Intrusion Detection System: Detects common attack types and
suspicious activity.
n Home networking wiza rd: Set up protection for personal computers
sharing an Internet connection.
n Wizard for creating custom rules: Create custom configurations for
specific programs.
Product Guide 75
McAfee Firewall
n Password protection: Prevent others from tampering with your firewall
settings using password protection.
n Improved support for broadband connections. n Usability enhancements: McAfee Firewall 4.0 includes many user
interface enhancements to make it easier than ever to secure your computer.

How McAfee Firewall works

McAfee Firewall is a simple-to-operate security tool that dynamically manages your computing security behind the scenes.
Setup
During the installation process, the Configuration Assistant prompts you with basic questions to set up McAfee Firewall to do specific tasks – according to your needs (e.g. allow sharing of files or not).
Operation
McAfee Firewall filters traffic at the devices that your system uses - network cards and modems. This means that it can reject inbound traffic before that traffic can reach vital functions in your computer and waste valuable system resources.
McAfee Firewall – the Gatekeeper
When McAfee Firewall is running, it monitors trusted and untrusted programs that communicate using the Internet. If a trusted application attempts to communicate, McAfee Firewall al lows the program to function without restrictions. If an untrusted program atte mpts to communicate into or out of your computer, McAfee Firewall blocks the programs attempt to communicate via the Internet.
Configuration
Some network communications are needed to maintain network-based services. These are managed through user defined rules under the system settings of McAfee Firewall. The default system settings feature provides superior protection from hostile threats.

Frequently asked questions

The following are some frequently asked questions that you can briefly review:
How will McAfee Firewall help me?
76 McAfee Internet Secu rity 5.0
McAfee Firewall
McAfee Firewall protects your computer at the network level. It acts as a gatekeeper, checking every data packet going in or out of your PC. It allows only what you tell it to allow.
McAfee Firewall has been designed to be easy to use, while providing superior protection. Once you install and run it, it is configured to block known attacks and to ask you before allowing applications to communicate.
How is my PC at risk on the Internet?
When you connect to the Internet, you share a network with millions of people from around the world. While the Internet is a wonderful and amazing accomplishment, it brings with it all the problems of being accessible to complete strangers.
While communicating via the Internet, you should take safety precautions to protect your computing environment. If you use IRC (Internet Relay Chat) programs, be suspicious of files total strangers send you. Programs that give others remote access to your computer, such as Back Orifice (BO), are frequently disseminated in this manner. It is a good practice to scan files received using anti-virus programs such as McAfee VirusScan before you open or view files and their attachments.
When on the Internet, others can try to access your f ile sha res. Therefore, you should check that they are only accessible to those you trust. Otherwise, untrusted parties can read and delete what is in you r c o mputer.
What other protection do I need?
McAfee Firewall provides network level protection. Other important types of protection are:
n Anti-virus programs for application-level protection. n Logon screens and screen saver passwords to prevent unauthorized
access.
n File encryption or encrypting file systems to keep information secret. n Boot-time passwords to stop someon e else fr o m starti ng you r PC. n Physical access to the computer, e.g. stealing the hard drive.
A separate but also important issue is controlling access to information, misinformation and “filth” that is widely available on the Internet. You can use a number of content-filtering services or programs such as McAfee’s Internet Security that can filter th e contents of data packets or r estrict access to certain sites.
Are there any data packets that McAfee Firewall cannot stop?
Product Guide 77
McAfee Firewall
Inbound Data: No. As long as McAfee Firewall supports a network device and is running, it is intercepting all incoming packets and will allow or block according to the way you have it configured. If you choose to block everything, it will.
Outbound Data: Yes and no. McAfee Firewall intercepts outbound data packets as they are passed to the network device driver. All popular applications communicate this way. A malicious program could communicate by other means, however.
What network devices does McAfee Firewall support?
McAfee Firewall supports Ethernet and Ethernet-like devices. This includes dial-up connections, most cable and ISDN modems and most Ethernet cards. It does not support Token Ring, FDDI, ATM, Frame Relay and other networks.
What protocols can McAfee Firewall filter?
McAfee Firewall can filter TCP/IP, U D P/IP , I CMP/IP and ARP. It intercepts all protocols, but others, such as IPX, must be either allowed or blocked - no filtering is done. The Internet uses the IP protocols. No others are sent. Also, IP networks are the most common.
How can I still be harassed, even with McAfee Firewall?
Many people use McAfee Firewall to block the “nukes” that cause their IRC connections to be broken. While McAfee Firewall blocks the nukes, there are other ways that attackers can still cause the connections to be broken:
n Server-side nuking. This is when the "nukes" are sent to the IRC server,
not to your computer, telling the server that you can no longer be reached. To prevent this, the IRC server needs a firewall.
n Flood blocking a TCP connection. If a flood of packets is sent to you
from a higher speed connection, McAfee Firewall can stop the packets, but the flood takes up all your bandwidth. Your system does not get a chance to send anything. Dial-up users are particularly vulnerable since they have the lowest speed connections.
TIP
To read additional frequently asked questions, refer to the Readme.txt file.

Getting Started with McAfee Firewall

After installing McAfee Firewall, you will need to configure your software for its first use. The Configuration Assistant guides you through this process.
78 McAfee Internet Secu rity 5.0
TIP
Previous versions of McAfee Firewall did not allow you to run the Configuration Assistant more than once. However, McAfee Firewall 4.0 allows you to run the Configuration Assistant with an easily accessible link on the McAfee Firewall Home page.

The Configuration Assistant

Welcome Scre en
The McAfee Firewall Configuration Assistant displays the first time you start McAfee Firewall. This wizard guides you through initial setup and activates McAfee Firewall on your computer. Select Back, Next, Cancel, and Finish to navigate the Configuration Assistant screens.
If you select Cancel on any Configuration Assistant screen, the activation and configuration process stops. You must complete the Configuration Assistant
on first use in order to activate and use McAfee Firewall.
Network Control Settings
Network Control Settings identify how you want McAfee Firewall to respond when a program attempts to access the Internet; either into or out of your computer.
McAfee Firewall
1 To set your Network Control settings, from the Welcome to McAfee
Firewall screen, select one of the following.
Table 5-2. McAfee Firewalls Network Control Settings
Internet Traffic Setting Description
Block all traffic Configures McAfee Firewall to block all Internet
traffic into and out of your computer. This is the most secure firewall setting; however, programs in your computer cannot acces s t he I nt er net.
Product Guide 79
McAfee Firewall
Table 5-2. McAfee Firewalls Network Control Settings
Internet Traffic Setting Description
Filter all traffic Gives you the opportunity to d ecide whether an
application or program in your computer will be allowed to access the Internet. If an unrecognized program attempts to access your computer from the Internet, you will also be given an opportunity to allow or block its access yo ur computer.
Allow all traffic Configures McAfee Firewall to allow all Internet
traffic into and out of your computer. All programs in your computer will be allowed to access the Internet; programs attempting to access your computer from the Internet will not be blocke d. Allo w all tra ffi c disables all McAfee Firewa l l prot ec t io n fe atures and should only be used for diagnostic purposes.
2 Click Next.
Startup Options
This screen allows you to choose how you want McAfee Firewall to respond as you start your computer.
For your convenience, recommended Startup Load Options have been pre-selected for you.
1 Select Load McAfee Firewall automatically at startup if you want
firewall protection as you start your computer. If you do not want McAfee Firewall to start as your computer starts, then clear this check box.
2 If you want to display a McAfee Firewall icon on your Windows
desktop, then select Place a McAfee F irewall icon on th e desktop. If you do not want an icon on your Windows desktop, then clear this check box.
3 Click Next.
Access to shares
If your computer is part of a workgroup, such as a home network, you can configure McAfee Firewall to allow access to your computers network shares as well as allow your computer to access other computers shares. A share is a resource such as a drive, directory, file, or printer available to a workgroup or home networked computers.
80 McAfee Internet Secu rity 5.0
McAfee Firewall
1 Access to other shares: check the Allow my computer to access other
computers shares if you want to allow your computer to have access to the shared drives, directories, folders, and printers, etc. of other computers in your workgroup or home network.
2 Access to my shares: check the Allow other computers to access my
shares check box to allow other computers in your workgroup or home network to have access to your shared drives, directories, folders, and printers, etc.
3 Click Next.
Allowed applications
During the configuration process, McAfee Firewall scanned your computer's hard disk to identify programs that use the Inter net. For example, programs of this type would include Internet browsers, Internet e-mail programs, and ftp (file transfer protocol) clients. On this screen, you will identify programs that you will allow to access the Internet through McAfee Firewall.
To allow specific programs to access the Internet, do the following:
1 From the list of applications displayed on this, check the check box
corresponding to each program you will allow access to the Internet.
Click Search all drives to search all of your computers partitions, logical drives, and physical hard drives for programs that communicate using the Internet.
If you do not allow any or all of the programs displayed on this screen to communicate, you will be notified when each attempts to do so and decide whether to allow access to the Internet at that time.
2 Click Finish.
Whats happens next?
After you complete the steps associated with setting up your initial configuration, the following events take place:
1 The firewall service starts. 2 The McAfee Firewall Home page displays.
You are now ready to start using McAfee Firewall!
Product Guide 81
McAfee Firewall

The McAfee Firewall Home page

The McAfee Firewall main window is your central entry point to all of McAfee Firewalls Tasks, Advanced Tasks, and shared features. The McAfee Firewall interface displays three regions common to all of McAfee Firewalls screens.
The Title bar and Tool bar
Title bar
The Home page displays most of your standard Windows elements; that which includes:
n The title bar displays the name of the program that is currently running. n Close and minimize buttons. McAfee Firewalls interface is of fixed
length and width. You cannot resize the interface.
Tool bar
The tool bar displays four browser-like buttons that are common to all screens.
n Back. Click Back to return to the last screen viewed. n Home. Click Home to go to the McAfee Firewall Home page from any
screen.
82 McAfee Internet Secu rity 5.0
McAfee Firewall
n Next. In conjunction with the Back button, use Next to go to any
previously viewed screen during your current session.
n Help. Click Help to view its submenu. The Help submenu may include
any of the following items.
Help submenu item Select this item to...
Help on this page w View online Help for the screen you are currently
viewing. Contents and index Help on the Web
McAfee at Home on the Web
About McAfee Firewall
w View online Help for McAfee Firewall. w Start your Internet browser and go directly to the
McAfee Help Web site at McAfee H el p.com.
w Start your Internet browser and go directly to
McAfee-at-home.com.
w Version information about McAfee Firewal l .
Status information
Depending upon your configuration, the McAfee Firewall Home page displays other helpful information such as:
n Firewall Status: Running or Stopped. Click the link below the status to
start or stop McAfee Firewall.
n Home page notification. If there is an update to your version of McAfee
Firewall available for download, select this task.
n The number of programs currently communicating. If you want to
identify the programs communication, select this task to view your current activity.
n Firewall warning information. If there are any communication
warnings, select this task to view the warning log.
Internet traffic settings
The Internet Traffic setting frame displa ys your current filter ing setting. H ere you determine if you want to Block all, Al low all, or Filter Internet Traffic. For more information about these settings, refer to Table 5-2 on page 79.
To change an Internet traffic setting, simply click the de sired setting. Changes are real-time and effective immediately.
Product Guide 83
McAfee Firewall
McAfee Firewall status
This region of the Home page displays the current running state of McAfee Firewall. It is either running or not running.
If the McAfee Firewall status message is...
McAfee Firewall is Running
McAfee Firewall is Stopped
Then...
w Click Stop McAfee Firewall to disable
firewall protection.
w Click Start McAfee Firewall to enable
firewall protection.
Network Traffic monitor
The Network Traffic monitor displays a graphic representation of real-time network activity. The monitor is color-coded to help you identify normal network traffic, port scans, and worst of all, attacks.
n Green zone: Activity displayed in this zone is normal network activity.
It is not uncommon to see activity in this zone reaching the yellow area.
n Yellow zone: This is the caution zone. You can view the Activity Log to
analyze data for this traffic. Activity in the yellow zone could represent a port scan.
n Red zone: Red represents the worst level of net work activity and usually
represents an attack. You can view the details of the attack by accessing McAfee Firewall Activity Log. If the attacker’s IP address is available, you can attempt to trace the attacker using McAfee Firewalls Visual Trace component.
The Task pane
The Task pane displays links that allow you to start McAfee Firewall’s Tasks and Advanced Tasks. Depending upon your configuration, the Task pane displays a McAfee list, links that allow you start the Home page for any other current McAfee product installed in your computer.
About Tasks
Starting a task is as easy as clicking its link. The Task list allows you to start McAfee Firewalls major components. Although the tasks you can perform will vary based upon your computers operating system and its configuration, primary tasks include:
n Control Internet programs: This task allows you to explicitly block or
allow specific programs to access the Internet.
84 McAfee Internet Secu rity 5.0
McAfee Firewall
n View network activity: Select this task to view real-time network
activity and view your current activity log.
n Set alert preferences: Choose how you want McAfee Firewall to notify
you when a potential security breach occurs.
n Set up Home Networking: Helps make setting up protections for your
PCs sharing an Internet connection a breeze.
n Perform a security check: This task allows you to start the McAfee
Firewall Security Check process.
n Set startup options: Choose how you want McAfee Firewall to start. n Configuration Assistant: This task starts the Configuration Assistant.
About Advanced Tasks
Similar to the primary Task list, the Advanced task list may vary depending upon your version of Windows, its configuration, and other software that may be installed in your computer. McAfee Firewalls advanced tasks include:
n Advanced options and logging: Select this task to configure intrusion
defense mechanisms, set up the automatic configuration of filtering rules, and identify the type of traffic you want to log.
n Configure network adapters: Choose this task to view your current
network adapter and configure their communication settings.
n Intrusion detection settings: Select this task to configure how you want
McAfee Firewall to respond upon its detection of an intrusion.
n Block IP address: If there is a specific IP address that you want to block
from accessing your computer, or, if there is an IP address that is currently blocked that you want to allow, choose this task.
n Set up password: This task helps you to secure your McAfee Firewall
settings with password security.
n Other Tasks: Select this task to navigate to a screen that allows you to
start McAfee Firewalls shared features
About the McAfee list
The McAfee list displays links to start the Home page to any other supported McAfee product.
Product Guide 85
McAfee Firewall

Other McAfee Firewall features

McAfee Firewall settings security chec k
Examines your firewall security settings, allowing you to rectify weaker settings before hackers get a chance to exploit them. The McAfee Firewall Settings Security Check flags and suggests changes to help you keep your system set to optimal security.
If Security Check detects an issue, click Fix and McAfee Firewall helps you analyze and correct potential problems.
Home networking wizard
Helps make setting u p protections f or your PCs shar ing an Internet connection a breeze, providing helpful wizards to walk you through the process.
All networking media and hardware (such as cables and network adapters) must be installed on each computer in order for this wizard to locate your computers.
Password protection
Prevent others from tampering with your firewall settings by locking access to them with password security. Also helps keep your firewall protections secure by preventing the firewall from being shut down with out your password.
About Visual Trace
Visual Trace is a multi-purpose Internet tool used for finding information and trouble-shooting connection problems.
At the simplest level Visual Trace shows you how packets (data) get from your computer to another computer on the Internet. You see all the nodes (equipment of various types on the Internet that is passing traffic) between your computer and the trace target.
There are many situations where you need this information. Visual Trace is a useful tool when troubleshooting connections or just verifying that everything is working OK. There is also a wealth of information presented by Visual Trace, including the domain owners, relative locations, and in many cases, the location of nodes.
Besides using V isu al Tr ace to l ook for w eak spo ts in a con nect ion y ou ca n use it to:
n Discover whether you can't reach a site due to a failure at your Internet
Service Provider (ISP) or further into the Internet
n Determine the point of a network failure that is preventing you from
reaching a Web site.
86 McAfee Internet Secu rity 5.0
n Determine the location of sites and their users, uncover the owners of a
site, and help track down the origin of unwanted e-mail messages ('spam').
n Get detailed contact information on sites all over the world (where
available).
How to start Vi su al T ra ce
You can start Visual Trace directly from the Windows start menu. You can also start Visual Trace from the McAfee Firewall Detail Activity screen, the Block IP dialog box, and if you are attacked, from the Windows system tray pop-up notification.
For more information about Visual Trace, please refer to online Help for Visual Trace.

McAfee Firewall Configurations

The configuration of McAfee Firewall is divided into two classifications – application (program) and system. Upon installation, a base set of rules for system servic es such as ICMP, DH CP and ARP are installed (these are considered default settings).
McAfee Firewall
On the other hand, the programs classification is personalized. Whenever you run a new program that attempts to communicate over the Internet, McAfee Firewall will prompt and ask you whether you want to trust the program or not.
For example, using Internet Explorer, enter an Internet address or URL (i.e: http://www.mcafee-at-home.com) in the address bar of your browser and press ENTER. Internet Explorer will attempt to connect to that URL over the Internet. The first time you do this, McAfee Firewall prompts if you “trust” Internet Explorer. If you say “Yes,” McAfee Firewall notes Internet Explorer is allowed and whenever you use Internet Explorer in the future, McAfee Firewall will allow its traffic.
As you allow programs to use the Internet, McAfee Firewall “learns” the rules you are creating for the program and saves them for future use. If a Trojan horse program attempts to communicate out from your computer, McAfee Firewall will also prompt you whether you trust them or not, and the decision to block the Trojan horse program from communicating is easy and instantaneous.
Product Guide 87
McAfee Firewall

Program configuration

During your first attempt to start McAfee Firewall, the Configuration Assistant asked you to identify programs that you want to allow to communicate. At such time, McAfee Firewall created a default set of communication rules for the programs (applications); designated as allowed to communicate.
Based upon the type of program, for example, Internet browsers, e-mail, ftp, IRC, and file sharing programs, McAfee Firewall identifies the type of program and creates a default set of communication rules for each progra m in your computer. That is, to either block, allow, or filter a program’s communication attempts via the Internet.
Firewall Communication Alert Messages
A McAfee Firewall Communication Alert message displays if an unrecognized program attempts to communicate. There are several scenarios that could cause a program to be unrecognized.
n If you install a program that communicates via the Internet after
installing McAfee Firewall, the programs first attempt to communicate will cause an alert message to display.
n Although the Configuration Assistant performs a thorough analysis of
your computers programs that use the Inte rnet to communicate , it may not have been able to identify all of your computers programs that use the Internet to communicate.
If an unrecognized program attempts to communicate, the resulting alert message generally asks you to select one of the following options:
n No, deny at this time: Blocks the progr a ms current and all future
attempts to communicate. The active program is a dded to the trusted list of programs with an allowed state of “blocked.
n Yes, allow this time: The active attempt to communicate is allowed. The
program is not added to the trusted programs list.
n If you recognize the program and do not want to receive any future
alerts for this program, check the I recognize this program check box.
88 McAfee Internet Secu rity 5.0
TIP
If you allow or block a program the first time you are prompted, McAfee Firewall provides you with the flexibility to change this setting and block or allow it to communicate at any time in the future. As you exit McAfee Firewall, your settings are saved and will be the same the next time it is run.
McAfee Firewall
Changing a programs allowed state
McAfee Firewall monitors Internet traffic to see which programs are communicating. Depending on your settings, it will allow, block, or filter a program's attempt to communicate.
If you choose to Allow all programs to communicate through your f irewall, then all programs installed in your computer can communicate.
To view and configure the current list of trusted programs
1 From the Task list, select Control Internet programs. 2 Select the program whose filtering settings you wish to configure (or
click Browse to add a program to the list).
3 Select one of the following options:
M Filter this programs access to the Internet. M Allow this program to have full unfiltered access to the Internet. M Block this program from accessing the Internet.
4 To add a program to the list, click Add and browse to select the program
you want to add. To remove a program from the list, sele ct the program you want to remove and click Remove.
5 Click Apply.
How to customize filtering rules for a specific program
For all programs designated as “filter,” McAfee Firewall provides power users with the flexibility to create a set of custom filtering rules for each filtered program.
TIP
The Customize button becomes accessible if and only if you select the Filter this programs access to the Internet option.
To create a custom filter ing rul e
1 From the Control Internet Programs screen, select the program for which
you want to create a custom filtering rule.
2 Select the Filter this programs access to the Internet radio button. 3 Click Customize.
If the program currently maintains a default set of rules created by McAfee Firewall, then the Customize filtering rules dialog displays. If the program does not maintain a default set of rules, then the What do you want this filtering rule to do? dialog displays.
Product Guide 89
McAfee Firewall
4 Refer to the instructions displayed on the Custom Filtering rules dialog
boxes to complete your custom configuration.
Table 5-3. Customize Filtering Rules dialog buttons
Button Description
Add w Click Add to add a new rule and to disp la y th e
What do you want this rule to do? dialog .
Remove
w Click Remove to remove a rule from the
selected program.
CAUTION: There is no “undo feature. Edit Restore
w Click Edit to refine a filtering rule. w Click Restore to restore the default rules fo r the
selected program.
TIP: If you inadvertently Rem ove a filtering rule,
click this button to restore the default rules for
the selected program . OK
w Click OK to close the Customize Filtering Rules
dialog and save your changes. Cancel
w Click Cancel to close the Customize Filtering
Rules dialog without savi ng your changes.
Primary functions
From the list of primary functions displayed on the Customize Filtering Rules dialog, you can choose one of the following:
Y ou can choose to... by ...
Allow communication...
Block communication...
90 McAfee Internet Secu rity 5.0
Table 5-4. Primary Functions
w protocol w local port w remote port
w IP address w domain name w direction
McAfee Firewall
Refining conditions
After you select the primary function for the rule, you can further refine the rule by checking the check boxes for any or all of the communication characteristics:
With... Using...
w direction w domain names w IP addresses
To customize the refinement condition, click [click here to select] upon the communication characteristics selected, various dialog and text boxes display. For example, if the custom rule states B lock thi s progra m from communicating and the IP address is, then an Add/Edit rule text displays allowing you to enter an IP address. Similarly, if you want to block a program from communicating by protocol, an Edit Protocols dialog displays.
To save your changes, click OK.

System configura tion

Your computers operating system performs many types of network communication without reporting directly to you. McAfee Firewall lets you explicitly allow or block different system functions. Settings may be different for each network device, since a computer, for example, can be connected to an internal network as well as having a dial-up connection to the Internet.
Use the steps below to control your System settings.
1 From the Advanced Task list, select Configure network adapters. 2 From the Configure Network Adapter Settings screen, select the adapter
you want to configure and click Adapter Settings to view or change the properties of this adapter. Result: The Properties sheet for the selected network adapter displays.
w protocols w remote ports w local ports
. Depending
Product Guide 91
McAfee Firewall
You can then choose to allow or block NetBIOS over TCP, Identification, ICMP, ARP, DHCP, RIP, PPTP and other protocols (IP and non-IP).
Table 5-5. Default Settings for System Activity
System Activity Type Description
NetBIOS over TCP: Blocked
Identification: Blocked This service is often required when getting email and
ICMP: Blocked This protocol is often abused as a method of
ARP: Allowed ARP is a necessary Ethernet protocol and is no t
DHCP: Allowed if your system uses DHCP
RIP: Blocked Allow RIP if yo ur adm i nis tr at or or I SP adv ise s yo u t o. PPTP: Blocked This should only be altered by t he administrator. Other Protocols: Blocked If you are on an IPX network, you should allow
This will block all file share activity over TCP as well as UDP broadcasts. Your system will not appear in anyone's Network Neighborhood and theirs will not appear in yours. If your system is configured to support NetBIOS over other protocols, such as IPX or NetBEUI, then file sharing may be allowed if non-IP protocols are a llowed (see Other Protocols below).
is required by most IRC servers.
breaking people's net wor k connections (especial l y on IRC).
known to be a threat. The program looks in your system Registry to see if
one of your network devices uses DHCP. If so, then DHCP is allowed for all devices. If not, then it is blocked for all devices. If you have more than one network device and one uses DHCP, you should check the DHCP setting f or each device and allow only for the device that uses it (m os t oft en cable or ADSL modems and some inter nal networks, not for dial-up).
non-IP protocols. If yo u us e PPTP, you should allow other IP protocols. Ask your network administrator before making any change here.
92 McAfee Internet Secu rity 5.0
McAfee Firewall

McAfee Firewalls Intrusion Detection System

Unlike other intrusion detection tools, McAfee Firewalls powerful Intrusion Detection System (IDS) is simple to configure and activate. Instead of requiring users to learn and understand a complex set of attacks to b uild their own defense lines against intrusions, McAfee Firewalls development t eam created a tool that, when activated with the click of a button, detects common attack types and suspic ious activ ity.
Unprotected computers can be victimized. For example, attackers can use a TCP port scan to find out what services you are running on your machine. Once this is accomplished, they can try to connect to those services and attack your computer. If the attacker discovers that you are running a TELNET, ftp, or Web server, the attacker can try each of your computers ports seque ntially, from 1 to 65535, until an open port is found that they can connect to.
McAfee Firewalls IDS feature looks for specific traffic patterns used by attackers. McAfee Firewall checks each packet that your machine receives to detect suspicious or known attack traffic. For example, if McAfee Firewall sees ICMP packets, it analyzes those packets for suspicious traffic patterns by comparing the ICMP traffic against known attack patterns. When McAfee Firewall matches packets with a known attack pa ttern, the softwar e generates an event to warn you of a possibl e security breach.
When intrusion detection is on, traffic is checked by the intrusion detection system. When intrusion detection is active and McAfee Firewall detects an attack, you can block further communication from the suspected machines IP address indefinitely or for a specific time period. When an attack is detected, McAfee Firew all alerts you with a Windows system tray notification.
NOTE
Because McAfee Firewall is analyzing packets and looking for patterns of packets that identify specific types of attacks, this feature may result in a very slight impact on your machine’s performance.

How to Configure the Intrusion Detection System

Use the steps below to configure McAfee Firewall’s intrusion detection system:
1 From the McAfee Firewall Home page, click Advanced Tasks. 2 From the Advanced Tasks list, select Intrusion detection settings.
Refer to the instructions displayed on the Configure Intrusion Detection Settings screen to complete this task.
Product Guide 93
McAfee Firewall

Common attacks recognized by IDS

The following table lists attacks recognized by McAfee Firewalls IDS, a description of each attack, and the risk factor assigned to each attack.
Attack Description Risk
Factor
1234 Also known as the Flushot attack, an attacker sen ds an oversize ping
packet that networking software could not handl e. Usually, computers hang or slows down. If a total lo ckup occurs, unsaved dat a may be lost.
Back Orifice Back Orifice is a back door pr ogram for Windows 9x writt en by a group
calling themselves the Cult of the Dead Cow. This back door allows remote access to the machine once installed, allo w ing t he i nstaller to run commands, get scree n shots, modify the registr y, and perform other operations. Client progr am s t o ac cess Back Orifice are available for Windows and UNIX.
Bonk Designed to exploit an impl em entation error in the first Teard ro p patch
released by Microsoft, this attack is basically a Windows-specific variant of the original Teardrop attack.
Fraggle Th is a tta ck i s a UDP v ar ia nt of th e Smur f at ta c k. By s e ndi n g a f or ge d UD P
packet to a particular port on a br oadcast address, system s on the amplifier network will re spond to the target machine with either a UDP response or an ICMP UNREACHABLE packet. This flood of incoming packets results in a denia l of service attack against th e ta rg et m achine.
IP Spoofing IP spoofing involves sending data with a falsified return IP address. There
is nothing inherently dangerous about spoofing a source IP address, but this technique can be used in conjunction with others to carry out attacks TCP session hijacking, or to ob scure the source of denial of ser vi ce attacks (SYN flood, PING flood, etc.).
Jolt A remote denial of service att ac k usi ng specially crafted ICMP packet
fragments. May cause sl owdowns or crashes on ta rget systems.
Jolt 2 A remote Denial of Servic e (DoS) attack similar to Jolt th at uses specially
crafted ICMP or UDP packet fragments. May cause slowdowns or crashes on target systems.
Land This attack is performed by sending a TCP packet to a running service on
the target host, with a so urce address of the same host. The TCP packet is a SYN packet, used to establish a new connection, and is sent from the same TCP source port as the destination port. When accepted by the target host, this packet causes a loop within the operating system, essentially locking up the system.
Nestea This attack relies on an error in cal culating sizes during pac ket fragment
reassemb l y. In the reassembly routine of vulnerab l e systems, there was a failure to account for the length of the IP header field. By sending carefully crafted packets to a vulnerable system, it is possi bl e t o cr ash the target.
Medium
High
High
High
Medium
High
High
High
High
94 McAfee Internet Secu rity 5.0
McAfee Firewall
Attack Description Risk
Factor
Newtear A Denial of Service (DoS) att ac k th at usually causes computer s wi t h a
Windows NT-based op er at i ng system to crash. Although the attack is not usually harmful to the computer itself, data from running applications will most certainly be lost.
Oshare A Denial of Service (DoS) att ack caused by sending a uni que packet
structur e to your compu t er. The results of these at t acks can vary fr om a complete system crash, increased CPU loa d , o r mom entary delays, depending upon your computers configuration. This will affect almost all versions of Windows 98 and NT-based system s wi t h var yi ng degrees based on the hardware involved.
Ping Flood This attack involves sending very large number s of ICM P ECHO (PING)
requests to th e hos t u nd er at ta ck. Th is at t ack is pa rt ic ul ar l y ef f ect i ve whe n the attacker has a faster ne t w or k connection than the victi m .
Ping of Death With this attack, a remote user ca n cause your system to reboot or panic
by sending it an oversized PIN G packet. This is done by send in g a fragmented packet larg er th an 65536 bytes in length, ca using the remote system to incorrectly process the packet. The result is that the remote system will reboot or pan ic dur i ng processing.
Port Scanning While not an attack in and of itself, a port scan often indicates that an
attacker has begun look in g at your system for potential weaknesses. A port scan consists of check i ng every TCP and/or UDP po rt to see what services (and hence, what vulnerabilities) migh t be pr esent.
Saihyouse n The Saihyousen at t ack may cau s e som e f ire wa l ls to c ra sh . It is ca use d by
an attacker sending a stream of UDP packets.
Smurf This attack is carried out by send ing an ICMP ECHO REQUES T (PIN G)
packet with a forged sour ce address matching that of th e ta rg et system. This packet is sent to amplifier networks networks that allow sending packets to the broadcas t ad dr ess so that every machin e on t he amplifier network will res po nd t o w hat they think is a legitimate request from the target. As a result, the target system is flooded with ICMP ECHO REPLY messages, causing a denial of service attack.
SynDrop Overlapping fragmented data sent by an attacker causes your computer to
become unstable and or crash. Unsaved data could be lost.
Syn Flood This at t ack can be used to completely disable your network ser vices by
flooding them with connection requests. This will fill the queue which maintains a list of unestabli sh ed i ncoming connections, fo rc in g it to be unable to accept additio nal connections.
Teardrop On vulnerable systems , it is p oss ib l e to tak e advantage of a flaw in the
way the TCP/IP stack handles fragmented packet reassembly to consume available memory res our ces. By sending a speciall y cr af t ed I P dat agram, this attack can cause m any operating systems to han g or reboot.
High
High
High
High
Low
High
High
High
High
High
Product Guide 95
McAfee Firewall
Attack Description Risk
Factor
UDP Flood A remote denial of service attack designed to flood the target machine with
more data than it can proce ss, thereby preventing leg iti m at e connections from being established.
Machine is inaccessible vi a TCP/ I P. Oc curs when machine is put to sleep and then awakened.
Make sure that Load Only When Needed is not checked in the TCP/IP control panel. Then TCP/IP is loaded all the time, allowing McAfee Firewall to function while the machine is asleep.
Winnuke This attack is a Denia l of Ser vi c e (D o S ) attack that completely disabl es
networking on many Win95 and WinNT machines. Although Winnuke will not neces sari ly dama ge y our comp uter , yo u may los e an y uns ave d dat a a t the time of the attack. Restar t in g your computer should re st or e fu ll operation.
High
High
96 McAfee Internet Secu rity 5.0

McAfee Internet Security’s Shared Features

QuickClean Lite

Clean your computer with QuickClean Lite
QuickClean Lite enables you to clean your computer of unnecessary files and free valuable hard disk space.
You can use the QuickClean Lite wizard to perform any of the following cleaning tasks:
n Clean your Recycle Bin. n Remove files that accumulate as you browse the Internet. Files of this
type are stored in folders called Temporary Internet or Cache folders.
n Remove Shortcu ts without an associated program, application,
hypertext link, etc.
n Delete lost file fragments. n Delete Windows Registry information, shortcuts, and system file
references for applications that no longer exist on your computer.
n Delete temporary files.
6
n Remove deleted and sent messages from a Microsoft supported e-mail
client (i.e.: Outlook, Outlook Express).
n Delete Most Recently Used shortcuts. n Use McAfee Shredder to securely shred the items you want to remove
from your computer.
How QuickClean Lite works
First, you select the types of files you wish to remove from your computer. A wizard guides you through this process. Next, the QuickClean Lite wizard scans the contents of your hard disk and identifies all files meeting your pre-selected criteria.
The user proceeds with the cleaning task if they are satisfied with the results of the scan. Finally, QuickClean Lite provides a graphic representation of the amount of reclaimed space after deleting the files.
Product Guide 97
McAfee Internet Securitys Shared Features
WARNING
Deleted files are not backed up. You cannot restore files deleted by QuickClean Lite.
How to start QuickClean Lite
There are two methods you can use to start the QuickClean Lite wizard.
1 From any VirusScan Professional screen click the Other tasks Task,
and select Start QuickClean Lite.
2 From the Windows task bar click the Start button, point to Programs >
McAfee > McAfee Shared Features and click QuickClean Lite.
If you need help...
For additional information about using QuickClean Lite refer to online Help. You can access online Help for QuickClean Lite by clicking Help on any QuickClean Lite window.
98 McAfee Internet Secu rity 5.0

McAfee Shredder

Securely delete files using McAfee Shredder
When you save a file in Windows, it is stored in multiple pieces (in clusters made up of multiple sectors) on the disk. Windows also saves a road map, or index, that points to these clusters in two copies of the FAT (File Allocation Table). The FAT contains the directions to all the pieces of your files, so that applications can find them again later.
In addition to FAT file systems, McAfee Shredder supports New Technology Filing System (NTFS). NTFS is the file system used by Windows NT, Windows 2000 and Windows XP.
When you delete a file, all the information stored in that file is not actually erased from your disk. Instead, Windows simply frees the clusters where the file was stored, making those locations available in the FAT. Thereafter, applications can write new information to those clusters. This means that all or part of your files can be reconstructed even after you delete them. Undelete programs can reconstruct a deleted file very easily, especially immediately after you delete the file and before you save any new information that might be written over the deleted files contents.
For privacy and security reasons, you may want to be positive that the information stored in files you delete is permanently erased from your computer. McAfee Shredder does this for you by security wiping deleted files so they cannot be restored or rebuilt using undelete utilities. Unlike other file security erase programs, McAfee Shredder erases even the filename and the compressed data on DriveSpace drives. Note that it is not possible to shred network files, or files compressed with compression other than DriveSpace in an absolutely secure manner.
McAfee Internet Securitys Shared Features
TIP
You can select McAfee Shredder properties to specify the shredding level to perform. You can select: Quick to shred the information once; U.S. Government Multipass to make seven passes of repeatedly erasing the data; or Custom to indicate how many passes to make which allows up to 99 passes.
Shredder is easy to use!
You can shred files using drag and drop, which is a fast way if all the files are centrally located. If the files are in several places, you can shred them by starting McAfee Shredder and selecting the files to erase. A wizard guid es you through the process.
Product Guide 99
McAfee Internet Securitys Shared Features
McAfee Shredder allows you to shred files on your PCs Recycle Bin, Temporary Internet, as well as Web site history folder. You can a lso specify the number of shredding passes (1-99) and can now have the option to shred an entire drive.
TIP
If your computer is running on Windows Me, some files even if shred, may be retained on your PC since these are protected b y the Windows Me System Restore.
Refer to the online Help file to display step-by-step instructions on how to shred selected files and non-file data.
WARNING
After you shred non-file data, you will not be able to undelete any deleted files that utilized this information.
100 McAfee Internet Security 5.0
Loading...