part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or
translated into any language in any form or by any means without the written permission of
Network Associates, Inc.
TRADEMARK ATTRIBUTIONS
ACTIVE SECURITY, ACTIVE SECURITY (IN KATAKANA), ACTIVEHELP, ACTIVESHIELD,
ANTIVIRUS ANYWARE AND DESIGN, BOMB SHELTER, CERTIFIED NETWORK EXPERT,
CLEAN-UP, CLEANUP WIZARD, CNX, CNX CERTIFICATION CERTIFIED NETWORK EXPERT
AND DESIGN, CYBERCOP, CYBERCOP (IN KATAKANA), CYBERMEDIA, CYBERMEDIA
UNINSTALLER, DESIGN (STYLIZED N), DISK MINDER, DISTRIBUTED SNIF FER SYSTEM,
DISTRIBUTED SNIFFER SYSTEM (IN KATAKANA), DR SOLOMON’S, DR SOLOMON’S LABEL,
ENTERPRISE SECURECAST, ENTERPRISE SECURECAST (IN KATAKANA), EZ SETUP, FIRST
AID, FORCEFIELD, GMT, GROUPSHIELD, GROUPSHIELD (IN KATAKANA), GUARD DOG,
HELPDESK, HOMEGUARD, HUNTER, ISDN TEL/SCOPE, LANGURU, LANGURU (IN
KATAKANA), M AND DESIGN, MAGIC SOLUTIONS, MAGIC SOLUTIONS (IN KATAKANA),
MAGIC UNIVERSITY, MA GICSPY, MAGICTREE, MCAFEE, MCAFEE (IN KATAKANA),
MCAFEE AND DESIGN, MULTIMEDIA CLOAKING, NET TOOLS, NET TOOLS (IN
KATAKANA), NETCRYPTO, NETOCTUPUS, NETSCAN, NETSHIELD, NETSTALKER,
NETWORK ASSOCIATES, NETXRAY, NOTESGUARD, NUTS & BOLTS, OIL CHANGE, PC
MEDIC, PC MEDIC 97, PCNOTARY, PGP, PGP (PRETTY GOOD PRIVACY), PRETTY GOOD
PRIVACY, PRIMESUPPORT, RECOVERKEY, RECOVERKEY - INTERNATIONAL, REGISTRY
WIZARD, REPORTMAGIC, RINGFENCE, ROUTER P M, SALESMAGIC, SECURECAST , SERVICE
LEVEL MANAGER, SERVICEMAGIC, SMARTDESK, SNIFFER, SNIFFER (IN HANGUL),
SNIFFMASTER, SNIFFMASTER (IN HANGUL), SNIFFMASTER (IN KATAKANA), SNIFFNET,
STALKER, SUPPORTMAGIC, TIS, TMEG, TNV, TVD, TNS, TOTAL NETWORK SECURITY,
TOTAL NETWORK VISI BILITY, TOTAL NETWORK VISIBILITY (IN KATAKAN A), TOTAL
SERVICE DESK, TOTA L VIRUS DEFENSE, TRUSTED M AIL, UNINSTALLER, VIREX, VIRUS
FORUM, VIRUSCAN, VIRU SSCAN, WEBSCAN, WEBSHI ELD, WEBSHIELD (IN KATAKANA),
WEBSNIFFER, WEBSTALK ER, WEBWALL, WHO’S WATCHING YOUR NETWORK,
WINGAUGE, YOUR E-BUSINESS DEFENDER, ZAC 2000, ZIP MANAGER are registered
McAfee Perpetual End User License Agr eement – United States of America
NOTICE TO ALL USERS: CA REFULLY READ THE FOLLOWING LEGAL AGREEMENT
("AGREEMENT"), FOR THE LICENSE OF SPECIFIED SOFTWARE ("SOFTWARE") PRODUCED
BY NETWORK ASSOCIATES, INC. ("McAfee"). BY CLICKING THE ACCEPT BUTTON OR
INSTALLING THE SOFTWARE, YOU (EITHER AN I NDIVIDUAL OR A SINGLE ENTITY)
CONSENT TO BE BOUND BY AND BECOME A PARTY TO THIS AGREEMENT. IF YOU DO NOT
AGREE TO ALL OF THE TER MS OF THIS AGREEMENT, CLICK THE BUTTON THAT
INDICATES THAT YOU DO NOT ACCEPT THE TERMS OF THIS AGREEMENT AND DO NOT
INSTALL THE SO FTWARE. (IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO THE
PLACE OF PURCHASE FOR A FULL REFUND.)
1.License Grant. Subject to the payment of the applicable license fees, and subject to the terms and conditions of
this Agreement, McAfee hereby grants to you a non-exclusive, non-transferable right to use one copy of the
specified version of the Software and the accompanying docume ntation (the "Documenta tion"). You may instal l
one copy of t he S oftwar e on one co mpute r, w orkst atio n, pe rsona l di gita l ass istan t, pa ger, "sma rt ph one" or ot her
electronic device for which the Software was designed (each, a "Client Device"). If the Software is licensed as
a suite or bundle with more than one specified Software product, this license applies to all such specified
Software produ ct s, subject to any restri ct ions or usage terms specified on the applicable price list or product
packaging that apply to any of such Software products individually.
a.Use
b.Server-Mo de U se
c.Volume License Use
. The Software is licensed as a single product; it may not be used on more than one Client Device
or by more than one user at a time, except as set for th in th is Section 1. The Software is "in use" on a
Client Device when it is l oaded into th e temporary memory (i.e. , random-a ccess memory or RAM) or
installed into the permanent memory (e.g., hard disk, CD-ROM, or other storage device) of that Client
Device. This license authorizes you to make one copy of t he Software solely for backup or archiv al
purposes, p rovided t hat th e copy yo u make co ntains all of the Sof tware' s propri etar y notice s unalt ered
and unobstructed.
. You may use the Software on a Client Device as a server ("Se rver") within a
multi-user or n et wor ke d en vi ronm ent (" Se rver -Mo de" ) on ly if s uch use is pe rmit te d i n the a p pl icab le
price list or product packaging for the Software. A separate license is required for each Client Device
or "seat" that may connect to the Server at any time, regardless of whether such licensed Client
Devices or seats are concurrently connected to, accessing or using the Sof t w are. Use of software or
hardware that reduces the numbe r of Client Devic es or seats directly accessing or utilizing th e
Software (e.g ., " m ultiplexing" or "pooling" software or hardware) d oes not reduce the number of
licenses required (i.e., the required number of licenses would equal the number of distinct inputs to
the multiple xing or pooling software or hardware " front end "). If the number of Client Devices or seats
that can conn ect to th e Soft war e can exce ed th e numbe r of li censes you ha ve obt aine d, the n you mus t
have a reasonable mechanism in place to ensure that your use of the Software does not exceed the use
limits specified for the licenses you have obtained. This l icen se au th or iz es you t o make o r d ownlo ad
one copy of the Documentation for each Client Device or seat that is licensed, provided that each such
copy contains all of th e D ocumentation's proprietary notices una ltered and unobstruct ed.
. If the Software is licens ed with volume license terms s pecified in the applic able
product invoicing or product packaging for the Software, you may make, use and install as many
additional copies of the Software on the number of Client Devices as the volume license te rms specify.
You must have a reasona ble mechanism in place to ensure that the number of Client Devices on which
the Software has be en installed does no t ex ceed the number of licenses you have obtain ed. This
license authorizes you to make or download one copy of the Documentation for each additional copy
authorized by the volume license, provided that each su ch copy contains all o f t he D ocumentation' s
proprietary noti ce s unaltered and unobst ructed.
Product Guideiii
2.Term. This Agreement is effective for an unlimited duration unless and until earlier terminated as set forth
herein. This Agreement will terminate automatically if you fail to comply with any of the limitations or other
requirements described herein. Upon any termination or expiration of this Agreement, you must cease use of the
Software and destroy all copies of the Software an d the Documentat ion.
3.Updates. For the time period specified in the applicable product invoicing or product packaging for the
Software, you are entitled to download revisions or updates to the Software when and as Mc Afee publishes t hem
via its elect ronic bullet in boar d syste m, websi te or t hrough o ther on line ser vices. For a pe riod of ninety (90) days
from the date of the of original purchase of the Software, you are entitled to download one (1) revision or upgrade
to the Software when and as McAfee publishes it via its electronic bulletin board system, website or through
other online services. After the specified time period, you have no further rights to receive any revisions or
upgrades with out purchase of a new lic ense to the Software .
4.Ownership Ri ghts. The Software is protected by U ni t ed St ates copyright laws and international treaty
provisions. McAfee and its suppliers o wn and retain all right, title and intere st in and to the Software, in cludin g
all copyrights, patents, trade secret rights, trademarks and other intellectual property rights therein. Your
possession, installatio n, or us e of the Software does not trans fer to you any title to the in tellectual p roperty in the
Software, and you will not acquire any rights to the Software e xcept as e xpressly s et for th in thi s Agreement. All
copies of the Software and Documentation made hereunder must contain the same proprietary notices that appear
on and in the Softw ar e and Documentati on.
5.Restrictions. You may not sell, lease, license, rent, lo an or otherwise transf er, with or without consid eration, the
Software. Mc A fee updates its Soft ware frequently and performance dat a for its Software change. Before
conducting be nchmark tests rega rding this Softwa re, contact McAfe e to verify that You possess the correct
Software for the test and the then current version and editio n of the Software . You agree not to permit any third
party (other than t hi rd parties under contract with You whic h contains nondiscl os u r e obligations no less
restrictive than thos e set forth herein) to use the Licensed Pro gram in any form and sha ll use all reasonab le efforts
to ensure that no im p r oper or unauthorize d use of the Licensed Prog r am is made. You may no t p ermit third
parties to benefit from the use or functionality of the Software via a timesharing, service bureau or other
arrangement, except to the extent such use is specified in the applicable list price or product packaging for the
Software. You m ay not transfer any of th e ri ghts granted to you under this Agreement. You may not re ver se
engineer, decompile, or disassemble the Software, except to the extent the forego in g restriction is ex pr essly
prohibited by applicable law. You may not mo dify, or crea te derivative wo rks based upon, the Software in whole
or in part. You may not copy the Software or Documentation except as expressly permitted in Section 1 above.
You may not rem ove any proprieta ry notices or labels on the Software. All ri ghts not expressly set forth
hereunder are res erved by McAfee.
6.Warranty and Disclaimer.
a.Limited Warranty
. McAfee warrants that for sixty (60) days from the date of original purchase the
media (e.g., diskettes) on which the Software is contained will be free from defects in materials and
workmanship.
b.Customer Remedies
. McAfee's and its suppliers' entire liability and your exclusive remedy for any
breach of the fo regoing warranty s hall be, at McAfee' s option, either (i) return of the purchase price
paid for the license, if any, or (ii) replacement of the defective media in which the Software is
contained. You m us t r et ur n the defective media to M cAfee at your expense w ith a copy of your
receipt. This limited war ranty is void if the defect has resu lted from accident , abuse, or misapp lication.
Any replacement media will be warran te d for the remainder of the original warranty period. Outside
the United States, this remedy is not available to the extent McAfee is subject to restrictions under
United States export control laws and regulations.
ivMcAfee Internet Security 5.0
c.Warranty Disclaimer. Except for the limited warranty set forth herein, THE SOFTWARE IS
PROVIDED "AS IS." TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW,
MCAFEE DISCLAIMS ALL WARRANTIES, EI THER EXPRESS OR IMPLIED, INCLUDING
BUT NOT LIMITED TO IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A
PARTICULAR PURPOSE, AND NONINFRINGEMENT WITH RESPECT TO THE SOFTWARE
AND THE ACCOMPANYING DOCUMENTATION. YOU ASSUME RESPONSIBILITY FOR
SELECTING THE SOFTWARE TO ACHIEVE YOUR INTENDED RESULTS, AND FOR THE
INSTALLATION OF, USE OF, AND RESULTS OBTAINED FROM THE SOFTWARE.
WITHOUT LIMITING THE FOREGOING PROVISIONS, MCAFEE MAKES NO WARRANTY
THAT THE SOFTWARE WILL BE ERROR-FREE OR FREE FROM INTERRUPTIONS OR
OTHER FAILURES OR THAT THE SOFTWARE WILL MEET YOUR REQUIREMENTS. SOME
STATES AND JURISDICTIONS DO NOT ALLOW LIMITATIONS ON IMPLIED
WARRANTIES, SO THE ABOVE LIMITATION MAY NOT APPLY TO YOU. The foregoing
provisions shall be enforceable to the maximum extent permitted by applicable law.
7.Limitation of Liability. UNDER NO CIRCUMSTANCES AND UNDER NO LEGAL THEORY, WHETHER
IN TORT, CONTRACT, OR OTHERWISE, SHALL MCAFEE OR ITS SUPPLIERS BE LIABLE TO YOU
OR TO ANY OTHER PERSON FOR ANY INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL
DAMAGES OF ANY CHARACTER INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF
GOODWILL, WORK STOPPAGE, COMPUTER FAILURE OR MALFUNCTION, OR FOR ANY AND ALL
OTHER DAMAGES OR LOSSES. IN NO EVENT WILL MCAFEE BE LIABLE FOR ANY DAMAGES IN
EXCESS OF THE LIST PRICE MCAFEE CHAR GES FOR A LICENSE TO THE SOFTWARE, EVEN IF
MCAFEE SHALL HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. THIS
LIMITATION OF LIABILITY SHALL NOT APPLY TO LIABILITY FOR DEATH OR PERSONAL
INJURY TO THE EXTENT THAT APPLICABLE LAW PROHI BITS SUCH LIMITATION.
FURTHERMORE, SOME STATES AND JURISDICTIONS DO NOT ALLOW THE EXCLUSION OR
LIMITATION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THIS LIMITATION AND
EXCLUSION MAY NOT APPLY TO YOU. The foregoing provisions shall be enforceable to the maximum
extent permitted by applic able law.
8.United States Government. Th e Software and accompanying Documentation are deemed to be "commercial
computer software" and "commercial computer software documentation," respectively, pursuant to DFAR
Section 227.7202 and FAR Section 12.212, as applicable. Any use, modification, reproduction, release,
performance, di splay or disclosure of the Software an d accompanying Do cumentation by th e U ni t ed States
Government shall be govern ed solely b y the ter ms of this Agreement and shall b e prohibite d except t o the ex tent
expressly permitted by the terms of this Agreement.
9.Export Controls. You are advised that the Software is subject to the U.S. Export Administration Regulations.
You shall not exp ort, import or transfer Software cont rary to U.S. or other applicable laws, w hether directly or
indirectly, and will not cause, app ro ve or otherwise facilitate others such as agen ts o r any th ird parties in doing
so. You represen t and agrees that neit her the United States Bureau of Export A dministration nor any other
federal agency has suspended, revoked or denied your export privileges. You agree not to use or transfer the
Software for end use relating to an y nuclear, chemical or biological weapons, or missile technology unless
authorized by the U.S. Government by regulation or specific license. Additionally, you acknowledge that the
Software is sub j ect to export control regulations in the E ur opean Union and you h ereby declare and agree that
the Software will not be used for any other purpose than civil (non-military) purposes. The parties agree to
cooperate w ith eac h ot he r with re spec t to any app lic at io n f or a ny req ui re d li cen ses an d ap pr ova ls, ho wev er, yo u
acknowledge it is your ultimate responsibility to comply with any and all export and import laws and that
McAfee has no further responsibility after the initial sale to you within the original country of sale.
Product Guidev
10. High Risk Activities. The Softwar e i s not fault-tolerant and is not designed o r i nt ended for use in hazardous
environments requiring fa il-safe perf ormance, including wi thout limitatio n, in the operati on of nuclear f acilities,
aircraft navigation or communication systems, air traffic control, weapons systems, direct life-support machines,
or any other application in which the failure of the Software could lead directly to death, personal injury, or
severe physical or property damage (collectively, "High Risk Activities"). McAfee expressly disclaims any
express or impli ed w arranty of fitness f o r High Risk Activities .
11. Miscellaneous. This Agreement is governed by the laws of the United States and the State of California,
without reference to conflic t o f laws principles. The applicatio n of th e Unit ed Na tio ns Con v entio n of Contracts
for the International Sa le of Goods is e xpress ly exc luded. This Agree ment se ts f orth a ll rig hts for the user of the
Software and is the entire agreement between the parties. McAfee reserves the right to periodically audit you to
ensure that you are not usi ng an y Soft ware in v io lat io n of t his Agree men t. D uri ng yo ur sta ndar d bus ine ss hour s
and upon prior wr itt en notice, McAfee may visit you and you w i ll m ake available to Mc A fee or its
representatives any records perta ining to the Softwar e to McAfee. The cost of any requeste d audit will be solely
borne by McAfee, unless such aud it di scloses an underpayment or amount due to McAfee in exce ss of five
percent (5%) of the initial li cens e f ee fo r th e S of twar e or y ou ar e usin g the Software in an unauthorized manor,
in which case you shall pay the cost of the au di t. This Agreement supersedes any other communications w ith
respect to the Software and Documentation. This Agreement may not be modified except by a written addendum
issued by a duly authorized representative of McAfee. No provision hereof shall be deemed waived unless such
waiver shall be in writing and signed by McAfee or a duly authorized representative of McAfee. If any provision
of this Agreement is held invalid, the remainder of this Agreement shall continue in full force and effect. The
parties c onfirm th a t it is their wish that this Agreement has been writ ten in the English language on ly.
12. MCAFEE CUSTOMER CONTACT. If you have any questions concerning these terms and conditions, or if
you would like to contact McAfee for any other reason, please call (408) 988-3832, fax (408) 970-9727, or write:
Network Associ ates, Inc., McAfee Software Division, 3 965 Freedom Circle, Santa Clara, Califo rn ia 95054.
http://www.nai.com.
viMcAfee Internet Security 5.0
McAfee Perpetual End User License Agr eement – Canada
NOTICE TO ALL USERS: CA REFULLY READ THE FOLLOWING LEGAL AGREEMENT
("AGREEMENT"), FOR THE LICENSE OF SPECIFIED SOFTWARE ("SOFTWARE") BY NETWORK
ASSOCIATES INTERNATIONAL B.V. ("McAfee"). BY CLICKING THE ACCEPT BUTTON OR
INSTALLING THE SOFTWARE, YOU (EITHER AN I NDIVIDUAL OR A SINGLE ENTITY)
CONSENT TO BE BOUND BY AND BECOME A PARTY TO THIS AGREEMENT. IF YOU DO NOT
AGREE TO ALL OF THE TER MS OF THIS AGREEMENT, CLICK THE BUTTON THAT
INDICATES THAT YOU DO NOT ACCEPT THE TERMS OF THIS AGREEMENT AND DO NOT
INSTALL THE SO FTWARE. (IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO THE
PLACE OF PURCHASE FOR A FULL REFUND.)
1.License Grant. Subject to the payment of the applicable license fees, and subject to the terms and conditions of
this Agreement, McAfee hereby grants to you a non-exclusive, non-transferable right to use one copy of the
specified version of the Software and the accompanying docume ntation (the "Documenta tion"). You may instal l
one copy of t he S oftwar e on one co mpute r, w orkst atio n, pe rsona l di gita l ass istan t, pa ger, "sma rt ph one" or ot her
electronic device for which the Software was designed (each, a "Client Device"). If the Software is licensed as
a suite or bundle with more than one specified Software product, this license applies to all such specified
Software produ ct s, subject to any restri ct ions or usage terms specified on the applicable price list or product
packaging that apply to any of such Software products individually which you acknowledge you have received
and read.
a.Use
b.Server-Mo de U se
. The Software is licensed as a single product; it may not be used on more than one Client Device
or by more than one user at a time, except as set for th in th is Section 1. The Software is "in use" on a
Client Device when it is l oaded into th e temporary memory (i.e. , random-a ccess memory or RAM) or
installed into the permanent memory (e.g., hard disk, CD-ROM, or other storage device) of that Client
Device. This license authorizes you to make one copy of t he Software solely for backup or archiv al
purposes, p rovided t hat th e copy yo u make co ntains all of the Sof tware' s propri etar y notice s unalt ered
and unobstructed.
. You may use the Software on a Client Device as a server ("Se rver") within a
multi-user or n et wor ke d en vi ronm ent (" Se rver -Mo de" ) on ly if s uch use is pe rmit te d i n the a p pl icab le
price list or prod uc t p ack ag in g f or t he S of twar e w hic h y ou a ck now le dge y o u hav e r ec eive d and r ea d.
A separate licens e is required for each Client Device or "s eat" that may connect to the Server at any
time, regardless of whether such licensed Client Devices or seats are concurrently connected to,
accessing or using t he Software. Use of software or hardware th at reduces the number of Client
Devices or seats directly accessing or utilizing the Software (e.g., "multiplexing" or "pooling"
software or hardware) does not reduce the number of licens es required (i.e., the required number of
licenses would equal the number of distinct inputs to the multiplexing or pooling software or hardware
"front end"). If the number of Client Devices or seats that can connect to the Software can exceed the
number of lice nses yo u have obt ained, then you m ust have a reasona ble mecha nism in pl ace to ensure
that your use of the Software does not exceed the use limits specified for the licenses you have
obtained. This license authorizes you to make or download one copy of the Documentation for each
Client Devi ce or sea t that i s licensed , provi ded that each such c opy cont ains all of the Doc umentati on's
proprietary noti ce s unaltered and unobst ructed.
Product Guidevii
c.Volume License Use. If the Software is licensed with volume lic ense terms specified in t he applicable
price list or product packaging for the Software, you may make, use and install as many additional
copies of the Softw ar e on the number of Client D evices as the volume license authorizes. Y ou must
have a reasonable mechanism in place to ensure that t he number of Clien t Devices on which the
Software has been installed does not exceed the number of licenses you have obtained. This license
authorizes you to m ake or download one co py of the Documentation for each additional copy
authorized by th e volume license, provided that each su ch copy contains all o f t he D ocumentation' s
proprietary notices unaltered and unobstructed.
2.Term. This Agreement is effective for an unlimited duration unless and until earlier terminated as set forth
herein. This Agreement will terminate automatically if you fail to comply with any of the limitations or other
requirements described herein. Upon any termination or expiration of this Agreement, you must cease use of the
Software and destroy all copies of the Software an d the Documentat ion.
3.Updates. For th e time period specified in the applicable price list or prod uct packaging for the Software, you are
entitled to download revisions or updates to the Software when and as McAfee publishes them via its electronic
bulletin board system, website or through other online services. For a period of ninety (90) days from the date
of the of origina l pu rchase of the Software, you are entitled to download one (1) revision or upgrade to the
Software whe n and as McAfee publi shes it via its electro nic bulletin board system, websit e or through other
online services. After the specified time period, you have no further rights to receive any revisions or upgrades
without purchase of a new license to the Software.
4.Ownership Ri ghts. The Software is protected by Uni t ed St ates copyright laws and international treaty
provisions. McAfee and its suppliers o wn and retain all right, title and intere st in and to the Software, in cludin g
all copyrights, patents, trade secret rights, trademarks and other intellectual property rights therein. Your
possession, installatio n, or us e of the Software does not trans fer to you any title to the in tellectual p roperty in the
Software, and you will not acquire any rights to the Software e xcept as e xpressly s et for th in thi s Agreement. All
copies of the Software and Documentation made hereunder must contain the same proprietary notices that appear
on and in the Softw ar e and Documentati on.
5.Restrictions. You may not sell, leas e, license, rent, lo an or otherwise transf er, with or without consid eration, the
Software. Mc A fee updates its Soft ware frequently and performance dat a for its Software change. Before
conducting be nchmark tests rega rding this Softwa re, contact McAfe e to verify that You possess the correct
Software for the test and the then current version and edition of the Software. Benchmark tests of former,
outdated or inappropriate versions or editions of the Software may yield results that are not reflective of the
performance of the current version o r edition of the Software. You agree not to permit any thir d party (other than
third parties under contract with you which contract contains nondisclosure obligations no less restrictive than
those set forth herein) to use the Software in any form and shall use all reasonable efforts to ensure that there is
no improper or un aut horized use of the Sof tware. You may not per m it third parties to benefit from the use or
functionalit y of the Software via a timesharing, service bureau o r other arrangement, except to the extent such
use is specified in th e applicable list pri ce or product packag in g for the Software. Y ou m ay not transfer any of
the rights granted to you under this Agreement. You may not reverse engineer, decompile, or disassemble the
Software, except to the extent the foregoing restriction is expressly prohibited by applicable law. The interface
information necessary to achieve interopera bility of the Software with indep endently created comp uter programs
will be supplied by McAfee on reque st and on payment of suc h reasonable costs and expenses of McAfee in
supplying th at i nfor mat i on. Yo u ma y not m odif y, or cre a te de ri vati ve work s ba sed up on, th e Sof twar e in whol e
or in part. You may not copy the Software or Documentation except as expressly permitted in Section 1 above.
You may not remove or alter any proprietary notices or labels o n the Softwa re or Documen tation . All righ ts not
expressly set fo rth hereunder are reserved by McA f ee.
6.Warranty and Disclaimer.
viiiMcAfee Internet Security 5.0
a.Limi ted Warranty. McAfee warrants that for sixty (60) days from the date of original purchase the
media (e.g., diskettes) on which the Software is contained will be free from defects in materials and
workmanship.
b.Customer Remedies
. McAfee's and its suppliers' entire liability and your exclusive remedy for any
breach of the fo regoing warranty s hall be, at McAfee' s option, either (i) re t urn of the purchase price
paid for the license, if any, or (ii) replacement of the defective media in which the Software is
contained. You m us t r et ur n the defective media to M cAfee at your expense w ith a copy of your
receipt. This limited war ranty is void if the defect has resu lted from acciden t, abuse, or misapp lication.
Any replacement media will be warran te d for the remainder of the original warranty period. Outside
the United States, this remedy is not available to the extent McAfee is subject to restrictions under
United States export control laws and regulations.
c.Warranty Disclaimer
. Except for the limited warranty set forth herein, THE SOFTWARE IS
PROVIDED "AS IS." TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW,
MCAFEE DISCLAIMS ALL WARRANTIES, REPRESENATIONS AND CONDITIONS,
EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LI M ITED TO IMP LI ED
WARRANTIES OR CONDITIONS OF MERCHANTABILITY, FITNESS FOR A PARTICULAR
PURPOSE, AND NONINFRINGEMENT WITH RESPECT TO THE SOFTWARE AND THE
ACCOMPANYING DOCUMENTATION. YOU ASSUME RESPONSIBILITY FOR SELECTING
THE SOFTWARE TO ACHIEVE YOUR INTENDED RESULTS, AND FOR THE
INSTALLATION OF, USE OF, AND RESULTS OBTAINED FROM THE SOFTWARE.
WITHOUT LIMITING THE FOREGOING PROVISIONS, MCAFEE MAKES NO WARRANTY,
REPRESENTATION OR CONDITION THAT THE SOFTWARE WILL BE ERROR-FRE E OR
FREE FROM INTERRUPTIONS OR OTHER FAILURES OR THAT THE SOFTWARE WILL
MEET YOUR REQUIREMENTS. SOME STATES AND JURISDICTIONS DO NOT ALLOW
LIMITATIONS ON IMPLIED WARRANTIES, SO THE ABOVE LIMITATION MAY NOT
APPLY TO YOU.
7.Limitation of Liability. UNDER NO CIRCUMSTANCES AND UNDER NO LEGAL THEORY, WHETHER
IN TORT, CONTRACT, OR OTHERWISE, SHALL MCAFEE OR ITS SUPPLIERS BE LIABLE TO YOU
OR TO ANY OTHER PERSON FOR ANY INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL
DAMAGES OF ANY CHARACTER INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF
GOODWILL, WORK STOPPAGE, COMPUTER FAILURE OR MALFUNCTION, OR FOR ANY AND ALL
OTHER DAMAGES OR LOSSES. IN NO EVENT WILL MCAFEE BE LIABLE FOR ANY DAMAGES IN
EXCESS OF THE LIST PRICE MCAFEE CHAR GES FOR A LICENSE TO THE SOFTWARE, EVEN IF
MCAFEE SHALL HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. THIS
LIMITATION OF LIABILITY SHALL NOT APPLY TO LIABILITY FOR DEATH OR PERSONAL
INJURY TO THE EXTENT THAT APPLICABLE LAW PROHI BITS SUCH LIMITATION.
FURTHERMORE, SOME STATES AND JURISDICTIONS DO NOT ALLOW THE EXCLUSION OR
LIMITATION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THIS LIMITATION AND
EXCLUSION MAY NOT APPLY TO YOU. The foregoing provisions shall be enforceable to the maximum
extent permitted by applic able law.
8.United States Government. The Software and accompanying Documentation are deemed to be "commercial
computer software" and "commercial computer software documentation," respectively, pursuant to DFAR
Section 227.7202 and FAR Section 12.212, as applicable. Any use, modification, reproduction, release,
performance, di splay or disclosure of the Software an d accompanying Do cumentation by th e U ni t ed States
Government shall be govern ed solely b y the ter ms of this Agreement and shall b e prohibite d except t o the ex tent
expressly permitted by the terms of this Agreement.
Product Guideix
9.Export Controls. You have been advised that the Software is subject to the U. S. Export Administrat ion
Regulations and applicable loca l export contro l laws. Yo u shall not export, import or trans fer Pro ducts con trary
to U.S. or other applicable local laws , whether directly or indirectly, and will not cause, approve or otherwise
facilitate others such a s agen ts or an y third par ties i n doing s o. If appl icable to you, you re present a nd agr ee that
neither the Uni ted S tates Bureau of Expo rt Admi nistr atio n nor any other fe dera l agenc y has suspend ed, r evoked
or denied your export privileges. You agree not to use or transfer the Software for end use relating to any nuclear,
chemical or biological weapons, or missile technology unless authorized by the U.S. Government and any other
applicable local authority by regula tion or specifi c license. Additionall y, you acknowledge tha t the Software is
subject to exp ort cont rol reg ul at ion s in t he Eur ope an Unio n an d you he reb y de cl are an d ag ree t hat the Sof twar e
will not be used for any other purpose than civil (non-military) purposes. The parties agree to cooperate with
each other with respect to any application for any required licenses and approvals, however, you acknowledge it
is your ultimate responsibi lity to comply with any and all e xport and import laws and that McAfee has no furthe r
responsibility after the initial sale to you within the original country of sale.
10. High Risk Activities. The Software is not fault-tolerant and is not designed o r i nt ended for use in hazardous
environments requiring fa il-safe perf ormance, including wi thout limitatio n, in the operati on of nuclear f acilities,
aircraft navigation or communication systems, air traffic control, weapons systems, direct life-support machines,
or any other application in which the failure of the Software could lead directly to death, personal injury, or
severe physical or property damage (collectively, "High Risk Activities"). McAfee expressly disclaims any
express or implied warranty or condition of fitness for High Risk Activities.
11. Miscellaneous. This Agreement is governed by the la w s o f t he N etherlands. The app lication of the United
Nations Conven tion of Contract s for the In ternation al Sale of Goods is ex pressly ex cluded. D isputes wi th respe ct
to this Agreement, as well as with respect to its conclusion and execution, will be submitted exclusively to the
competent court in Amsterdam. This Agreement s ets forth al l rights for the user of the Soft ware and is the ent ire
agreement between the parties. McAfee reserves the right to periodically audit you to ensure that you are not
using any Software in violation of this Agreement. Durin g your standard business hours an d up on pr io r written
notice, McAfee may visit you and yo u w i ll m ake available to McAfee or its represe nt at ives any records
pertaining to the Software to McAf ee. The cost of any req ues ted audit will be solely borne by McAfee, unless
such audit discloses an underpayment or amount due to McAfee in excess of five percent (5%) of the initial
license fee for the Software or you are using the Software in an unauthorized manor, in which case you shall pay
the cost of the audit. This Agreement supersedes any other communications with respect to the Software and
Documentation. This Agreement may n ot be modified except by a writt en addendum issued by a duly authori zed
representative of McAfee. No pr ovi s ion hereof shall be deemed waived un le ss such waiver shall be in writing
and signed by McA fee or a d uly auth orize d rep rese ntati ve o f McAf ee. I f an y pr ovis ion of thi s Ag reeme nt is hel d
invalid, the remainder of this Agreement shall continue in full force and effect. The parties have required that
this Agreement and all documents relating thereto be drawn up in English. Les parties ont demandé que cette
convention ainsi que tous les doc um ents que s'y attachent soient rédigés en anglais.
12. MCAFEE CUSTOMER CONTACT. If you have any questions concerning these terms and conditions, or if
you would like to contact McAfee for any other reason, pl ease call +31 20 586 61 00 or write: McAfee,
Gatwickstraat 25, 1043 GL Amsterdam, Netherlands. You will find our In ternet web-site at http:// www.nai.com.
The Internet provides a vast wealth of information and entertainment at your
fingertips. Yet, as soon as you connect, your computer is exposed to a
multitude of privacy and security threats. Protect your privacy and secure
your computer and your data with McAfee Internet Security. Incorporating
McAfee's award-winning technologies, McAfee Internet Security provides
one of the most comprehensive sets of privacy and security tools you can buy.
McAfee Internet Security destroys viruses, outwits hackers, secures your
personal information, privatizes your Web browsing, blocks ads and pop ups,
manages your cookies and pass words, locks down your files, folde rs and
drives, filters objectionable content, and puts you in control of the
communications in and out of your PC. McAfee Internet Security provides
powerful protection for today's Int e rnet users.
Introduction
In the last few years the Inter net has changed from a communications network
that government entities and universities used almost exclusively, to an
information treasure house that people of all ages and occupations can now
access. With an Internet account, you can send electronic mail (e-mail) around
the world in seconds, do research without leaving home, meet new friends in
an online chat room, or shop without getting out of your bathrobe. However,
with all these conveniences come a certain element of risk. When you use the
Internet, information is transmitted from your computer to other computers
on the Internet – information you may not want other people to have. And
those computers can also send files to your computer that may contain viruses.
While most of these files are harmless, some can invade your privacy or even
damage the data on your computer’s hard drive.
1
McAfee Internet Security addresses any of these potential risks with its
comprehensive features designed to protect your privacy and security when
using the Internet.
With its new features, you can now also act as an Administrator and apply
customized protection settings not only for yourself, but for other users of
your computer and easily monitor potential risks they may encounter while
browsing the Internet.
Product Guide15
Welcome to McAfee Internet Security 5.0
What’s included with McAfee Internet Security?
nThe Administrator: As the Administrator, you are able to set up
protection settings for other users of your computer. You can add, edit
and delete a user’s profile—then setup individual privacy, security and
Internet filtering options that McAfee Internet Security will apply
whenever any of these users are browsing the Web through your
computer.
nActivity Logs: Activity Logs allow you to view a list of all the
interactions that you and other profiled users of your com puter had with
McAfee Internet Security, including the date and time of the activity.
You can print, save or clear this list.
nSecurity Check: You can run an extensive check of your computer for
any privacy or security problems via this feature. After McAfee Internet
Security performs the check, it displays any problem found, provides
additional information about the problem, and guides you through on
how to solve the problem.
nVirusScan: McAfee Internet Security uses McAfee VirusS can to a ddress
virus-related problems you may encounter through the Internet. This
feature allows you to set how to perform a virus scan operation on your
computer; what to do if a virus is found; and how it should alert you
once the virus is detected. You can also direct VirusScan to keep a record
of actions performed on your computer.
nFirewall: McAfee Internet Security incorporates McAfee Firewall to
protect your computer while it is connected to the Internet. McAfee
Firewall is a highly-flexible, easy-to-use program. Whether you are
connected to the Internet via DSL, cable modem or standard dial-up,
Internet communication in to and out of your PC is secure.
nQuickClean Lite: Remove unnecessary files using QuickClean Lite. The
QuickClean Lite wizard enables you to clean your computer of
unnecessary f iles and free valuable hard disk spa c e.
nShredder: For privacy and security reasons, you may want to be positive
that the information stored in files you delete is permanently erased
from your computer. Shredder does this for you by “security wiping”
deleted files so they cannot be restored or rebuilt using an “undelete”
type of utility.
16McAfee Internet Secu rity 5.0
What’s new in this release?
This release of McAfee Internet Security includes the following new features
and functional enhancements.
nIncludes VirusScan Home Edition 7 - Includes the latest version of the
award winning VirusScan anti-virus software to protect your system
from viruses, Trojans, Internet wo rms, harmful scripts, and other
malware. With automated updates and exclusive H.A.W.K. (Hostile
Activity Watch Kernel) pr otections, Vi rusScan keeps y o ur computing
free of even the latest threats.
nIncludes McAfee Firewall 4 - Includes the latest version of McAfee
Firewall. McAfee Firewall enables you to control the communications in
and out of your PC and helps keep hackers at bay. With powerful
Application Control, Intrusion Detection, and easy Home Networking
and Custom Rule Creation Wizards, McAfee Firewall provides essential
security for your Internet connection.
nSpyware/Adware Protection - Helps enhance your privacy by rooting
out snooper programs that attempt to track your Web surfing habits.
Now you can easily find and shut down these tracking programs that
often piggyback on popular freeware utilities and games.
nExtended Stealth Program Protect ion - Helps keep your PC free of
hidden key loggers that try to capture and steal your passwords and a
whole host of even more insidious programs that may be watching and
recording everything you do on your PC. Adds an essential layer of
protection against this growing threat to your privacy and security.
Welcome to McAfee Internet Security 5.0
nPop-Up Bloc ker - Puts an end to thos e p esky a nd annoying p o p- up ad s
so prevalent on the Internet. Now you'll be able to surf the Internet
without these and other ads getting in your way and slowing you down.
nAllow/Block Applications Per User - Lets you to control which
applications are available to different family members. Parents can
readily use installed programs while blocking access to younger family
members, protecting the family PC while restricting access to
questionab le material.
nFiltering of Usenet Newsgroups - Usenet is said to exemplify the best
and worst of the Internet. Now you can take charge of which
newsgroups and content various family members might be exposed to
and filter out objectionable material while retaining access to the wealth
of information Usenet provides.
nMRU Cleaner - Deletes the telltale trail left behind the files you've
opened and viewed recently. Enhances your privacy by clearing MRU's
(Most Recently Used) of Windows based utilities and many other
popular programs.
Product Guide17
Welcome to McAfee Internet Security 5.0
nUsability Enhancements - McAfee Internet Security 5.0 includes user
interface enhancements to make it easier than ever to protect your online
security and privacy.
About this manual
This manual provides the basic information you need to install, set up and get
started with McAfee Internet Security 5.0. More de tailed information a bout
how to perform tasks within McAfee Internet Security is provided via online
Help. You can get Help while working with the different windows and dialog
boxes.
You can also view the Readme.txt file which contains other general
information, known issues, etc., about this product.
McAfee Internet Security and your online
connection
You must have an Internet connection through a local network or a modem t o
use all McAfee Internet Security features. Some networks have an Internet
connection that you can use by connecting to the network – either directly or
through dial–up networking. Your computer mu st hav e a mod em installed if
you don’t connect through a network.
You can establish an Internet connection through an Internet Service Provider
(ISP) such as MSN, AOL, or Earthlink, etc. An ISP acts as a middleman
between you and the Internet. Your computer connects (using your modem)
to the ISP’s equipment, which in turn connects your compu ter to the Inter net.
In addition, you must also have a br owser. A browser is software, such as
Microsoft Intern et Explore r or Netscape Navigator, tha t allows y ou to view
text and graphics and download files from Web sites.
18McAfee Internet Secu rity 5.0
Welcome to McAfee Internet Security 5.0
McAfee Internet Security features
This section briefly describes other features of McAfee Internet Security that
protect you from the most common Internet threats.
Only the designated administrator or a user with administrative rights can
have access to these features which allow them to customize protection
settings for themselves and in the case of the Administrator, protection for
other profiled users of the same computer.
Protection from privacy threats
nIdentity Protector monitors your Internet connection and warns you
before private i nformation is sent to an nonsecure Internet site. It stops
programs and other people that use your computer (like your kids) from
sending your name and credit card numbers over the Internet without
your approval.
nCookie Blocker prevents Web sites from storing cookies on your hard
drive. Third-party Web sites use cookies to track your Web browsing
habits. You can choose your level of interaction with Cookie Blocker.
nWeb Trail Cleaner cleans your Web browsing trails such as cached files;
list of URLs (Uniform Resource Locator, also known as Web address)
visited; and history files—when you close your browser. This feature
prevents other users of your computer from tracking your online
movements by viewing the files and URL addresses left over from your
Internet browsing.
nReferer Filter prevents search information that you request at one Web
site from being passed along to the next site you visit. Without Referer
Filter, your browser may be allowing the transfer of your search request
information from one Web site to another.
Protection from security threat s
nGatekeeper allows you to cont rol the programs that have a ccess to your
Internet connection. Programs on your PC can be programmed to access
to the Internet without your consent.
nFile Guardian protects files that contain your sensitive data from being
opened, renamed, copied, moved, or deleted. Programs, such as ActiveX
and Java programs, can scan your PC for personal information or delete
files without your permission.
File Guardian also limits access to protected files ei ther to programs you
specify or through file encryption. It can limit the programs that can
access your tax, online banking, or personal accounting data files.
Product Guide19
Welcome to McAfee Internet Security 5.0
nPassword Manager stores your Web site login names and passwords for
protected Web sites in one secure location. When you are visiting a site
that requires this information, you can drag it from Browser Buddy to
the form displayed in your browser. No more storing your login names
and passwords in an nonsecure location, such as post-it notes on yo ur
monitor or in a text file on your Windows desktop.
nBrowser Buddy is convenient tool with a dual purpose. First, Browser
Buddy lets you view a summary of cookie activity. Just choose a Web site
that you have visited from the drop-down list. Second, Browser Buddy
gives you access to the passwords that you have stored in Password
Manager. When you log on a password-controlled Web Site, you can
drag and drop a user name and pas sword from Browser Buddy to the
appropriate box in the login form. To access Browser Buddy, right-click
the McAfee Guardian icon in the Windows system tray and click
Browser Buddy in the pop-up menu.
Protection from virus threa ts
Using McAfee VirusScan, the following features are available:
nScan to start the default virus scan task immediately, or conf igure a virus
scan task that suits your ne eds.
nScheduler to launch the McAfee VirusScan Scheduler. This utility
enables you to configure and run unattended virus scan operations.
nVirus info to display virus information via the McAfee Web site.
Safeguard your computer against intrusions and attacks
Protect yourself while online with the advanced security of McAfee Firewall.
Easy-to-use, yet highly secure, McAfee Firewall safeguards your PC's
connection to the Internet whether you connect via DSL, cable modem, or
dial-up. McAfee Firewall gives you t he powerful tools you need to control the
communications into and out of your PC.
20McAfee Internet Secu rity 5.0
Installing McAfee Internet Security
Before you begin
McAfee distributes McAfee Internet Security 5.0 in two formats:
1As an archived file that you can download from the McAfee web site.
2On CD-ROM.
Although the method you use to transfer files from an archive obtained via
download differs from the method you us e to transfer files from a CD that is
placed in your CD-ROM drive, the installation steps followed after that a re the
same for both distribution types. Review the system requirements shown
below to verify that this software will run on your computer.
System requirements
To install this product, you require the following:
Desktop and notebook computers
nWindows 98, Windows Me, Windows 2000 Professional, W indows XP
Home Edition, or Windows XP Professional.
2
nInternet Explorer 4.01, Service Pack 2 or higher required for Windows
NT; IE 5.01 or later recommended.
n71 megabytes (MB) of hard disk space.
n32 MB of RAM.
nAn Intel Pentium-class or compatible processor rated at 100 MHz or
higher.
nCD-ROM drive.
nInternet access for product updating.
Additional requirements for wireless devices
McAfee Internet Security includes the latest version of McAfee VirusScan
software. In order to fully protect your wireless device from viruses, trojans,
and worms, etc., your wireless device requires the following:
Product Guide21
Installing McAfee Internet Security
Palm OS and Palm requirements
McAfee VirusScan for Palm Desktop with HotSync Manager 3.0 will install
and run on any IBM PC or PC-compatible computer equipped with Palm
Desktop 3.0 or later. The latest version of Palm Desktop and HotSync 3.0 is a
free download from Palm's site (at www.palm.com). The device-resident
portion is quite simple and should work on any device with the Palm OS.
Windows CE or Pocket PC System requirements
McAfee VirusScan for Windows CE or Pocket PC will install and run on any
IBM PC or PC-compatible computer equipped with ActiveSync 3.0 or later.
Any CE device with ActiveSync 3 will function properly.
Symbian EPOC System requirements
McAfee VirusScan for Symbian’s EPOC will install and run on any IBM PC or
PC-compatible computer equipped with PsiWin 2.3 (or equivalent for
non-Psion EPOC devices. All EPOC devices should ship with PsiWin 2.3
/EPOC Connect 5. These include:
nPsion Revo
nPsion Series 5mx
nPsion Series 7
nPsion netBook
nOregon Scientific Osaris
nEricsson MC218
nEricsson R380
If you have an older device but the current PsiWin/EPOC Connect software,
McAfee VirusScan for Symbian’s EPOC will function properly, including the
Psion HC, the MC series, the Workabout series, all Psion Series 3 models, the
Psion Sienna, the Psion Series 5, the Geofox One, and the Phillips Illium.
If you do not have PsiWin 2.3, Symbian offers a free product called EPOC
Connect Lite which also works.
22McAfee Internet Secu rity 5.0
Installation steps
After inserting the McAfee Internet Security 5.0 installation CD into your
computer’s CD-ROM drive, an Autorun image should automatically display.
To install McAfee Internet Security software immediately, click Install McAfee
Internet Security, then skip to Step 5 to continue with Setup.
Use the steps b e low to i nst al l you r sof twa re.
1If your computer runs Windows 2000 Professional, or Windows XP, log
on to your computer as a user with administrative rights. You mus t have
administrative rights to install this software.
2Insert t he McAfee I nternet Security 5.0 CD in to your computer’s
CD-ROM drive. If the Installation Wizard does not automatically
display, go to Step 3. Otherwise, skip to Step 4.
3Use the following procedure if the Autorun installation menu does not
display, or, if you obtained your software via download at a McAfee web
site.
aFrom the Windows Start menu, select Run.
bType <X>:\SETUP.EXE in the text box provided, then click OK.
Installing McAfee Internet Security
The Run dialog box displays.
4Here, <X> represents the drive letter for your CD-ROM drive or the path
to the folder that contains your extracted McAfee Firewall files. To
search for the correct files on your hard disk or CD-ROM, click Browse.
aBefore proceeding with the installation, Setup first checks to see
whether your computer has the Microsoft Windows Installer (MSI)
utility running as part of your system software. If your computer
runs Windows XP, the current version of MSI already exists on
your system. If your computer runs an earlier Windows release,
you may still have MSI in your computer if you previously installed
other software that uses MSI. In either of these cases, Setup will
display its first wizard pane l immediately. Skip to Step 5 t o
continue.
bIf Setup does not find MSI or an earlier version of MSI is installed
in your computer, it installs files necessary to continue the
installation, then prompts you to restart your computer. Click
Restart System. When your computer restarts, Setup will continue
from where it left off.
5Refer to steps displayed on the Installation Wizard to complete your
installation.
Product Guide23
Installing McAfee Internet Security
NOTE
If your computer does not have the required fonts to view the End
User’s License Agreement (EULA), then you may locate the
appropriate EULA on your McAf ee software installation CD. You
must read and agree to the terms of the agreement to complete your
installation.
Troubleshooting installation problems
A failed installation can cause software problems that are difficult to track
down. The major causes of installation failure are:
nAttempting to install while other software is running.
nTemporary files that conflict with the installation.
nHard drive errors.
Follow the procedure outlined below to minimize the affect that these
common conditions may have on your installation.
Step 1: Close other software
Disable all software running in the background:
1Hold down the Ctrl and Alt keys on your keyboard, and then press the
Delete key once. The Close Program dialog box appears.
2Click End Task for every item on the list except Explorer.
3Repeat steps 2 and 3 until you’ve closed everything except Explorer.
4When you see only Explorer in the Close Program dialog box, click
Cancel.
Step 2: Remove t empor ary f iles
Delete the contents of the Windows Temp folder:
1Double-click the My Computer icon on your desktop. The My Compute r
window opens. Double-click the C: drive. You are now viewing the
contents of your hard drive.
2Double-click the Windows folder.
3In the Windows folder, double-click the Temp folder.
4In the menu, click Edit, then click Select All. All of the items in your
Temp folder are highlighted.
5Press the Delete key on your keyboard to delete the files. If Windows
asks about deleting files, click Yes.
24McAfee Internet Secu rity 5.0
Installing McAfee Internet Security
6In the Windows taskbar, click Start, then click Shut Down.
7Click Restart the computer, then click Yes in the Shut Down Windows
dialog box to restar t your PC.
Step 3: Clean your hard drive
Run the Windows hard drive utilities, ScanDisk and Disk Defragmenter to
identify and fix any error s on you r hard drive:
1Click Start on the Windows taskbar, point to Programs, then Accessories,
then System Tools, and click ScanDisk .
2In the ScanDisk window, select Standard and Automatically fix errors.
3Click Advanced. In the Advanced Settings dialog box, make sure the
following settings are selected:
M Only if errors found
M Replace log
M Delete
M Free
4Ignore the other options, and click OK. Click Start. ScanDisk begins
scanning your drive for errors. Depending on the size of your hard drive,
ScanDisk may take several minutes to complete its job.
5When ScanDisk is finished, close ScanDisk.
6Click Start on the Windows taskbar, point to Programs, then Accessories,
then System Tools, and click Disk Defragmenter.
7Click OK to start Disk Defragmenter. Depending on the speed of your
computer and the size of your drive, this may take several minutes to
complete.
8Close Disk Defragmenter when it has finished defragmenting your disk.
Removing or modifying your McAfee I nternet
Security installation
If your computer’s operating system is...
nWindows 2000 Professional
nWindows XP Home Edition
nWindows XP Professional Edition
Product Guide25
Installing McAfee Internet Security
... you must log on to your computer using a profile with administr ative rights.
Then do the following.
1From the Windows Control Panel, start the Add/Remove applet.
2Select McAfee Internet Security and click:
M Remove to remove McAfee Internet Security from your computer.
M Change to modify your McAfee Internet Security installation.
3Refer to steps displayed on the McAfee Internet Security Installation
Wizard to complete your changes.
Restart your computer as directed by setup.
Important information about Windows XP
migration
Upgrading your computer's operating system from any version of Windows
to Windows XP causes all McAfee products installed before migration to
become disabled after migration to Windows XP.
You will be made aware of this situation as you make your first attempt to
start a McAfee product (after migration) - you will be instructed to reinstall the
product.
As such, you will need to uninstall all McAfee products and reinstall using
your installation CD or the software obtained from McAfee via download.
26McAfee Internet Secu rity 5.0
Getting Started with McAfee
Internet Security 5.0
McAfee Internet Security is a simple program to use. In fact, this one chapter
covers the main things you need to know about using McAfee Internet
Security . You begin with answering a few questions via the Interview so that
McAfee Internet Security can effectively use its feature to protect you from
Internet threats.
3
Introduction
The McAfee Internet Security 5.0 Home page is your central entry point to
access and use all of McAfee Internet Security’s tasks, wizards, and
components. This screen displays three regions that provide you with
dynamic information about current status and navigation links to all tasks.
Product Guide27
Getting Started with McAfee Internet Security 5.0
The Title bar and Tool bar
Title bar
The Home page displays most of your standard Windows elements; that
which includes:
nThe title bar displays the name of the program that is currently running.
nClose and minimize buttons. McAfee Internet Security 5.0’s interface is
of fixed length and width. You cannot resize the interface.
Tool bar
The tool bar displays four browser-like buttons that are common to all screens.
nBack. Click Back to return to the last screen viewed.
nHome. Click Home to go to the McAfee Internet Security Home page
from any screen.
nNext. In conjunction with the Back button, use Next to go to any
previously viewed screen during your current session.
nHelp. Click Help to view its submenu. The Help submenu may include
any of the following items.
Help submenu itemSelect this item to...
Help on this pagew View online Help for the screen you are currently
Contents and index
Help on the Web
McAfee at Home on the
Web
About McAfee Internet
Security
Status information
Depending upon your configuration, the McAfee Internet Security 5.0 Home
page displays other helpful information such as:
nThe name or user name of the person currently logged in represented by
Welcome (name)...
nRunning status:
28McAfee Internet Secu rity 5.0
viewing.
w View online Help for McAfee Internet Security.
w Start your Internet browser and go directly to the
McAfee Help Web site at McAfeeHelp.com.
w Start your Internet browser and go directly to
McAfee-at-home.com.
w Version information about McAfee Internet
Security.
Getting Started with McAfee Internet Security 5.0
M If McAfee Internet Security is not running displays, click Start
McAfee Internet Security to start the program.
M If McAfee Internet Security is running displays, click Stop McAfee
Internet Security to stop the program.
nUpdate status:
M If McAfee Internet Security is up-to-date displays, you are using
the most current version of McAfee Internet Security 5.0.
M If Check for an update displays, click Download update to start
McAfee Instant Updater and check for an update to McAfee
Internet Security 5.0.
nNumber of warnings logged.
M If one or more warnings were logged and not reviewed, click View
warnings to start the Activity log page.
M For more information about Activity logs, please refer to online
Help.
McAfee Firewall st atu s
In order to view McAfee Firewall status information, you must first activate
McAfee Firewall. Activation requires that you perform a few preliminary
configuration steps; the Firewall Configuration Assistant guides you through
this process.
About Tasks
If the Network Traffic monitor does not display on the McAfee Internet
Security home page, click Activate McAfee Firewall to start the McAfee
Firewall Configuration Assistant.
For more information about the Network Traffic monitor or the McAfee
Firewall Configuration assistant, please refer to McAfee Firewallon page 75.
The Task pane displays links that allow you to start McAfee Internet Securi ty’s Tasks. Depending upon your configuration, the Task pane displays McAfee,
links that allow you start the Home page for any other current McAfee
product that you have installed in your computer.
Starting a task is as easy as clicking its link. The Task list allows you to start
McAfee Internet Security’s major components. Although the tasks you can
perform will vary based upon your computer’s operating system and its
configuration, primary tasks include:
Change user settings
Select this task to perform the following:
Product Guide29
Getting Started with McAfee Internet Security 5.0
nAdd or remove a user.
nChange a user or the Administrator’s settings.
The User Setting s pr operties sheet
The User Settings property sheet allows the Administrator to configure their
own personal settings or any other us er’s settings. Self-administrating users
can only change their personal settings.
There are four tabs on the user settings property s heet Each tab allows you t o
configure settings - grouped by their classification.
nPrivacy settings:
Click the Privacy Settings tab to configure your Internet privacy level.
For example, you can filter Cookies, Web bugs and block annoying ads
and pop up windows encountered while browsing th e Internet.
You can also configure Web Trail cleaner to remove records stored on
your computer that were created as you used the Internet. Records of
this type include Temporary Internet Files and historical records such as
URLs visited, created by your Internet browser.
The Privacy settings sheet allows you to protec t personal information
about each user that you want to protect from prying eyes and programs
while browsing the Internet.
nSecurity Settings:
Click the Security Setting tab to monitor your Internet connection and
safeguard your computer against suspicious and potential malicious
activities. Additionally, you can configure McAfee Internet Security to
alert you if you visit harmful Web sites; or if a program in your computer
attempt to access th e Internet without your knowl edge.
nFrom this page of the Change User Settings property sheet, you can
setup File Guardian to protect files, folders, programs, and drives from
unauthorized a ccess.
nUser Preferences:
The User Preferences tab on the Change User Settings property sheet
enables all users to configure how McAfee Internet Security responds to
particular events. Here you configure how McAfee Internet
Security starts, ho w it should alert you, and manage user passwords.
30McAfee Internet Secu rity 5.0
Getting Started with McAfee Internet Security 5.0
nParental Controls:
This page of the Change User Settings property sheet displays for
restricted user profiles - only. In other words, this page does not display
if the user possesses a self-administrating profile or is the McAfee
Internet Security Administrator.
Here you will enable or disable parental controls, and set the content
ratings for the selected user. Other tasks tha t you can p erform f rom this
section of the Change User Settings property sheet include:
M Filter Web sites, chat, and instant messaging for content, that which
includes the blocking of access to proxy sites.
M Identify the time-of-day a restricted user profile is allowed to access
the Internet.
M Explicitly block or allow a restricted user profile the ability to use
specific programs installed in the computer and limit their access to
Internet Newsgroups.
Perform a Security Check
After completing the interview, you’ll want to find out how your PC may be
at risk. Security Check examines your PC for privacy and security problems
and then guides you through fixing any problem it finds. If you are using the
settings suggested by McAfee Internet Security in the interview, you only
need to run Security Check right after installat ion and then every month or so.
If you reduce the level of protection, you should run Security Check more
frequently.
You can also change the Security Check settings to customize how you want
this feature to work on your computer.
View Activity Log
McAfee Internet Security now provides a list of activities that an
Administrator can view via the Activity Logs feature. This list is generated
based on his preferred security and privacy settings for himself and for other
profiled users he created. Anything from dates and time that a user logged on,
to PC maintenance, and violation (e.g., a user attempting to pass a credit card
number) can be viewed at the single click of a button.
Product Guide31
Getting Started with McAfee Internet Security 5.0
The Administrator can print, save or clear this list which contain any of the
following:
Activity log tabDescription
Violationsw Displays any activity of a pr of iled user that
All
Firewall
For step-by-step instructions on working with any of the report logs, see
McAfee Internet Security online Help.
Set Startup Options
This task allows you to start and st op McAfee Internet Secur ity manu ally and
to configure McAfee Internet Security to start as Windows starts.
violates any of the preset protection settings that
the Administrator has indicated (e.g., attempting
to pass a credit card number). It also displays
the day, date and time that the us er logon and
off on the computer.
w Displays list of actions that McAf ee Internet
Security performed including the specific feature
used to complete the task.
w Displays detailed loggin g in fo rm a tion as it
relates to McAfee Firewall.
Configuration Assistant
Select this task to start the McAfee Internet Security Configuration Assistant.
The Configuration Assistant provides you with an easy means of customizing
your McAfee Internet Security settings.
Other Tasks
McAfee Internet Security 5.0 is a fully integrated suite that protects and
secures your computer and connection to the Internet. In addition to the
wizards and features described earlier in this chapter, McAfee Internet
Security also includes utilities such as QuickClean Lite, McAfee Shredder,
Instant Updater.
Although you can start McAfee Internet Security’s shared feature s from the
the Windows Start Menu, you can also start these programs directly from the
Other Tasks Task list item.
From the Other Tasks screen you can start:
nMcAfee Instant Updater.
nQuickClean Lite
32McAfee Internet Secu rity 5.0
nShredder
nSafe & Sound (Please note, the link to start this utility displays only if
your computer’s operating systems is Windows 98 or Windows Me.).
nVisual Trace (You must install McAfee Firewall to see this link).
About the McAfee list
The McAfee list displays links to start the Home page to any other supported
McAfee product. With this release of McAfee Internet Security 5.0, click the
Firewall and VirusScan Home Edition links to start the respective program.
Getting Started with McAfee Internet Security 5.0
Product Guide33
Getting Started with McAfee Internet Security 5.0
How to use the McAfee Internet Security
Configuration Assistant
Although McAfee Internet Security is set up to use security and privacy
settings that are appropriate for most users, some features require your input.
Each interview screen either tells you about a McAfee Internet Security
feature, asks you to enter information, or asks you how you want McAfee
Internet Security to respond to certain situations.
On each interview screen you can click Back to return to a previous screen or
click Next to move to the next screen. In the final interview screen, you click
Finish to save the settings you selected and close the Interview.
What information do es Mc Afee I nte rnet Secur it y ask m e to ent e r?
The McAfee Internet Security interview asks you to enter the personal and
financial information that you want to protect. All the information you enter
into McAfee Internet Security is stored in an encrypted form on your hard disk
– it is never sent to McAfee Software.
You may want to gather your personal information before you start the
interview. During the interview, McAfee Internet Security allows you to enter:
nA password that you can use to protect your McAfee Internet Security
information.
nInformation about other users of your computer. If you are the
Administrator, you can create user profiles and set protection settings
that McAfee Internet Security uses whenever a user is using the Internet
via your computer.
nPersonal and financial information that you want to protect from being
sent out over the Internet without your knowledge:
w Namew Social Security number
w Addressw E-mail address
w Telephone numberw Other financial number s such as bank account,
nAny Web site login names and passwords that you want to store in
Password Manager.
34McAfee Internet Secu rity 5.0
brokerage account, credit card, phone card, and
so on.
Getting Started with McAfee Internet Security 5.0
nFor optimal protection by Identity Protector, include all dashes (such as
Social Security number, bank account numbers, brokerage a ccounts, and
ATM cards). For e xample, if you enter 123-45-6789 as your social secur ity
number, McAfee Internet Security will recognize the number with or
without the dashes. If you enter 123456789, McAfee Internet Security
won’t alert you if the number is sent out with dashes (123-45-6789).
Credit cards do not need dashes because you type the numbers into
separate boxes.
How the McAfee Internet Security Administrator
Works
Since McAfee Internet Security now offers multi-user logon capabilities, this
feature allows one user to act as the administrator of personal information,
protection and security settings entered via the McAfee Internet Security
features. This is particularly useful if for example, you would want to filter,
block or monitor certain types of information that you do not want your
children to access when browsing the Internet.
Creating the McAfee Internet Security Administrator account can only be
done in the Interview feature of McAfee Internet Security. And only the
designated Administrator can access and change information and protection
settings of the computer.
After this setup is complete, the Administrator can add other us ers and set the
levels of security and protection for each user profile.
TIP
When adding user profiles, the Administrator can designate a user
as a Self-Administrator.
See the McAfee Internet Security online Help to view step-by-step instructions
on how to set an Administrator account.
Self-Administrating users
The McAfee Internet Security Administrator may designate another us er as a
Self-Administrator. This feature may be used if for example, the user is an
adult and is deemed responsible enough to customize their privacy and
protection settings.
Self-administrating users cannot change the Privacy, Security, or User
Preferences settings for any other McAfee Internet Security user.
See the McAfee Internet Security online Help to view step-by-step instructions
on how to designat e a user as a Self-Admi n istrator.
Product Guide35
Getting Started with McAfee Internet Security 5.0
The Administrator's password
As Windows starts, McAfee Internet Security prompts you to enter the
password set during the Interview. Without the password, the owner of the
Administrator profile cannot log into and start McAfee Internet Security.
Although the owner of the Administrator profile cannot log in, users with a
self-administrating or restricted user profiles can continue to use McAfee
Internet Security normally. However, if the McAfee Internet Security
administrator cannot log in, he or she cannot add, delete, or modify the
settings for any user profile, including their own. Additionally, McAfee
Internet Security settings cannot be modified.
Therefore, it is very highly recommended that the owner of the Administrator
profile create a password that they will not forget, or, write the password
down on a piece of paper and store it in a secure location.
Forgotten passwords
Please do not lose or forget the Administrator's password.
As described above, you must use the Administrator's profile to effectively
use and configure McAfee Internet Security. Due to the high security risk it
poses to you, we cannot describe the solution to recovering a lost or forgotten
Administrator profile password in this Product Guide, via online Help, or at
our Internet web site.
If you need to obtain a solut ion to this problem, you may contact our Technical
Support departmen t at 1-900-3-AT- HOME (1-900-3 28-4663). Please be a dvised
that there is a $2.95 per minu te cost fo r this telep hone call and the first two (2)
minutes are free*.
Again, we must stress, please do not forget, or misplace the Admin profile
password.
*Phone number, prices, availability and technical support options are subject to
change without notice.
How User Setup Works
The Administrator can add, edit and delete profiles of other users who browse
the Internet through the same computer. After profiling users, the
Administrator can customize their individual protection settings, including
Internet filtering options and monitor their browsing habits.
36McAfee Internet Secu rity 5.0
To customize protection settings for another user, click the Change user
settings task displayed on the McAfee Internet Security Home page, the User
Setup screen is displayed. You can add, edit or delete a user’s profile from this
screen. Click any of the buttons available and follow through the instructions
displayed on screen. Refer to online Help to view more about how to add, edit
or delete a user’s profile.
Using McAfee VirusScan
McAfee Internet Security uses McAfee VirusScan to address virus-related
problems you may encounter through the Internet. This fea ture allows you to
set how to perform a virus scan operation on your computer; w hat to do if a
virus is found; and how it should alert you once the virus is detected. You can
also direct VirusScan to keep a record of actions performed on your computer.
For more info r m ation, see
Viewing Activity Logs
McAfee Internet Security now provides a list of activities that an
Administrator can view via the Activity Logs feature. This list is generated
based on his preferred security and privacy settings for himself and for other
profiled users he created. Anything from dates and time that a user logged on,
to PC maintenance, and violation (e.g., a user attempting to pass a credit card
number) can be viewed at the single click of a button.
Getting Started with McAfee Internet Security 5.0
McAfee VirusScan Home Edition on page 57.
The Administrator can print, save or clear this list which contain any of the
following:
Log TypeDescription
Violationw Displays any activity of a pr of iled user that
violates any of the preset protection settings that
the Administrator has indicated (e.g., attempting
to pass a credit card number).
Maintenance
Activity
w Displays list of actions that McAf ee Internet
Security performed including the specific feature
used to co mplete the task.
w Displays identity of profile d user who browsed
the Internet using the computer. It also displays
the day, date and time that the us er logon and
off on the computer.
For step-by-step instructions on working with any of the report logs, see
McAfee Internet Security online Help.
Product Guide37
Getting Started with McAfee Internet Security 5.0
Keep your program up-to-date
As technologies advance, we continually provide updates to McAfee software
products. Updates include new product content, updates to anti-virus
signature files, etc. To ensure the highest level of protection, you should
always obtain the latest version of your McAfee product. McAfee’s Instant
Updater component allows you to obtain and apply updates to your McAfee
products while connected to the Internet. To learn more about Instant
Updater, please see
If you purchased McAfee Internet Security on CD, you should ru n Update
even if you’ve just installed McAfee Internet Security. In the time between
when the CD was created and when you installed it, updates to the product
itself as well as new virus patterns are likely to be available.
TIP
McAfee Internet Security comprises of several major components.
Updates must be individually obtained and downloaded for each
component.
For example, if you are viewing the Firewall component from
within the McAfee Internet Security main window, then if you
select Check for a Firewall Update, Instant Updater checks for,
downloads, and installs updates to McAfee Firewall onl y. This
applies to all McAfee Internet Security components.
Updating McAfee Internet Security on page 101.
38McAfee Internet Secu rity 5.0
Getting Started with McAfee Internet Security 5.0
What Mcafee Inter net Sec urity does while your
computer is running
While you use your PC, McAfee Internet Security is on the lookout for
potential privacy and security problems and takes action when it finds a
problem. McAfee Internet Security uses the settings stored in Protection
Settings to determine what to monitor and how to react.
Responding to McAfee Internet Security Alert Messages
To protect your privacy and security, McAfee Internet Security works as you
work. When McAfee Internet Security detects a potential problem, it either
handles the problem automatically or warns you with an alert message based
on your McAfee Internet Security settings.
Each alert message tells you what potential problem triggered the message
and McAfee Internet Security’s recommendation on how to respond. If you
want more information about the problem, click the Question Mark button
and then click anywhere inside the alert message.
If you find over time that you are being alerted to potential security risks too
often, you can adjust the alert message s ettings in Protection S ettings . Cookie
Blocker and Gatekeeper require a period of adjustm e nt before McAfee
Internet Security has learned to address your concerns with the least amount
of disruption.
Using the McAfee Guardian shortcut menu
Even when you aren’t running the main McAfee Internet Security
program, you still have quick access to several features using the
McAfee Guardian shortcut menu. Right-click the Guardian icon
located in the Windows system tray to display this menu. You can then do any
of the following:
nStart McAfee Internet Security.
nDisplay Browser Buddy, which lets you retrieve your Internet
passwords and displays statistics on how many cookies have been
allowed or blocked, and how often it has cleared search information.
nDisplay Windows help for McAfee Internet Security.
nEncrypt and decrypt files that File Guardian prote c ts.
Using Browser Buddy to manage your web site passwords
You can depend on McAfee Internet Security to help you easily navigate
through the intricacies of the Web. For example, when you connect to Web
sites that require a name and pa ssword, you can use Browser Bud dy to:
Product Guide39
Getting Started with McAfee Internet Security 5.0
nDrag your user name or password from Password Manager and drop it
on the login form for the Web site.
nAdd new password information for a Web site.
Browser Buddy can also tell you how many cookies have been allowed or
rejected by Cookie Blocker and how many times a search information you
initiated from one Web site, was blocked by Referer filter and not passed to
another Web site.
Browser Buddy always remains displayed on top of any programs open on
your screen. If Browser Buddy is located in an awkward position, you can
close it and reopen it as needed.
To add a new user name and password
1In Browser Buddy, select Add New Entry from t h e Password Manager
drop-down list.
The Enter password to save dialog bo x displays.
2In the Web site text box, enter the Web site address; in the Us er name text
box, type the name by which you identify yourself to this Web site, this
may correspond to User Name, Member ID, Member Name, Login ID, or
Login Name, and so on.
3In the Password text box, type the password that confirms your identity.
In Password Manager, McAfee Internet Security displays one asterisk
for each character in your password.
4Click OK.
To retrieve your user name and password
1In Browser Buddy, select the site name if it doesn’t appear automatically
in the Current Web Site list.
2Drag your user name or password from the Password Manager box to
appropriate field in your Web site’s login form.
The text appears in the field. ( If the site that you are logging into d isplays
your password t ex t as a series of asteri sks (*), McAfee Internet Security
will display one asterisk for each character in your password.)
3Continue logging in as usual to the Web site.
40McAfee Internet Secu rity 5.0
Using File Encryption
File encryption translates a file into a “secret” code that makes the file
unreadable. You must decode or decrypt the file before you can use it. The file
encryption in McAfee Internet Security is designed so that you can easily
encrypt or decrypt all of the files that you designate for encryption in File
Guardian.
Before you can encrypt a file, you must add it to the Guarded Files list in File
Guardian. For step-by-step instructions on adding a file to the Guarded Files
list, see McAfee Internet Security Help.
To encrypt or decrypt fi les
nRight-click the McAfee Guardian icon on the Windows taskbar, then
click Encrypt File Guardian files or Decrypt File Guardian files.
Getting Started with McAfee Internet Security 5.0
Product Guide41
Getting Started with McAfee Internet Security 5.0
Security Features
McAfee Internet Security’s security features safeguard your Internet
connection and protect the files on your PC from prying eyes and destructive
programs.
What Gatekeeper Does
Gatekeeper lets you control what programs on your PC can have access to
your Internet connection. Gatekeeper can also warn you about any of these
potentially harmful actions:
nYour browser is directed to a harmful site—one that has been known to
contain virus-infected files (e.g., Trojan horses, prank or destructive
ActiveX controls, or other security concerns).
nA program silently uses your modem to connect to another computer.
nA program starts up another program.
nA program sends out over the Internet a nu mber that follows a common
credit card number pattern.
Responding to Gatekeeper Alert Messages
McAfee Internet Security can display five different Gatekeeper-related alert
messages. If you are using the default settings suggested by the Interview, you
will see the messages related to Internet access, harmful sites, programs
starting another program, and programs sending out credit card-like
numbers.
Internet Access A ler t Me ssa g e
Each time you start a program that attempts to use your Internet connection,
McAfee Internet Security checks to see if that pr ogram is in the list of programs
allowed to access the Internet. If the program is not in the list, McAfee Internet
Security displays an alert message to tell you that the program is trying to
connect to the Internet and asks you how to deal with the program.
Because McAfee Internet Security displays an alert the first time you start an
Internet program, you may want to start each of the Internet-connected
programs you use regularly in order to get those alerts out of the way at one
time.
42McAfee Internet Secu rity 5.0
Getting Started with McAfee Internet Security 5.0
You can respond to the Internet access alert message in the following ways:
If you choose ...Then McAfee Internet Security ...
This time onlyw allows the program to access the Internet this time only
and warns you the next time it tries to access the
Internet.
Allow always
Not this timew prevents the program f ro m accessing the Internet. This
w allows the program to access the Internet at any time.
In Protection Settings for Gatekeeper, the program is
added to the list of program s al lo w ed to automatically
access the Internet . If you decide later that you do no t
want this program to use your Internet connect i on,
select its name and click Remove.
choice stays in effect unt i l the next time you restart
Windows or for Internet Explorer 4 users, until you close
your browser. Use this opt i on if you w a nt Mc Af ee
Internet Security to warn you the next time the program
tries to access the Internet.
Harmful Site Alert Message
Before you can connect to a harmful site, McAfee Internet Security displays an
alert message, “Your browser is visiti ng Sitena me, a Web si te that may h arm
your PC or data.”
You must immediately close your browser to end your browser’s connection
to this site. The faster you close your browser, the less time the site has to
transfer harmful data to your PC.
If you want to view the Web site anyway, click Continue.
Program Starts Another Program Message
When another program starts to run another program, McAfee Internet
Security checks to see if you’ve authorized this action. If you haven’t allowed
the program to always open the other program, McAfee Internet Security
displays an alert message .
You can respond to the alert message in the following ways:
If you choose ...Then McAfee Internet Security ...
Allow always
w allows the program to start the other program.
Product Guide43
Getting Started with McAfee Internet Security 5.0
If you choose ...Then McAfee Internet Security ...
Not this timew prevents the program f ro m st ar ting the ot her pr ogram
This time only
Any Credit Card Number Goes Out Message
When a program sends a number resembling a credit card number over the
Internet, an alert message is displayed.
You can respond to the alert message in the following ways:
If you choose ...Then McAfee Internet Security ...
just this time.
w allows the program to start the other program just thi s
time.
Not this time
This time only
w prevents the program from sending the number this
time.
w allows the program to send the number just this time.
Why should I change my Gatekeeper settings?
The Gatekeeper settings suggested by the Interview will display the fewest
number of aler t messages. If you are using an older browser versi on or just
want a higher level of security, you may want to change your settings under
the following circumstances:
Use this optionIf you ...
Going to harmful
sites.
My modem dials
silently.
Program tries to
launch another
program.
w want to be warned when the site that you are going to
has been known to cause damage, e.g. contains
virus-infected files, T ro ja n horses, prank or destruc tive
ActiveX controls, or other security concerns. (To keep
McAfee Internet Security’s list of harmful sites current
and effective, use Instant Update monthly.)
w want to be warned whe n a pr ogr am i s using your
modem to dial out.
w want to be warned when a program starts up another
program.
Many newer programs will warn you before doi ng t his,
but older programs ma y not do so. For example,
Internet Explorer 4 uses “helper programs” to di splay
documents.
44McAfee Internet Secu rity 5.0
Getting Started with McAfee Internet Security 5.0
Use this optionIf you ...
Any credit card
number goes out.
These programs are
always allowed
access to the
Internet
What File Guardian Does
File Guardian can protect files that contain your sensitive data from being
opened, renamed, copied, mo ved, or deleted. For added protecti on, you can
even encrypt files protected by File Guardian. McAfee Internet Security can
also alert you if a program attempts one of the following potentially harmful
activities:
nA program attempts to reformat your hard drive.
nAn ActiveX control attempts to delete files on your hard drive.
nAn ActiveX control attempts to scan files on your hard drive.
nA program attempts to access your system password files.
When McAfee Internet Security displays an alert message, you can decide if
the program should be allowed to continue the operation or not.
w want to be warned before any nu m ber tha t resembles a
credit card number is sent out over the Internet.
w want to see a list of what programs you have allowed to
automatically acce ss the Internet. (A program is added
to the list when you click Acc ept Alw ays in the Internet
access alert message.)
If you change yo ur mind, you can r emove a progr am
from the list. You will be warned the next time that
program tries to access the Internet.
Responding to File Guardian Alert Messages
McAfee Internet Security can display five diff erent File Guardian-related alert
messages. If you are using the default setting suggested by the Interview, you
will only see: guarded file; ActiveX scan; ActiveX delete; and drive format
messages.
Guarded File Alert Mess age
Using File Guardian, you can set which files to guard on your hard drive and
what programs can be used to open the files. If an unauthorized application
attempts to access a guarded file, McAfee Internet Security disp lays an alert
message that tells you what application is trying to open which file.
Product Guide45
Getting Started with McAfee Internet Security 5.0
You can then decide whether you want to give the program in question access
to the file. If you did not run the unauthorized program yourself, you should
immediately investigate the program to determine its source.
If you choose ...Then McAfee Internet Security ...
Allow alwaysw permits the program to open the file and adds the
Not this time
ActiveX Scan Alert Message
There are legitimate reasons for a llowing an ActiveX control to read through,
or scan, all of your files. For example, you can go to one site on the Web that
uses an ActiveX control to look for viruses on your PC. However, if a site
begins to scan your files without warning you, McAfee Internet Security gives
you a chance to think about how much you trust the site.
When McAfee Internet Security detects an ActiveX control scanning the files
on your PC, it dis plays an alert message that tells you what ActiveX controls
are scanning your hard drive.
program to the list of progr am s that are authorized to
access the file without further warnings.
w stops the program from o pening the file and warns you
the next time the program tries to open the file.
You can respond to the alert message in the following ways:
If you choose ...Then McAfee Internet Security ...
Not this time
This time only
w Stops the ActiveX control from running this time.
If you change your mind, reload the page in your
browser and click This time only the next time McAfee
Internet Security displays its ActiveX scan message.
w Permits the ActiveX cont ro l to scan your drive just this
time.
ActiveX Delete Alert Message
There are legitimate reasons for allowing an ActiveX control to delete files. For
example, if a control installs special software on your PC to let you interact
with its Web site, the control may need to delete files that it created for
temporary use. However, if a site doesn’t warn you and begins to delete files,
McAfee Internet Security gives you a chance to see what file is being deleted
and think about how much you trust the site.
When McAfee Internet Security detects an ActiveX control deleting files on
your PC, it displays an alert message that tells you the name of the control.
46McAfee Internet Secu rity 5.0
Getting Started with McAfee Internet Security 5.0
You can respond to the alert message in the following ways:
If you choose ...Then McAfee Internet Security ...
Not this timew Stops the ActiveX control from running this time.
If you change your mind, reload the page in your
browser and click Allow this time the next time McAfee
Internet Security displays its ActiveX delete message.
This time only
w Permits the ActiveX control to delete files just this time.
Drive Format Alert Message
When a format command is started, McAfee Internet Security doesn’t know
whether you told your PC to format a Zip disk or whether a rogue ActiveX
control has started to format your hard disk. You know that this activity is
legitimate when you start the formatting command or if you know that a
program you are using needs to format a hard disk (or a Zip or Jaz disk).
When McAfee Internet Security detects a format command, it displays an alert
message that tells you which program started the format command.
If you don’t know why your disk is being formatted, note the name of the
program in the alert message and then turn off your computer using its power
switch. If the program has the letters OCX as part of its name, it is an ActiveX
control. Do not restart your browser until you have run a Security CheckUp
and removed the suspicious ActiveX control from your PC.
Click Continue if you want the program to format your disk.
Why should I change my File Guardian settings?
You may want to change your settings under the following circumstances:
Use this optionIf you ...
ActiveX scans my
drive
ActiveX deletes files
from my drive
w want to be warned when an ActiveX control looks
through the files on your PC.
This may happen legitimately if the control needs to find
a file to use. If you are concerned, check with the si te
that sent you the control.
w want to be warned when an ActiveX control deletes a
files.
This may happen legitimately if the control is deleting
older or temporary files that it uses. If you are
concerned, check wi t h th e sit e th at sent you the control.
Product Guide47
Getting Started with McAfee Internet Security 5.0
Use this optionIf you ...
My drive is bei ng
formatted
Password files are
accessed
Guarded files
TIP
For step-by-step instructions on adding, editing, or removing files
in the Guarded Files list, allowing a program to access a guarded
file, or encrypting or decrypting files, see McAfee Internet Security
Help.
w want to be warned when any program tries to format any
of your drives.
An alert message appears whenever you form at a
floppy disk, other removable media, or hard dis k. You
may want to turn this option off temporarily if you are
going to format a lot of disk s and don’t want to see any
messages.
w want to be warned when any program accesses your
Windows password files (i.e., any file with the.pwl
extension located in the Windows directory).
Windows func t i ons that are pa ssword-protected use
these password files.
w want to prevent any program from opening a file or files.
For further protection , yo u can have McAfee Internet
Security include the f ile when you encrypt files.
You can protect indiv idual files, files in a specific fold er ,
files of the same type, files on t he same drive.
What Password Manager Does
Password Manager lets you store your various Web site login names and
passwords in one secure location. When you are visiting a Web site that
requires this information, you can drag it from the Browser Buddy to the form
displayed in your browser.
In Protection Settings, you can:
w Add a recordw Remove a record
w Edit a recordw View a list of stored login name s and passwords
Whether you wish to add, edit, or remove a password or record, the McAfee
Internet Security Inductive User Interface guides you through the steps.
48McAfee Internet Secu rity 5.0
Privacy Features
McAfee Internet Security’s Privacy features protec t browsing and personal
information that you don’t want anybody to access as a result of your surfing
through the Internet.
What Cookie Blocker Does
Cookies are small files that your Web browser stores on your PC at the request
of a Web server. Each time you view a Web page from the Web server, your
browser sends the cookie back to the server. These cookies can act like a tag,
which lets the Web server track what pages you view and how often you
return to them. Some Web sites, such as Microsoft Expedia, use cookies to
store your password and preferences so that you can automatically log on to
the site.
McAfee Internet Security’s Cookie Blocker offers three options for controlling
the use of cookies on your computer. McAfee Internet Security can:
nReject all cookies
nAccept all cookies
nDisplay an alert message each time a cookie is sent to your browser. The
alert displays the name of the entity trying to set the cookie, and
provides you the option either to accept the cookie or not.
Getting Started with McAfee Internet Security 5.0
When setting up Cookie Blocker in Protection Settings, you can select
one option for direct sites and another for indirect sites. Direct sites are
those that you deliberately access. For example: typing the URL address
in the location bar of your Web browser; clicking a link in a Web page;
or selecting from your list of bookmarks or favorite sites. Indirect sites
are those that you access because the site you are connecting to directly
displays cont ent from another site as part of its own content. For
example, if you went directly to Cool_site.com, it could display an ad
from Ads-r-us.com (the indirect site) in a separate frame in the Cool_site
page.
If during the Interview, you accepted McAfee Internet Security’s
recommendation on how to respond to cookies, Cookie blocker will:
M Automatically allow cookies to be accepted from direct sites.
M Blocks cookies when indirect sites try to set a cookie.
Responding to a Cookie Blocker Alert Message
If during the Interview, you set McAfee Internet Security to prompt you for
action then it will display the Cookie Blocker alert message the first time a site
tries to set a cookie.
Product Guide49
Getting Started with McAfee Internet Security 5.0
You can respond to the alert message in the following ways:
If you choose ...Then McAfee Internet Security ...
Allow alwaysw accepts the cookie and adds the site to the Allowed list.
Never accept
Each time you visit a site that appears in either the Allowed or Rejected list,
McAfee Internet Security adds the number of cookies accepted or rejected to
the list. You can see the totals for a Web site in the Browser Buddy.
If you change your mind about a site, you can remove it from the Allowed or
Rejected list in the Cookie Blocker settings. The next time that you visit that
site it will be as if you are visiting it for the first time. If you want to remove
cookies for a site from which you’ve previously accepted cookies, run a
Security Check and remove the cookies for that site.
The next time you go to that site, all cookies from that
site are allowed automatically.
w rejects the cookie and adds the site to the Rejected list.
The next time you go to that site, all cookies from that
site are refused automatically.(In some cases, the
cookie may be written to your local hard disk, but your
privacy is protected be cause the cookie is never sent
back to the re questing pag e.)
50McAfee Internet Secu rity 5.0
TIP
You can run Security Check so that it only looks for cookies. On the
Perform an Internet Security Check of Your Computer window,
select Change How My Computer is Checked. In this window,
clear all options except Cookies. Click OK and select Check My
computer Now. After you are finished with the CheckUp, don’t
forget to revert to your previous settings.
Getting Started with McAfee Internet Security 5.0
Why should I change my Cookie Blocker se ttings ?
If you want a good level of privacy protection without having to see any
Cookie Block er alert messag es, configur e your settin gs to always acc ept
cookies from sites that you visit directly; and to always block cookies from
sites that you haven’t visited directly.
If you ...Then choose this option.
Want the least
number of cookies
set and highest
assurance of privacy.
Always want to know
when cookies are
sent.
Are not concerned at
all about cookies.
What Identity Protector Does
It is easy to forget that when you send information over the Interne t, it doesn’t
go directly from your computer to the computer that is storing the Web page
information. Instead, the information can pass through many computers
before it reaches its final destination.
Identity Protector can keep your software from sending any personal
information over the Internet to an unsecure site. Although you d on’t have to
worry about a site when it using a secure connecti on, there are many Web sites
that use a secure connection only when dealing with credit card transactions.
w Reject for both Direct Sites and Indirect Sites.
If a site requires you to accept a cookie, you can change
this setting temporarily to Prompt.
w Prompt for both Direct Site s and Indirect Sites. Be
prepared to respond to a large number of alert
messages.
After you respond to the Cookie Blocker alert message,
you won’t see additional al er t me ssages for that site.
w Either turn off Cookie B locker or change the Indirect
Sites setting to Accept.
You should choose the second method if you want to
keep a total of the cookies added to your PC, which you
can view in the Browser Buddy.
If more than one person is using your computer, make sure that you create a
McAfee Internet Security password. If the person using your computer
doesn’t enter the McAfee Internet Se curity password, it automatically replaces
any protected personal information sent to an unsecure site with the text,
“xxxx.” For example, if your child tries to order an item online without
entering your McAfee Internet Security password, it replaces your credit card
number with xxxx xxxx xxxx.”
Identity Protector offers three optional responses whenever an application
tries to send out information over the Internet to an unsecure site:
nLet the information go out.
Product Guide51
Getting Started with McAfee Internet Security 5.0
nBlock the information from going out.
nDisplay an alert message when any application tries to send the
information over the Internet to an unsecure site. This is the response
that McAfee Internet Security sets up when you add information to
protect in the McAfee Internet Security Interview.
Responding to an Identity Protector Alert Message
During the Interview, McAfee Internet Security asked you to enter your
personal and financial information that you want to protect. McAfee Internet
Security displays the Identity Protector alert message the first time an
application tries to send out this information to an unsecure site.
You can respond to the alert message in the following ways:
If you choose ...Then McAfee Internet Security ...
This time onlyw Allows the information to go out just this time.
Not this time
Why should I change my Identity Protector settings?
You may want to change your settings under the following circumstances:
w Prevents the informa tio n from going out this time.
If you ...Then use this option
Are the only person
using your PC and
you don’t want to be
alerted every time.
Have more than one
person using your
PC.
You want to be
warned any time this
information is being
sent out.
52McAfee Internet Secu rity 5.0
w Enter all of the information that you want to prevent from
going out and select Allow Always.
Create a McAfee Internet Security password. If the
McAfee Internet Security password is not entered after
you start Windows, an unauthorized user of your PC
can’t view or send out your personal in f or m at io n.
w Enter all of the information that you may want to prevent
from going out and select Allow Al w a ys or Ask Before
Blocking. For information that you always want to
prevent from going out, select Block Always.
Create a McAfee Internet Security password. If the
McAfee Internet Security password is not entered after
you start Windows, any i nf or m at i on entered in Identity
Protector will be blocked from being sent out.
w Enter all of the information that you may want to prevent
from going out and select Ask Before Blocking.
A Note About Passwords
When McAfee Internet Security asks for your password and you enter it, the
password stays in effect until one of the following events takes place. For all
Windows operating systems:
nYou log out of McAfee Internet Security.
nYou log out of your computer.
nYou shut down your computer.
Fast User Switching is a Windows XP feature that makes it possible for you to
quickly switch between users without having to log off the computer. Multiple
users can share a computer and use it simul taneously, s witching back and
forth without closing the programs they are running.
If you are using Windows XP with Fast User Switching enabled, McAfee
Internet Security detects a fast user switch and as such, requires each
respective user to input their password in order to use password required
tasks.
What Web Trail Cleaner Does
As you surf the Internet, your browser stores info rmation that makes your
browsing experience more satisfying. It uses the information as follows:
Getting Started with McAfee Internet Security 5.0
If your browser uses ...To ...
Cached files
URLs visited
History
w Speed up the display of W eb page elements
such as graphics.
w Display a list of sites that you’ve visited using
Web addresses.
w Display a list of sites that you’ve visited using
Web site names.
Then ...
nThe files left on your PC can be viewed by others and depending on your
browser’s settings, can take up many megabytes of disk space.
nIf you accepted McAfee Internet Security’s recommendation during the
interview, McAfee Internet Security di splays the Web Tr ail Cleaner alert
message when you close your browser.
Product Guide53
Getting Started with McAfee Internet Security 5.0
Responding to the Web Trail Cleaner Alert Message
You can respond to the alert message in the following ways.
If you choose ...Then McAfee Internet Security ...
Cleanw Deletes all of the cached files, history and URL
Don’t clean
By default, McAfee Internet Security selects the s ites that are not bookmarked
(that is, part of your list of favorite sites) because it is less likely that you’ll
return to these sites. If you don’t retu rn to a site, the ca ched files for the site are
never used again—they just sit and ta ke up disk space until they are ultimat ely
deleted by your browser.
If you later want to delete the files that you’ve left behind, run the McAfee
Internet Security’s Security Check.
information associated with the selected Web site
(Domain).
Select a site for cle ani ng by selecting the che ck box
next to the site name.
w Closes the Alert messag e and continues closing your
browser.
Why should I change my Web Trail Clea ner sett ings?
You may want to change your settings under the following circumstances:
If you ...Then use this option
Want to see exactly what files are being
deleted.
Want to remove all traces of your
browsing.
Want to remove files only for Web sites
that you haven’t book marked or added
to your list of favorites.
w Prompt to Clean Up after clo si ng
Web browser.
w Automatically Clean Up after closing
Web browser. (Clear the check box
for “Keep bookmarked items.”)
w Automatically Clean Up after closing
Web browser.
Keep bookmarked items .
What Referer Filter Does
When you perform a search in your Web browser, the search information
displays in the address box of your Web browser. When you go to another site,
the browser retains the search information and the next site you visit can
extract it without your knowledge. Referer filter blocks this information from
being passe d along to the next site.
54McAfee Internet Secu rity 5.0
Getting Started with McAfee Internet Security 5.0
If you have Referer Filter selected in the Security Settings of McAfee Internet
Security, it automatically removes search information before you go to
another Web site. McAfee Internet Security does not di splay an aler t message
for this feature, but you can see the number of times Referer Filter blocks this
information in the Browser Buddy.
Product Guide55
Getting Started with McAfee Internet Security 5.0
56McAfee Internet Secu rity 5.0
McAfee VirusScan Home Edition
Stop viruses and keep your PC safe with McAfee VirusScan! When you're
surfing the Internet, there's more to worry about than just viruses. You need
to be able to control the communications into and out of your PC to ensure that
your computer is safe. VirusScan includes extra firewall protection to keep
your computer safe when you're connected to the Internet. VirusScan destroys
threats at all entry points to your PC including email and synchronization
with your PDA. It constantly monitors and stops virus-like activity on your
computer to prevent any new threats from spreading. If you've got an Internet
connection, you need more than just an ti-virus protection, you need
VirusScan!
What’s new in this release?
nHostile Activity Watch Kern el (HAWK) constantly monitors your
computer for virus-like activity providing even more protection from
Internet-based threats. It looks for events that may indicate new
mass-mailers are present, or attachments with double file extensions.
HAWK has been enhanced to include email clients other than just
Microsoft Outlook - it now supports Outlook Express, Eudora, and other
email that uses SMTP (Simple Mail Transfer Protocol) - this includes
many popular email clients however does not include Internet-based
email (like Hotmail, for example).
4
nScript Stopper™: Many of the fastest spreading viruses, like I Love You,
use scripts to infect your PC. VirusScan 7 stops new malicious threats
from infecting your system with Script Stopper
constant monitoring to detect actions that are often included in
script-based viruses, Script Stopper
activity and will stop the actions that are initiated on your computer
without your knowl edge. Script Stopper
malicious script actions to keep your computer safe from script -initiated
threats.
nIntegrated with Windows Ex plorer: VirusScan 7 includes a Windows
Explorer plug-in that lets you quickly scan files and access other
VirusScan features directly from Windows Explorer making it easier
than ever to use award-winning VirusScan technology.
™ alerts you of the attempted
™. Using HAWK's
™ detects, alerts, and blocks
Product Guide57
McAfee VirusScan Home Edition
nMicrosoft Office Integration: VirusScan 7 scans Microsoft Office 2000+
documents to provide extra protection to users of Microsoft Word, Excel,
and PowerPoint (2000+) in the event that VShield background scanning
must be disabled.
nUsability enhancements: McAfee VirusScan includes many user
interface enhancements to make it easier than ever to keep your
computer and electronic files virus free.
58McAfee Internet Secu rity 5.0
McAfee VirusScan Home Edition
What comes with McAfee VirusScan?
McAfee VirusScan consists of several components that combine one or more
related programs, each of which play a part in defending your computer
against viruses and other malicious software. These components are:
nThe VirusScan Home page. This is your central entry point in using all
of tasks and components. The Home page provides relevant information
such as your computer’s current Automatic Protection Settings status
and version information about your virus definitions. The Home page
also informs you if an update to McAfee VirusScan is available for
download and the total number o f scan oper ations performed.
nOn-Demand Sc a nn ing (ODS). On-demand scanning enables you to
scan at any time. For example, if you suspect you have come in c ontact
with an infected file, but have not accessed the file, you may manually
scan the suspect file, folder, drive, etc.
To perform an on-demand scan, simp ly sel ect th e Scan for vi ru ses now
task from the McAfee VirusScan Home page.
nThe VShield Scanner. This is an On-access Scanning (OAS) component
that gives you continuous anti-virus pro tectio n fro m vir us es tha t arr ive
on floppy disks, from your network, or from various sources on the
Internet. The VShield scanner starts when you sta rt your compu ter, and
stays in memory until you shut down. A flexible set of property pages
lets you tell the scanner which parts of your system to examine, what to
look for, which parts to leave alone, and how to respond to any infected
files it finds. In addition, the scanner can alert you when it finds a virus,
and can summarize each of its actions.
nHostile Activity Watch Kern el. HAWK monitors your computer for
suspicious activity that may indicate a virus is present on your system.
As opposed to VirusScan, which cleans the virus, HAWK prevents
viruses, worms, and trojans from spreading furt her. HAWK moni tors
e-mail clients such as Outlook, Outlook Express, Eudora, and any other
client that supports SMTP (Simple Mail Transfer Protocol), but does not
support Internet-based e-mail such as MSN’s Hotmail.
HAWK incorporates McAfee’s Script Stopper
™to detect, alert, and
block malicious script actions to keep your computer safe from
script-initiated threats.
nSafe & Sound. This component allows you to create backup sets in
protected volume files, which is the safest and preferred type of backup.
A protected volume file is a sectioned-off area of the drive, sometimes
called a logical drive.
Product Guide59
McAfee VirusScan Home Edition
nQuarantine. This component allows you to move infected files to a
quarantine folder. This moves infected files from areas where they can
be accessed and enables you to clean or delete them at your convenience.
nThe E-mail Scan extension. This component allows you to scan your
Microsoft Exchange or Outlook mailbox, or public folders to which you
have access, directly on the server. This invaluable “x-ray” peek into
your mailbox means that VirusScan software can find potential
infections before they make their way to your desktop, which can stop a
Melissa-like virus in its tracks.
nThe Emergency Disk creation utility. This essential utility helps you to
create a floppy disk that you can use to boot your computer into a
virus-free environment, then scan essential system areas to remove any
viruses tha t could load at startup.
nBootable CD. The VirusScan Installation CD includes a CD version of
the emergency startup disk. If your computer is configured to start using
its CD drive, then you can use the CD to boot your computer in to a
virus-free environment th en scan for viruses that load during startup.
NOTE
Safe & Sound is a VirusScan utility that is only functional when
McAfee VirusScan is installed in conjunction with a Windows 98,
Windows 98 SE, or Windows Me operating system.
nMcAfee Instant Update r. Enables your computer to automatically
communicate with McAfee while you are connected to the internet and
inquire of the availability of product updates, updates to anti-virus
signature files, and updates to the VirusScan scan engine. You will also
use this feature to register your McAfee product.
nWireless device protection. In addition to total anti-virus protection for
your PC, VirusScan protects your wireless device and PC from harmful
viruses transferred during the synchronization process.
nCommand-line Scanner s . This component consists of a set of
full-featured scanners you can use to run targeted sca n operat ions f rom
the MS-DOS Prompt or Command Prompt windows, or from protected
MS-DOS mode. The set includes:
M SCAN.EXE, a scanner for 32-bit environments only. This is the
primary command-line interface. When you run this file, it first
checks its environment to see whether it can run by itself. If your
computer is running in 16-bit or protected mode, it will transfer
control to one of the other scanners.
60McAfee Internet Secu rity 5.0
McAfee VirusScan Home Edition
M SCANPM.EXE, a scanner for 16-bit and 32-bit environments. This
scanner provides you with a full set of scanning options for 16-bit
and 32-bit protected-mode DOS environments. It also includes
support for extended memory and flexible memory allocations.
SCAN.EXE will transfer control to this scanner when its specialized
capabilities can enable your scan operation to run more efficiently.
M SCAN86.EXE, a scanner for 16-bit environments only. This scanner
includes a limited set of capabilities geared to 16-bit environments.
SCAN.EXE will transfer control to this scanner if your computer is
running in 16-bit mode, but without special memory
configurations.
M BOOTSCAN.EXE, a smaller, specialized scanner for use primarily
with the Emergency Disk utility. This scanner ordinarily runs from
a floppy disk you create to provide you with a virus-free boot
environment.
All of the command-line scanners allow you to initiate targeted scan
operations from an MS-DOS Prompt or Command Prompt window, or from
protected MS-DOS mode. Ordinarily, you'll use the VirusScan application's
graphical user interface (GUI) to perform most scanning operations, but if you
have trouble starting Windows or if the VirusScan GUI components will not
run in your environment, you can use the command-line scanners as a backup.
Product Guide61
McAfee VirusScan Home Edition
Getting Started
The McAfee VirusScan Home page is your central entry point to access and
use all of McAfee VirusScan’s tasks, wizards, and components. T h is screen
displays three regions that provide you with dynamic information about
current status and navigation links to all tasks.
The Title bar and Tool bar
Title bar
The Home page displays most of your standard Windows elements; that
which includes:
nThe title bar displays the name of the program that is currently running.
nClose and minimize buttons. McAfee VirusScan’s interface is of fixed
length and width. You cannot resize the interface.
Tool bar
The tool bar displays four browser-like buttons that are common to all screens.
nBack. Click Back to return to the last screen viewed.
62McAfee Internet Secu rity 5.0
McAfee VirusScan Home Edition
nHome. Click Home to go to the McAfee VirusScan Home page from any
screen.
nNext. In conjunction with the Back button, use Next to go to any
previously viewed screen during your current session.
nHelp. Click Help to view its submenu. The Help submenu may include
any of the following items.
Help submenu itemSelect this item to...
Help on this page
Contents and index
Virus Information Library
Help on the Web
McAfee at Home on the
Web
About McAfee VirusScan
Status information
Depending upon your configuration, the McAfee VirusScan Home page
displays other helpful information such as:
nStatus of automatic file scanning. This message lets you know if you
nUpdate availability. If an update for McAfee VirusScan is available, or
w View online Help for the screen you are currently
viewing.
w View online Help for McAfee VirusScan.
w Start your Internet browser and go directly to the
McAfee AVERT Virus Information Library Web
site.
w Start your Internet browser and go directly to the
McAfee Help Web site at McAfee H el p.com.
w Start your Internet browser and go directly to
McAfee-at-home.com.
w Version information about McAfee VirusScan.
computer is or is not protected by automatic file scanning. If you are not
protected, “Click here to enable automatic file scanning” displays. You
can click this message to instantaneously enable automatic file scanning.
if you have not registered this product with McA fee, a message displays
describing as such. Additionally , virus definition files (DATs) version
information displays here as well.
If there is an update to McAfee VirusScan available, Click here to update McAfee VirusScan displays. You can click this message to start McAfee
Instant Updater and update this product.
nThe total number of scanning operations performed. The number
represented by this status message indicates the total number of scan
operations performed since you installed McAfee VirusScan.
Product Guide63
McAfee VirusScan Home Edition
The Task pane
The Task pane displays links that allow you to start McAfee VirusScan’s Tasks
and Advanced Tasks. Depending upon your configuration, the Task pane
displays McAfee, links that allow you start the Home page for any other
current McAfee product that you have installed in your computer.
About Tasks
Starting a task is as easy as clicking its link. The Task list allows you to start
McAfee VirusScan’s major components. Although the tasks you can perform
will vary based upon your computer’s operating system and its configuration,
primary tasks include:
nScan for viruses now: This task allows you to scan your entire computer
for viruses. Here you can also choose to scan a specific drive, folder, or
file. When the scan is complete, VirusScan scan Summary Report
displays.
nConfigure automatic protection settings: Select this task to configure
VShield background scan settings.
nCheck for a VirusScan update: This task s tarts McAfee Instant U pdater
and checks to see if there is an update to McAfee VirusScan available.
nOther Tasks: Depending upon your McAfee VirusScan configuration,
this task provides you a quick and convenient method to start McAfee
VirusScan’s shared features.
About Advanced Tasks
Similar to the primary Task list, the Advanced task list may vary depending
upon your version of Windows, its configuration, and other software that may
be installed in your computer. McAfee VirusScan’ s advanced tasks include:
nConfigure and scan my wireless device: Select this task to configure and
defend your wireless device against viruses.
nManage quarantined files: Select this task to manage files infected with
a virus. Here you can choose to add, remove, clean, and delete infected
and quarantined fi l es.
nView and edit scheduled scans: This advanced task allows you to
schedule scan events. You can use the default settings fo r scan events or
create a custom list of scan events.
nView VirusScan’s activity logs: Activity logs contains records about
VirusScan settings, scan results, and historical records of scans
performed. Select this task to view these records.
64McAfee Internet Secu rity 5.0
nConfigure Instant Updater: Instant Updater is the mechanism used to
register your product and to communicate with McAfee to check for an
update to virus definition files (DATs), the virus scanning engine, and
for updates to the McAfee VirusScan p roduct. Select this ad vanced t ask
to check for updates to McAfee VirusScan.
About the McAfee list
The McAfee list displays links to start the Home page to any other supported
McAfee product.
Other McAfee VirusScan features
The VShield Tray Icon
The VShield icon located in the Windows system tray allows you to perform
several tasks.
nLaunch VirusScan: Select this option to Start McAfee VirusScan, if it is
not running.
nView VirusScan Status: Select this option to view the VirusScan
background scanner (VShield) property sheet. Here you can view
real-time statu s i nformation about V irusScan’s background scan
modules.
McAfee VirusScan Home Edition
nDisable VirusScan: Select this option to stop VirusScan’s background
scanner (VShield).
nAbout VirusSca n : This option provides you with version information
about McAfee VirusScan.
Windows Explorer plug-in
With functionality similar to that of the VShield system tray icon, you can
display a VirusScan toolbar in Windows Explorer.
To display the VirusScan toolbar, right-click the Windows Explorer toolbar
and select McAfee VirusScan. The VirusScan toolbar allows you to:
nScan objects displayed in Windows Explorer. For example, you can
select a file, group of files, folder, or a drive.
To use this feature, select the object you want to scan in Windows
Explorer. Click the VirusScan toolbar drop-down arrow and click Scan for Viruses.
nView current VirusScan Status information. To vi ew real-time sc an data
about System scan, E-mail scan, and HAWK.
Product Guide65
McAfee VirusScan Home Edition
About VShield Scanner
The VShield scanner has unique capabilities that make it an integral part of the
VirusScan comprehensive anti-virus software security package. These
capabilities include:
nOn-access scanning: This means that the scanner looks for viruses in
files that you open, copy, sav e, or otherwise modify, and files that you
read from or write to floppy disks and network drives. It therefore can
detect and stop viruses as soon as they appear on your system, including
those that arrive via e-mail. This means you can make the VShield
scanner both your first line of anti-virus defense, and your backstop
protection in between each scan operation that you perform. The
VShield scanner detects viruses in memory and as they attempt to
execute from within infected files.
nAutomatic operation: The VShield scanner integrates with a range of
browser software and e-mail client applications. VShield Scanner starts
when you start your computer, and stays in memory until you shut it or
your system down.
VShield automatic protection settings
The VShield scanner consists of related modules, each of which has a
specialized function. You can configure settings for all of these modules in the
VShield properties sheet.
System Scan
The System scanner looks for viruses on your hard disk as you work with your
computer. It tracks files as your system or other computers read files from
your hard disk or write files to it. It can also scan floppy disks and network
drives mapped to your system.
The System scanner provides scanning protections against viruses embedded
in or attached to e-mail messages as well as well as files that you download
from the Internet. The System scanners functionality replaces that which was
included in the Download and Internet scanners included with previous
versions of McAfee VirusScan.
E-mail Scan
The E-mail scanner monitors e-mail messages and message attachments that
you receive via interoffice e-mail systems, and via the Internet. It scans your
Microsoft Exchange or Outlook mailbox systems.
66McAfee Internet Secu rity 5.0
McAfee VirusScan Home Edition
Hostile Activity Watch Kernel
HAWK monitors your computer for suspicious activity that may indicate a
virus is present on your system. As opposed to VirusScan, which cleans the
virus, HAWK prevents viruses, worms, and t rojans from spreading further.
Hostile Activity Watch Kernel (HAWK) is a VirusScan option that enables
constant monitoring for suspicious activity that m ay indicate a virus is present
on your system. Suspicious activity includes:
nAn attempt to forward e-mail to a large portion of your address book.
nAttempts to forward multiple e-mail messages in rapid succession.
E-mail attachments containing program files (executable files with an .exe file
extension) or scripts that can be used to mask the actual type document
transmitted to you.
By monitoring for these typically malicious activities, HAWK notifies y ou and
lets you take action before damage occurs. HAWK can prevent viruses,
worms, and trojans from spreading further, while VirusS can cleans the virus
to remove it from your computer.
About Script Stopper™
Script Stopper™ is a VirusScan protection mechanism associated with the
HAWK. Script Stopper
routines, perform. For example, Script Stopper
™ detects malicious activities script methods or
™ detects scripts that try to:
nDelete, open, or make files in your computer.
nSend e-mail messages without your knowledge or consent.
nAccess your computer’s registry.
Script Stop per™ allows you to creat e a list of trus ted scripts. If you encounter
a script that is acting in a hostile manner, an Alert mess age displays . At such
time, you can block the script from running now, and at any time in the future.
If you recognize the script, you can allow it to run. If you allow a script to run,
and indicate that you recognize the script, McAfee VirusScan adds the script
to its records of trusted scripts. If there are scripts th at you frequent ly use, or
want to allow to run, you can add scripts to a trusted database directly from
the Script Stoppe r
™ property sheet in the HAWK scan module.
How to Start and Stop VShield Scanner
Using the VShield tray ic on
The VShield icon located in the Windows system tray allows you to start and
stop automatic file protection. To do this right-click the VShield icon and
select:
Product Guide67
McAfee VirusScan Home Edition
nLaunch VirusScan to Start McAfee VirusScan, and to enable automatic
file protection.
nDisable VirusScan to disable automatic file protection. Please note,
automatic file protection, by default, restarts without your intervention
within 10 minutes of disablement.
Using the Windows Control Panel applet
1With the VShield Scanner running, from the Windows task bar select
Start > Settings > Control Panel.
The Windows Control Panel displays.
2Double–click the VirusScan icon.
The VirusScan Services dialog box displays.
3Select the Service tab and click Stop.
VShield Scanner stops.
4By default, setup configures McAfee VirusScan to start as Windows
starts. If you do not want McAfee VirusScan to start as Windows s tarts ,
clear the check box next to Load on startup.
TIP
To maintain the highest level of anti-virus protection, it is not
recommended that you disable automatic file protection.
5Click Apply to save your settings.
6Click OK to close the VirusScan Services dialog box.
VShield Scanner, by default, is configured to automatically start each time
your computer starts. To prevent VShield Scanner to run at startup, clear the
Load on startup check box.
68McAfee Internet Secu rity 5.0
TIP
You can start or re-start the VShield Scanner using the steps
described above.
Using Quarantine
Many VirusScan components allow you to move infected files to a quarantine
folder. This moves infected files from areas where they can be accessed and
enables you to clean or delete them at your convenience.
How to managing quarantined files
This list describes the options available to you when managing quarantined
files:
nAdd. Select this option to browse for and quarantine a suspected file.
nClean. Select this option to remove the virus code from infected file. If
the virus cannot be removed, it will notify you in its message area.
nRestore. Select this option to restore a file to its original location. Please
note, this option does not clean the file. Make sure the file is not infected
before selecting Restore.
nDelete. Select this option to delete the infected file. Make sure to note the
file location so you have a record of the deleted files. You will need to
restore deleted files from backup copies.
WARNING
Choose Delete only if a ba ckup copy of the file is available. To learn
more about how to restore Windows sy stem files, please visit
www.avertlabs.com.
McAfee VirusScan Home Edition
nSubmit quarantined files to AVERT via WebImmune: Select this
option to submit new viruses to McAfee’s investigative labs.
NOTE
McAfee is committed to providing you with effective and
up-to-date tools you can use to protect your system. To that end, we
invite you to report any new viruses, Java c lasses, ActiveX controls,
or dangerous web sites that Viru sSc a n does not now det e ct.
If you have found what you suspect to be a new or unidentified
virus, send the infected file to McAfee Labs Anti-Virus Emergency
Response Team for analysis, usi ng WebImmune. For more
information about WebImmune, please visit
www.webimmune.net.
Product Guide69
McAfee VirusScan Home Edition
Safe & Sound
Safe & Sound is a unique backup utility that automatically creates backup files
of your documents as you work on them. You can configure Safe & Sound to
back up to a different drive, across a network connection, or to a protected area
within your local (c:\) drive. If your files become corrupted due to a virus, or
your system crashes, or if you lose your files, McAfee’s Safe & Sound utility
provides you the ability to recover files using the Safe & Sound Windows or
DOS recover utility.
Please note, Safe & Sound is a VirusScan utility that is only functional when
McAfee VirusScan is installed in conjunction with a Windows 98, Windows
98 SE, or Windows Me operating syst em.
How Safe & Sound creates automatic backups:
TIP
You can also attempt to obtain an antidote from A.V.E.R.T. using
WebImmune at www.webimmune.net.
Network Associates reserves the right to use any information you
supply as it deems appropriate without incurring any obligations
whatsoever.
When you select to have Safe & Sound automatically create a backup set for
you, it creates the first backup set while you are stepping through the Safe &
Sound Wizard. Thereafter, while the Enable Automatic Backup option is
selected, it continues to update your backup set at the time delay you’ve
specified. If you chose to make Mirror backups, Safe & Sound updates your
backup set at the same time that you re-save the original source files.
Defining your backup strategy
After you decide which backup type you want to use (either a protected
volume file or a directory backup set), the most important q uestions you must
answer when defining your own backup strategy are:
Where will you store the backup set?
In today’s computer marketplace, you may discover that it is as cost effectiv e
to acquire a separate backup hard drive where you can keep a current mirror
backup copy of one or mor e other drives that you use on your PC.
In addition, you may want the backup copy to be stored at a remote location,
for increased protection. As long as Safe & Sound can access a logical drive
mapped on your PC, it can store the backup set there. That is, the backup set
can be stored on a shared network drive.
What files are important (which files must be backed up)?
70McAfee Internet Secu rity 5.0
Safe & Sound automatically selects files that are typically important to include
in a backup set. However, you can select other files or types of files to include
in your backup set.
How often should you or safe & sound make these backups?
The more recent your backup set, the happier you’ll be if your PC does
encounter a problem that compromises the data on your primary drives.
However, you may want to keep the default Write-behind Delay of 20 minutes
to give you time to recover a previous version of a file if you ever need to
Safe & Sound configuration
The Safe & Sound setup wizards guides you through your initial setup. Please
access online Help for information about Safe & Sound configuration.
McAfee VirusScan Home Edition
Product Guide71
McAfee VirusScan Home Edition
Emergency disk c reatio n
As it installs itself, VirusScan software will examine your computer’s memory
and your hard disk’s boot sectors to verify that it can safely copy its files to
your hard disk without risking their infection. During that installation, Setup
offers to create an Emergency Disk you can use to start your system in a
virus-free environment. Should the VirusScan software itself be come infected,
or if you want to be sure your computer is clean before you install any other
software, create and use an Emergency Disk to start your computer.
VirusScan software comes with an Emergency Disk wizard that makes disk
creation simple and fast.
The Emergency Disk you create includes BOOTSCAN.EXE, a specialized,
small-footprint command-line scanner that can scan your hard disk boot
sectors and Master Boot Record (MBR). BOOTSCAN.EXE work s with
specialized set of virus definiti on (.DAT) files that focus on ferre ting out
boot-sector viruses. If you have already installed VirusScan software with
default Setup options, you’ll find these .DAT files in this location on your hard
disk:
C:\Program Files\Co m m on Fi l es\Network Associates\V i ru sScan Engine\4.0.xx
The special .DAT files have these names:
M EMCLEAN.DAT
M EMNAMES.DAT
M EMSCAN.DAT
McAfee periodically updates these .DAT files to detect new boot-sector
viruses. You can download updated Emergency .DAT files from this location:
McAfee recommends that you download new Emergency .DAT files directly
to a newly formatted floppy disk in order to reduce the risk of infection.
72McAfee Internet Secu rity 5.0
McAfee VirusScan Home Edition
Using VirusScan With a Wireless Device
Introduction
As the demand for wireless devices continue to grow, it carries with it, the
threat of compromising your data against viruses especially whenever you
exchange information between your PC and your wireless device.
Wireless devices that are currently available in the ma rket today are primarily
designed as a more convenient alternative in storing and retrieving
information such as personal activities, people’s addresses, telephone
numbers, appointments, expenses, etc. Either at work or at home, you can
easily keep track of records in all of these areas by simply us ing your wireless
device. You can even set an alarm to alert you of important meetings, events
or tasks to do during the day, week or month.
How VirusScan protects your wireless device
McAfee VirusScan is an application designed to protect your data by scanning
the files on your wireless device every time a data exchange or update is
performed with your computer. It protects your system from viruses that may
have been placed on your wireless device during the use of features such as
infrared transfers and wireless transactions. McAfee VirusScan supports most
types of wireless devices using Palm OS, Pocket PC, Windows CE, and EPOC
operating systems (please refer to the following table).
Table 4-1. Examples of wireless device s th at McAfe e VirusScan supports
Operating SystemWireless DeviceManufacturer
Palm OS
Palm OS
Palm OSw Clie
Pocket PC
Pocket PC
Pocket PC
w Palm VII Series
w Palm V Seri es
w Palm III Series
w Palm M Seri es
w Visor
w Visor Edge
Palm, Inc.
HandSpring
Sony
w E-115
w iPAQ
w iPAQ H3600 Series
w Aero
w Aero 2100 Series
w PPT 2700 SeriesSymbol Technologies
Casio
Compaq
Product Guide73
McAfee VirusScan Home Edition
Table 4-1. Examples of wireless device s th at McAfe e VirusScan supports
Operating SystemWireless DeviceManufacturer
Pocket PCw Jornada 540
w Jornada 680
w Jornada 720
Pocket PC
Windows CE
Windows CE
w E125
w EM500
w PenCentra 130Fujitso
w HPW-600 ET
Hewlett-Packard
Cassiopeia
Hitachi
Windows CEw WorkPad z50IBM
EPOC
EPOC
w Psion Series 5MX
w Psion - Revo
w MakoDiamond
Psion PLC
TIP
For more information about protecting your wireless device, please
refer to online Help for McAfee VirusScan.
74McAfee Internet Secu rity 5.0
McAfee Firewall
Introduction
Protect yourself while online with the advanced security of McAfee Firewall.
Easy-to-use, yet highly configurable, McAfee Firewall secures your PCs
connection to the Internet whether you connect via DSL, cable modem or
dial-up. With intrusion detection, color coded security alerts, customizable
audible alerts, detailed logging, and an application scan for Internet enabled
applications, McAfee Firewall gives you the power you need to control the
communications into and out of your PC, ensuring tha t your online experience
is as safe as it is enjoyable.
McAfee Firewall:
nControls file and print share access.
nShows who is connecting to your computer if you allow sharing.
nStops floods and other attack packets from being received by the
Operating System.
nBlocks untrusted applications from communicating over the network.
5
nProvides detailed information about which sites you have contacted and
the type of connection that was made.
nCan be set to block all traffic or traffic from a spec ific IP address
immediately.
What’s new in this release?
nFirewall security check: Examines yo ur security sett i ngs for possible
vulnerabilities.
nEnhanced hacker tracin g with the addition of McAfee’s Visual Trace
technology.
nIntrusion Detection System: Detects common attack types and
suspicious activity.
nHome networking wiza rd: Set up protection for personal computers
sharing an Internet connection.
nWizard for creating custom rules: Create custom configurations for
specific programs.
Product Guide75
McAfee Firewall
nPassword protection: Prevent others from tampering with your firewall
settings using password protection.
nImproved support for broadband connections.
nUsability enhancements: McAfee Firewall 4.0 includes many user
interface enhancements to make it easier than ever to secure your
computer.
How McAfee Firewall works
McAfee Firewall is a simple-to-operate security tool that dynamically
manages your computing security behind the scenes.
Setup
During the installation process, the Configuration Assistant prompts you with
basic questions to set up McAfee Firewall to do specific tasks – according to
your needs (e.g. allow sharing of files or not).
Operation
McAfee Firewall filters traffic at the devices that your system uses - network
cards and modems. This means that it can reject inbound traffic before that
traffic can reach vital functions in your computer and waste valuable system
resources.
McAfee Firewall – the Gatekeeper
When McAfee Firewall is running, it monitors trusted and untrusted
programs that communicate using the Internet. If a trusted application
attempts to communicate, McAfee Firewall al lows the program to function
without restrictions. If an untrusted program atte mpts to communicate into or
out of your computer, McAfee Firewall blocks the program’s attempt to
communicate via the Internet.
Configuration
Some network communications are needed to maintain network-based
services. These are managed through user defined rules under the system
settings of McAfee Firewall. The default system settings feature provides
superior protection from hostile threats.
Frequently asked questions
The following are some frequently asked questions that you can briefly
review:
How will McAfee Firewall help me?
76McAfee Internet Secu rity 5.0
McAfee Firewall
McAfee Firewall protects your computer at the network level. It acts as a
gatekeeper, checking every data packet going in or out of your PC. It allows
only what you tell it to allow.
McAfee Firewall has been designed to be easy to use, while providing superior
protection. Once you install and run it, it is configured to block known attacks
and to ask you before allowing applications to communicate.
How is my PC at risk on the Internet?
When you connect to the Internet, you share a network with millions of people
from around the world. While the Internet is a wonderful and amazing
accomplishment, it brings with it all the problems of being accessible to
complete strangers.
While communicating via the Internet, you should take safety precautions to
protect your computing environment. If you use IRC (Internet Relay Chat)
programs, be suspicious of files total strangers send you. Programs that give
others remote access to your computer, such as Back Orifice (BO), are
frequently disseminated in this manner. It is a good practice to scan files
received using anti-virus programs such as McAfee VirusScan before you
open or view files and their attachments.
When on the Internet, others can try to access your f ile sha res. Therefore, you
should check that they are only accessible to those you trust. Otherwise,
untrusted parties can read and delete what is in you r c o mputer.
What other protection do I need?
McAfee Firewall provides network level protection. Other important types of
protection are:
nAnti-virus programs for application-level protection.
nLogon screens and screen saver passwords to prevent unauthorized
access.
nFile encryption or encrypting file systems to keep information secret.
nBoot-time passwords to stop someon e else fr o m starti ng you r PC.
nPhysical access to the computer, e.g. stealing the hard drive.
A separate but also important issue is controlling access to information,
misinformation and “filth” that is widely available on the Internet. You can
use a number of content-filtering services or programs such as McAfee’s
Internet Security that can filter th e contents of data packets or r estrict access to
certain sites.
Are there any data packets that McAfee Firewall cannot stop?
Product Guide77
McAfee Firewall
Inbound Data: No. As long as McAfee Firewall supports a network device
and is running, it is intercepting all incoming packets and will allow or block
according to the way you have it configured. If you choose to block
everything, it will.
Outbound Data: Yes and no. McAfee Firewall intercepts outbound data
packets as they are passed to the network device driver. All popular
applications communicate this way. A malicious program could communicate
by other means, however.
What network devices does McAfee Firewall support?
McAfee Firewall supports Ethernet and Ethernet-like devices. This includes
dial-up connections, most cable and ISDN modems and most Ethernet cards.
It does not support Token Ring, FDDI, ATM, Frame Relay and other networks.
What protocols can McAfee Firewall filter?
McAfee Firewall can filter TCP/IP, U D P/IP , I CMP/IP and ARP. It intercepts
all protocols, but others, such as IPX, must be either allowed or blocked - no
filtering is done. The Internet uses the IP protocols. No others are sent. Also,
IP networks are the most common.
How can I still be harassed, even with McAfee Firewall?
Many people use McAfee Firewall to block the “nukes” that cause their IRC
connections to be broken. While McAfee Firewall blocks the nukes, there are
other ways that attackers can still cause the connections to be broken:
nServer-side nuking. This is when the "nukes" are sent to the IRC server,
not to your computer, telling the server that you can no longer be
reached. To prevent this, the IRC server needs a firewall.
nFlood blocking a TCP connection. If a flood of packets is sent to you
from a higher speed connection, McAfee Firewall can stop the packets,
but the flood takes up all your bandwidth. Your system does not get a
chance to send anything. Dial-up users are particularly vulnerable since
they have the lowest speed connections.
TIP
To read additional frequently asked questions, refer to the
Readme.txt file.
Getting Started with McAfee Firewall
After installing McAfee Firewall, you will need to configure your software for
its first use. The Configuration Assistant guides you through this process.
78McAfee Internet Secu rity 5.0
TIP
Previous versions of McAfee Firewall did not allow you to run the
Configuration Assistant more than once. However, McAfee
Firewall 4.0 allows you to run the Configuration Assistant with an
easily accessible link on the McAfee Firewall Home page.
The Configuration Assistant
Welcome Scre en
The McAfee Firewall Configuration Assistant displays the first time you start
McAfee Firewall. This wizard guides you through initial setup and activates
McAfee Firewall on your computer. Select Back, Next, Cancel, and Finish to
navigate the Configuration Assistant screens.
If you select Cancel on any Configuration Assistant screen, the activation and
configuration process stops. You must complete the Configuration Assistant
on first use in order to activate and use McAfee Firewall.
Network Control Settings
Network Control Settings identify how you want McAfee Firewall to respond
when a program attempts to access the Internet; either into or out of your
computer.
McAfee Firewall
1To set your Network Control settings, from the Welcome to McAfee
Firewall screen, select one of the following.
Table 5-2. McAfee Firewall’s Network Control Settings
Internet Traffic SettingDescription
Block all trafficConfigures McAfee Firewall to block all Internet
traffic into and out of your computer. This is the most
secure firewall setting; however, programs in your
computer cannot acces s t he I nt er net.
Product Guide79
McAfee Firewall
Table 5-2. McAfee Firewall’s Network Control Settings
Internet Traffic SettingDescription
Filter all trafficGives you the opportunity to d ecide whether an
application or program in your computer will be
allowed to access the Internet. If an unrecognized
program attempts to access your computer from the
Internet, you will also be given an opportunity to
allow or block its access yo ur computer.
Allow all trafficConfigures McAfee Firewall to allow all Internet
traffic into and out of your computer. All programs in
your computer will be allowed to access the Internet;
programs attempting to access your computer from
the Internet will not be blocke d. Allo w all tra ffi c
disables all McAfee Firewa l l prot ec t io n fe atures and
should only be used for diagnostic purposes.
2Click Next.
Startup Options
This screen allows you to choose how you want McAfee Firewall to respond
as you start your computer.
For your convenience, recommended Startup Load Options have been
pre-selected for you.
1Select Load McAfee Firewall automatically at startup if you want
firewall protection as you start your computer. If you do not want
McAfee Firewall to start as your computer starts, then clear this check
box.
2If you want to display a McAfee Firewall icon on your Windows
desktop, then select Place a McAfee F irewall icon on th e desktop. If you
do not want an icon on your Windows desktop, then clear this check box.
3Click Next.
Access to shares
If your computer is part of a workgroup, such as a home network, you can
configure McAfee Firewall to allow access to your computer’s network shares
as well as allow your computer to access other computer’s shares. A share is a
resource such as a drive, directory, file, or printer available to a workgroup or
home networked computers.
80McAfee Internet Secu rity 5.0
McAfee Firewall
1Access to other shares: check the Allow my computer to access other
computer’s shares if you want to allow your computer to have access to
the shared drives, directories, folders, and printers, etc. of other
computers in your workgroup or home network.
2Access to my shares: check the Allow other computers to access my
shares check box to allow other computers in your workgroup or home
network to have access to your shared drives, directories, folders, and
printers, etc.
3Click Next.
Allowed applications
During the configuration process, McAfee Firewall scanned your computer's
hard disk to identify programs that use the Inter net. For example, programs of
this type would include Internet browsers, Internet e-mail programs, and ftp
(file transfer protocol) clients. On this screen, you will identify programs that
you will allow to access the Internet through McAfee Firewall.
To allow specific programs to access the Internet, do the following:
1From the list of applications displayed on this, check the check box
corresponding to each program you will allow access to the Internet.
Click Search all drives to search all of your computer’s partitions, logical
drives, and physical hard drives for programs that communicate using
the Internet.
If you do not allow any or all of the programs displayed on this screen to
communicate, you will be notified when each attempts to do so and
decide whether to allow access to the Internet at that time.
2Click Finish.
What’s happens next?
After you complete the steps associated with setting up your initial
configuration, the following events take place:
1The firewall service starts.
2The McAfee Firewall Home page displays.
You are now ready to start using McAfee Firewall!
Product Guide81
McAfee Firewall
The McAfee Firewall Home page
The McAfee Firewall main window is your central entry point to all of McAfee
Firewall’s Tasks, Advanced Tasks, and shared features. The McAfee Firewall
interface displays three regions common to all of McAfee Firewall’s screens.
The Title bar and Tool bar
Title bar
The Home page displays most of your standard Windows elements; that
which includes:
nThe title bar displays the name of the program that is currently running.
nClose and minimize buttons. McAfee Firewall’s interface is of fixed
length and width. You cannot resize the interface.
Tool bar
The tool bar displays four browser-like buttons that are common to all screens.
nBack. Click Back to return to the last screen viewed.
nHome. Click Home to go to the McAfee Firewall Home page from any
screen.
82McAfee Internet Secu rity 5.0
McAfee Firewall
nNext. In conjunction with the Back button, use Next to go to any
previously viewed screen during your current session.
nHelp. Click Help to view its submenu. The Help submenu may include
any of the following items.
Help submenu itemSelect this item to...
Help on this pagew View online Help for the screen you are currently
viewing.
Contents and index
Help on the Web
McAfee at Home on the
Web
About McAfee Firewall
w View online Help for McAfee Firewall.
w Start your Internet browser and go directly to the
McAfee Help Web site at McAfee H el p.com.
w Start your Internet browser and go directly to
McAfee-at-home.com.
w Version information about McAfee Firewal l .
Status information
Depending upon your configuration, the McAfee Firewall Home page
displays other helpful information such as:
nFirewall Status: Running or Stopped. Click the link below the status to
start or stop McAfee Firewall.
nHome page notification. If there is an update to your version of McAfee
Firewall available for download, select this task.
nThe number of programs currently communicating. If you want to
identify the program’s communication, select this task to view your
current activity.
nFirewall warning information. If there are any communication
warnings, select this task to view the warning log.
Internet traffic settings
The Internet Traffic setting frame displa ys your current filter ing setting. H ere
you determine if you want to Block all, Al low all, or Filter Internet Traffic. For
more information about these settings, refer to Table 5-2 on page 79.
To change an Internet traffic setting, simply click the de sired setting. Changes
are real-time and effective immediately.
Product Guide83
McAfee Firewall
McAfee Firewall status
This region of the Home page displays the current running state of McAfee
Firewall. It is either running or not running.
If the McAfee Firewall status
message is...
McAfee Firewall is Running
McAfee Firewall is Stopped
Then...
w Click Stop McAfee Firewall to disable
firewall protection.
w Click Start McAfee Firewall to enable
firewall protection.
Network Traffic monitor
The Network Traffic monitor displays a graphic representation of real-time
network activity. The monitor is color-coded to help you identify normal
network traffic, port scans, and worst of all, attacks.
nGreen zone: Activity displayed in this zone is normal network activity.
It is not uncommon to see activity in this zone reaching the yellow area.
nYellow zone: This is the caution zone. You can view the Activity Log to
analyze data for this traffic. Activity in the yellow zone could represent
a port scan.
nRed zone: Red represents the worst level of net work activity and usually
represents an attack. You can view the details of the attack by accessing
McAfee Firewall Activity Log. If the attacker’s IP address is available,
you can attempt to trace the attacker using McAfee Firewall’s Visual
Trace component.
The Task pane
The Task pane displays links that allow you to start McAfee Firewall’s Tasks
and Advanced Tasks. Depending upon your configuration, the Task pane
displays a McAfee list, links that allow you start the Home page for any other
current McAfee product installed in your computer.
About Tasks
Starting a task is as easy as clicking its link. The Task list allows you to start
McAfee Firewall’s major components. Although the tasks you can perform
will vary based upon your computer’s operating system and its configuration,
primary tasks include:
nControl Internet programs: This task allows you to explicitly block or
allow specific programs to access the Internet.
84McAfee Internet Secu rity 5.0
McAfee Firewall
nView network activity: Select this task to view real-time network
activity and view your current activity log.
nSet alert preferences: Choose how you want McAfee Firewall to notify
you when a potential security breach occurs.
nSet up Home Networking: Helps make setting up protections for your
PCs sharing an Internet connection a breeze.
nPerform a security check: This task allows you to start the McAfee
Firewall Security Check process.
nSet startup options: Choose how you want McAfee Firewall to start.
nConfiguration Assistant: This task starts the Configuration Assistant.
About Advanced Tasks
Similar to the primary Task list, the Advanced task list may vary depending
upon your version of Windows, its configuration, and other software that may
be installed in your computer. McAfee Firewall’s advanced tasks include:
nAdvanced options and logging: Select this task to configure intrusion
defense mechanisms, set up the automatic configuration of filtering
rules, and identify the type of traffic you want to log.
nConfigure network adapters: Choose this task to view your current
network adapter and configure their communication settings.
nIntrusion detection settings: Select this task to configure how you want
McAfee Firewall to respond upon its detection of an intrusion.
nBlock IP address: If there is a specific IP address that you want to block
from accessing your computer, or, if there is an IP address that is
currently blocked that you want to allow, choose this task.
nSet up password: This task helps you to secure your McAfee Firewall
settings with password security.
nOther Tasks: Select this task to navigate to a screen that allows you to
start McAfee Firewall’s shared features
About the McAfee list
The McAfee list displays links to start the Home page to any other supported
McAfee product.
Product Guide85
McAfee Firewall
Other McAfee Firewall features
McAfee Firewall settings security chec k
Examines your firewall security settings, allowing you to rectify weaker
settings before hackers get a chance to exploit them. The McAfee Firewall
Settings Security Check flags and suggests changes to help you keep your
system set to optimal security.
If Security Check detects an issue, click Fix and McAfee Firewall helps you
analyze and correct potential problems.
Home networking wizard
Helps make setting u p protections f or your PCs shar ing an Internet connection
a breeze, providing helpful wizards to walk you through the process.
All networking media and hardware (such as cables and network adapters)
must be installed on each computer in order for this wizard to locate your
computers.
Password protection
Prevent others from tampering with your firewall settings by locking access to
them with password security. Also helps keep your firewall protections secure
by preventing the firewall from being shut down with out your password.
About Visual Trace
Visual Trace is a multi-purpose Internet tool used for finding information and
trouble-shooting connection problems.
At the simplest level Visual Trace shows you how packets (data) get from your
computer to another computer on the Internet. You see all the nodes
(equipment of various types on the Internet that is passing traffic) between
your computer and the trace target.
There are many situations where you need this information. Visual Trace is a
useful tool when troubleshooting connections or just verifying that everything
is working OK. There is also a wealth of information presented by Visual
Trace, including the domain owners, relative locations, and in many cases, the
location of nodes.
Besides using V isu al Tr ace to l ook for w eak spo ts in a con nect ion y ou ca n use
it to:
nDiscover whether you can't reach a site due to a failure at your Internet
Service Provider (ISP) or further into the Internet
nDetermine the point of a network failure that is preventing you from
reaching a Web site.
86McAfee Internet Secu rity 5.0
nDetermine the location of sites and their users, uncover the owners of a
site, and help track down the origin of unwanted e-mail messages
('spam').
nGet detailed contact information on sites all over the world (where
available).
How to start Vi su al T ra ce
You can start Visual Trace directly from the Windows start menu. You can also
start Visual Trace from the McAfee Firewall Detail Activity screen, the Block
IP dialog box, and if you are attacked, from the Windows system tray pop-up
notification.
For more information about Visual Trace, please refer to online Help for
Visual Trace.
McAfee Firewall Configurations
The configuration of McAfee Firewall is divided into two classifications –
application (program) and system. Upon installation, a base set of rules for
system servic es such as ICMP, DH CP and ARP are installed (these are
considered default settings).
McAfee Firewall
On the other hand, the programs classification is personalized. Whenever you
run a new program that attempts to communicate over the Internet, McAfee
Firewall will prompt and ask you whether you want to trust the program or
not.
For example, using Internet Explorer, enter an Internet address or URL (i.e:
http://www.mcafee-at-home.com) in the address bar of your browser and
press ENTER. Internet Explorer will attempt to connect to that URL over the
Internet. The first time you do this, McAfee Firewall prompts if you “trust”
Internet Explorer. If you say “Yes,” McAfee Firewall notes Internet Explorer is
allowed and whenever you use Internet Explorer in the future, McAfee
Firewall will allow its traffic.
As you allow programs to use the Internet, McAfee Firewall “learns” the rules
you are creating for the program and saves them for future use. If a Trojan
horse program attempts to communicate out from your computer, McAfee
Firewall will also prompt you whether you trust them or not, and the decision
to block the Trojan horse program from communicating is easy and
instantaneous.
Product Guide87
McAfee Firewall
Program configuration
During your first attempt to start McAfee Firewall, the Configuration
Assistant asked you to identify programs that you want to allow to
communicate. At such time, McAfee Firewall created a default set of
communication rules for the programs (applications); designated as allowed
to communicate.
Based upon the type of program, for example, Internet browsers, e-mail, ftp,
IRC, and file sharing programs, McAfee Firewall identifies the type of
program and creates a default set of communication rules for each progra m in
your computer. That is, to either block, allow, or filter a program’s
communication attempts via the Internet.
Firewall Communication Alert Messages
A McAfee Firewall Communication Alert message displays if an
unrecognized program attempts to communicate. There are several scenarios
that could cause a program to be unrecognized.
nIf you install a program that communicates via the Internet after
installing McAfee Firewall, the program’s first attempt to communicate
will cause an alert message to display.
nAlthough the Configuration Assistant performs a thorough analysis of
your computer’s programs that use the Inte rnet to communicate , it may
not have been able to identify all of your computer’s programs that use
the Internet to communicate.
If an unrecognized program attempts to communicate, the resulting alert
message generally asks you to select one of the following options:
nNo, deny at this time: Blocks the progr a m’s current and all future
attempts to communicate. The active program is a dded to the trusted list
of programs with an allowed state of “blocked.”
nYes, allow this time: The active attempt to communicate is allowed. The
program is not added to the trusted programs list.
nIf you recognize the program and do not want to receive any future
alerts for this program, check the I recognize this program check box.
88McAfee Internet Secu rity 5.0
TIP
If you allow or block a program the first time you are prompted,
McAfee Firewall provides you with the flexibility to change this
setting and block or allow it to communicate at any time in the
future. As you exit McAfee Firewall, your settings are saved and
will be the same the next time it is run.
McAfee Firewall
Changing a program’s allowed state
McAfee Firewall monitors Internet traffic to see which programs are
communicating. Depending on your settings, it will allow, block, or filter a
program's attempt to communicate.
If you choose to “Allow all” programs to communicate through your f irewall,
then all programs installed in your computer can communicate.
To view and configure the current list of trusted programs
1From the Task list, select Control Internet programs.
2Select the program whose filtering settings you wish to configure (or
click Browse to add a program to the list).
3Select one of the following options:
M Filter this program’s access to the Internet.
M Allow this program to have full unfiltered access to the Internet.
M Block this program from accessing the Internet.
4To add a program to the list, click Add and browse to select the program
you want to add. To remove a program from the list, sele ct the program
you want to remove and click Remove.
5Click Apply.
How to customize filtering rules for a specific program
For all programs designated as “filter,” McAfee Firewall provides power users
with the flexibility to create a set of custom filtering rules for each filtered
program.
TIP
The Customize button becomes accessible if and only if you select
the Filter this program’s access to the Internet option.
To create a custom filter ing rul e
1From the Control Internet Programs screen, select the program for which
you want to create a custom filtering rule.
2Select the Filter this program’s access to the Internet radio button.
3Click Customize.
If the program currently maintains a default set of rules created by
McAfee Firewall, then the Customize filtering rules dialog displays. If
the program does not maintain a default set of rules, then the What do you want this filtering rule to do? dialog displays.
Product Guide89
McAfee Firewall
4Refer to the instruction’s displayed on the Custom Filtering rules dialog
Addw Click Add to add a new rule and to disp la y th e
What do you want this rule to do? dialog .
Remove
w Click Remove to remove a rule from the
selected program.
CAUTION: There is no “undo” feature.
Edit
Restore
w Click Edit to refine a filtering rule.
w Click Restore to restore the default rules fo r the
selected program.
TIP: If you inadvertently Rem ove a filtering rule,
click this button to restore the default rules for
the selected program .
OK
w Click OK to close the Customize Filtering Rules
dialog and save your changes.
Cancel
w Click Cancel to close the Customize Filtering
Rules dialog without savi ng your changes.
Primary functions
From the list of primary functions displayed on the Customize Filtering Rules
dialog, you can choose one of the following:
Y ou can choose to...by ...
Allow communication...
Block communication...
90McAfee Internet Secu rity 5.0
Table 5-4. Primary Functions
w protocol
w local port
w remote port
w IP address
w domain name
w direction
McAfee Firewall
Refining conditions
After you select the primary function for the rule, you can further refine the
rule by checking the check boxes for any or all of the communication
characteristics:
With...Using...
w direction
w domain names
w IP addresses
To customize the refinement condition, click [click here to select]
upon the communication characteristics selected, various dialog and text
boxes display. For example, if the custom rule states “B lock thi s progra m from
communicating and the IP address is,” then an Add/Edit rule text displays
allowing you to enter an IP address. Similarly, if you want to block a program
from communicating by protocol, an Edit Protocols dialog displays.
To save your changes, click OK.
System configura tion
Your computer’s operating system performs many types of network
communication without reporting directly to you. McAfee Firewall lets you
explicitly allow or block different system functions. Settings may be different
for each network device, since a computer, for example, can be connected to
an internal network as well as having a dial-up connection to the Internet.
Use the steps below to control your System settings.
1From the Advanced Task list, select Configure network adapters.
2From the Configure Network Adapter Settings screen, select the adapter
you want to configure and click Adapter Settings to view or change the
properties of this adapter.
Result: The Properties sheet for the selected network adapter displays.
w protocols
w remote ports
w local ports
. Depending
Product Guide91
McAfee Firewall
You can then choose to allow or block NetBIOS over TCP, Identification,
ICMP, ARP, DHCP, RIP, PPTP and other protocols (IP and non-IP).
Table 5-5. Default Settings for System Activity
System Activity TypeDescription
NetBIOS over TCP:
Blocked
Identification: BlockedThis service is often required when getting email and
ICMP: BlockedThis protocol is often abused as a method of
ARP: AllowedARP is a necessary Ethernet protocol and is no t
DHCP: Allowed if your
system uses DHCP
RIP: BlockedAllow RIP if yo ur adm i nis tr at or or I SP adv ise s yo u t o.
PPTP: BlockedThis should only be altered by t he administrator.
Other Protocols: BlockedIf you are on an IPX network, you should allow
This will block all file share activity over TCP as well
as UDP broadcasts. Your system will not appear in
anyone's “Network Neighborhood” and theirs will not
appear in yours. If your system is configured to
support NetBIOS over other protocols, such as IPX
or NetBEUI, then file sharing may be allowed if
“non-IP protocols” are a llowed (see “Other
Protocols” below).
is required by most IRC servers.
breaking people's net wor k connections (especial l y
on IRC).
known to be a threat.
The program looks in your system Registry to see if
one of your network devices uses DHCP. If so, then
DHCP is allowed for all devices. If not, then it is
blocked for all devices. If you have more than one
network device and one uses DHCP, you should
check the DHCP setting f or each device and allow
only for the device that uses it (m os t oft en cable or
ADSL modems and some inter nal networks, not for
dial-up).
“non-IP protocols”. If yo u us e PPTP, you should
allow “other IP protocols”. Ask your network
administrator before making any change here.
92McAfee Internet Secu rity 5.0
McAfee Firewall
McAfee Firewall’s Intrusion Detection System
Unlike other intrusion detection tools, McAfee Firewall’s powerful Intrusion
Detection System (IDS) is simple to configure and activate. Instead of
requiring users to learn and understand a complex set of attacks to b uild their
own defense lines against intrusions, McAfee Firewall’s development t eam
created a tool that, when activated with the click of a button, detects common
attack types and suspic ious activ ity.
Unprotected computers can be victimized. For example, attackers can use a
TCP port scan to find out what services you are running on your machine.
Once this is accomplished, they can try to connect to those services and attack
your computer. If the attacker discovers that you are running a TELNET, ftp,
or Web server, the attacker can try each of your computer’s ports seque ntially,
from 1 to 65535, until an open port is found that they can connect to.
McAfee Firewall’s IDS feature looks for specific traffic patterns used by
attackers. McAfee Firewall checks each packet that your machine receives to
detect suspicious or known attack traffic. For example, if McAfee Firewall sees
ICMP packets, it analyzes those packets for suspicious traffic patterns by
comparing the ICMP traffic against known attack patterns. When McAfee
Firewall matches packets with a known attack pa ttern, the softwar e generates
an event to warn you of a possibl e security breach.
When intrusion detection is on, traffic is checked by the intrusion detection
system. When intrusion detection is active and McAfee Firewall detects an
attack, you can block further communication from the suspected machine’s IP
address indefinitely or for a specific time period. When an attack is detected,
McAfee Firew all alerts you with a Windows system tray notification.
NOTE
Because McAfee Firewall is analyzing packets and looking for
patterns of packets that identify specific types of attacks, this
feature may result in a very slight impact on your machine’s
performance.
How to Configure the Intrusion Detection System
Use the steps below to configure McAfee Firewall’s intrusion detection
system:
1From the McAfee Firewall Home page, click Advanced Tasks.
2From the Advanced Tasks list, select Intrusion detection settings.
Refer to the instructions displayed on the Configure Intrusion Detection
Settings screen to complete this task.
Product Guide93
McAfee Firewall
Common attacks recognized by IDS
The following table lists attacks recognized by McAfee Firewall’s IDS, a
description of each attack, and the risk factor assigned to each attack.
AttackDescriptionRisk
Factor
1234Also known as the Flushot attack, an attacker sen ds an oversize ping
packet that networking software could not handl e. Usually, computers
hang or slows down. If a total lo ckup occurs, unsaved dat a may be lost.
Back OrificeBack Orifice is a back door pr ogram for Windows 9x writt en by a group
calling themselves the Cult of the Dead Cow. This back door allows
remote access to the machine once installed, allo w ing t he i nstaller to run
commands, get scree n shots, modify the registr y, and perform other
operations. Client progr am s t o ac cess Back Orifice are available for
Windows and UNIX.
BonkDesigned to exploit an impl em entation error in the first Teard ro p patch
released by Microsoft, this attack is basically a Windows-specific variant of
the original Teardrop attack.
FraggleTh is a tta ck i s a UDP v ar ia nt of th e Smur f at ta c k. By s e ndi n g a f or ge d UD P
packet to a particular port on a br oadcast address, system s on the
“amplifier” network will re spond to the target machine with either a UDP
response or an ICMP UNREACHABLE packet. This flood of incoming
packets results in a denia l of service attack against th e ta rg et m achine.
IP SpoofingIP spoofing involves sending data with a falsified return IP address. There
is nothing inherently dangerous about spoofing a source IP address, but
this technique can be used in conjunction with others to carry out attacks
TCP session hijacking, or to ob scure the source of denial of ser vi ce
attacks (SYN flood, PING flood, etc.).
JoltA remote denial of service att ac k usi ng specially crafted ICMP packet
fragments. May cause sl owdowns or crashes on ta rget systems.
Jolt 2A remote Denial of Servic e (DoS) attack similar to Jolt th at uses specially
crafted ICMP or UDP packet fragments. May cause slowdowns or crashes
on target systems.
LandThis attack is performed by sending a TCP packet to a running service on
the target host, with a so urce address of the same host. The TCP packet
is a SYN packet, used to establish a new connection, and is sent from the
same TCP source port as the destination port. When accepted by the
target host, this packet causes a loop within the operating system,
essentially locking up the system.
NesteaThis attack relies on an error in cal culating sizes during pac ket fragment
reassemb l y. In the reassembly routine of vulnerab l e systems, there was a
failure to account for the length of the IP header field. By sending carefully
crafted packets to a vulnerable system, it is possi bl e t o cr ash the target.
Medium
High
High
High
Medium
High
High
High
High
94McAfee Internet Secu rity 5.0
McAfee Firewall
AttackDescriptionRisk
Factor
NewtearA Denial of Service (DoS) att ac k th at usually causes computer s wi t h a
Windows NT-based op er at i ng system to crash. Although the attack is not
usually harmful to the computer itself, data from running applications will
most certainly be lost.
OshareA Denial of Service (DoS) att ack caused by sending a uni que packet
structur e to your compu t er. The results of these at t acks can vary fr om a
complete system crash, increased CPU loa d , o r mom entary delays,
depending upon your computer’s configuration. This will affect almost all
versions of Windows 98 and NT-based system s wi t h var yi ng degrees
based on the hardware involved.
Ping FloodThis attack involves sending very large number s of ICM P ECHO (PING)
requests to th e hos t u nd er at ta ck. Th is at t ack is pa rt ic ul ar l y ef f ect i ve whe n
the attacker has a faster ne t w or k connection than the victi m .
Ping of DeathWith this attack, a remote user ca n cause your system to reboot or panic
by sending it an oversized PIN G packet. This is done by send in g a
fragmented packet larg er th an 65536 bytes in length, ca using the remote
system to incorrectly process the packet. The result is that the remote
system will reboot or pan ic dur i ng processing.
Port ScanningWhile not an attack in and of itself, a port scan often indicates that an
attacker has begun look in g at your system for potential weaknesses. A
port scan consists of check i ng every TCP and/or UDP po rt to see what
services (and hence, what vulnerabilities) migh t be pr esent.
Saihyouse nThe Saihyousen at t ack may cau s e som e f ire wa l ls to c ra sh . It is ca use d by
an attacker sending a stream of UDP packets.
SmurfThis attack is carried out by send ing an ICMP ECHO REQUES T (PIN G)
packet with a forged sour ce address matching that of th e ta rg et system.
This packet is sent to “amplifier” networks — networks that allow sending
packets to the broadcas t ad dr ess — so that every machin e on t he
amplifier network will res po nd t o w hat they think is a legitimate request
from the target. As a result, the target system is flooded with ICMP ECHO
REPLY messages, causing a denial of service attack.
SynDropOverlapping fragmented data sent by an attacker causes your computer to
become unstable and or crash. Unsaved data could be lost.
Syn FloodThis at t ack can be used to completely disable your network ser vices by
flooding them with connection requests. This will fill the queue which
maintains a list of unestabli sh ed i ncoming connections, fo rc in g it to be
unable to accept additio nal connections.
TeardropOn vulnerable systems , it is p oss ib l e to tak e advantage of a flaw in the
way the TCP/IP stack handles fragmented packet reassembly to consume
available memory res our ces. By sending a speciall y cr af t ed I P dat agram,
this attack can cause m any operating systems to han g or reboot.
High
High
High
High
Low
High
High
High
High
High
Product Guide95
McAfee Firewall
AttackDescriptionRisk
Factor
UDP FloodA remote denial of service attack designed to flood the target machine with
more data than it can proce ss, thereby preventing leg iti m at e connections
from being established.
Machine is inaccessible vi a TCP/ I P. Oc curs when machine is put to sleep
and then awakened.
Make sure that “Load Only When Needed” is not checked in the TCP/IP
control panel. Then TCP/IP is loaded all the time, allowing McAfee Firewall
to function while the machine is asleep.
WinnukeThis attack is a Denia l of Ser vi c e (D o S ) attack that completely disabl es
networking on many Win95 and WinNT machines. Although Winnuke will
not neces sari ly dama ge y our comp uter , yo u may los e an y uns ave d dat a a t
the time of the attack. Restar t in g your computer should re st or e fu ll
operation.
High
High
96McAfee Internet Secu rity 5.0
McAfee Internet Security’s Shared
Features
QuickClean Lite
Clean your computer with QuickClean Lite
QuickClean Lite enables you to clean your computer of unnecessary files and
free valuable hard disk space.
You can use the QuickClean Lite wizard to perform any of the following
cleaning tasks:
nClean your Recycle Bin.
nRemove files that accumulate as you browse the Internet. Files of this
type are stored in folders called Temporary Internet or Cache folders.
nRemove Shortcu ts without an associated program, application,
hypertext link, etc.
nDelete lost file fragments.
nDelete Windows Registry information, shortcuts, and system file
references for applications that no longer exist on your computer.
nDelete temporary files.
6
nRemove deleted and sent messages from a Microsoft supported e-mail
client (i.e.: Outlook, Outlook Express).
nDelete Most Recently Used shortcuts.
nUse McAfee Shredder to securely shred the items you want to remove
from your computer.
How QuickClean Lite works
First, you select the types of files you wish to remove from your computer. A
wizard guides you through this process. Next, the QuickClean Lite wizard
scans the contents of your hard disk and identifies all files meeting your
pre-selected criteria.
The user proceeds with the cleaning task if they are satisfied with the results
of the scan. Finally, QuickClean Lite provides a graphic representation of the
amount of reclaimed space after deleting the files.
Product Guide97
McAfee Internet Security’s Shared Features
WARNING
Deleted files are not backed up. You cannot restore files deleted by
QuickClean Lite.
How to start QuickClean Lite
There are two methods you can use to start the QuickClean Lite wizard.
1From any VirusScan Professional screen click the “Other tasks” Task,
and select Start QuickClean Lite.
2From the Windows task bar click the Start button, point to Programs >
McAfee > McAfee Shared Features and click QuickClean Lite.
If you need help...
For additional information about using QuickClean Lite refer to online Help.
You can access online Help for QuickClean Lite by clicking Help on any
QuickClean Lite window.
98McAfee Internet Secu rity 5.0
McAfee Shredder
Securely delete files using McAfee Shredder
When you save a file in Windows, it is stored in multiple pieces (in clusters
made up of multiple sectors) on the disk. Windows also saves a road map, or
index, that points to these clusters in two copies of the FAT (File Allocation
Table). The FAT contains the directions to all the pieces of your files, so that
applications can find them again later.
In addition to FAT file systems, McAfee Shredder supports New Technology
Filing System (NTFS). NTFS is the file system used by Windows NT, Windows
2000 and Windows XP.
When you delete a file, all the information stored in that file is not actually
erased from your disk. Instead, Windows simply frees the clusters where the
file was stored, making those locations available in the FAT. Thereafter,
applications can write new information to those clusters. This means that all
or part of your files can be reconstructed even after you delete them. Undelete
programs can reconstruct a deleted file very easily, especially immediately
after you delete the file and before you save any new information that might
be written over the deleted file’s contents.
For privacy and security reasons, you may want to be positive that the
information stored in files you delete is permanently erased from your
computer. McAfee Shredder does this for you by “security wiping” deleted
files so they cannot be restored or rebuilt using undelete utilities. Unlike other
file security erase programs, McAfee Shredder erases even the filename and
the compressed data on DriveSpace drives. Note that it is not possible to shred
network files, or files compressed with compression other than DriveSpace in
an absolutely secure manner.
McAfee Internet Security’s Shared Features
TIP
You can select McAfee Shredder properties to specify the
shredding level to perform. You can select: Quick to shred the
information once; U.S. Government Multipass to make seven
passes of repeatedly erasing the data; or Custom to indicate how
many passes to make which allows up to 99 passes.
Shredder is easy to use!
You can shred files using drag and drop, which is a fast way if all the files are
centrally located. If the files are in several places, you can shred them by
starting McAfee Shredder and selecting the files to erase. A wizard guid es you
through the process.
Product Guide99
McAfee Internet Security’s Shared Features
McAfee Shredder allows you to shred files on your PC’s Recycle Bin,
Temporary Internet, as well as Web site history folder. You can a lso specify the
number of shredding passes (1-99) and can now have the option to shred an
entire drive.
TIP
If your computer is running on Windows Me, some files even if
shred, may be retained on your PC since these are protected b y the
Windows Me System Restore.
Refer to the online Help file to display step-by-step instructions on how to
shred selected files and non-file data.
WARNING
After you shred non-file data, you will not be able to undelete any
deleted files that utilized this information.
100McAfee Internet Security 5.0
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.