ACTIVE FIREWALL, ACTIVE SECURITY, ACTIVESECURITY (AND IN KATAKANA), ACTIVESHIELD, ANTIVIRUS ANYWARE AND DESIGN, CLEAN-UP,
DESIGN (STYLIZED E), DESIGN (STYLIZED N), ENTERCEPT, ENTERPRISE SECURECAST, ENTERPRISE SECURECAST (AND IN KATAKANA), EPOLICY
ORCHESTRATOR, FIRST AID, FORCEFIELD, GMT, GROUPSHIELD, GROUPSHIELD (AND IN KATAKANA), GUARD DOG, HOMEGUARD, HUNTER,
INTRUSHIELD, INTRUSION PREVENTION THROUGH INNOVATION, M AND DESIGN, MCAFEE, MCAFEE (AND IN KATAKANA), MCAFEE AND DESIGN,
MCAFEE.COM, MCAFEE VIRUSSCAN, NA NETWORK ASSOCIATES, NET TOOLS, NET TOOLS (AND IN KATAKANA), NETCRYPTO, NETOCTOPUS,
NETSCAN, NETSHIELD, NETWORK ASSOCIATES, NETWORK ASSOCIATES COLLISEUM, NETXRAY, NOTESGUARD, NUTS & BOLTS, OIL CHANGE, PC
MEDIC, PCNOTARY, PRIMESUPPORT, RINGFENCE, ROUTER PM, SECURECAST, SECURESELECT, SPAMKILLER, STALKER, THREATSCAN, TIS, TMEG,
TOTAL VIRUS DEFENSE, TRUSTED MAIL, UNINSTALLER, VIREX, VIRUS FORUM, VIRUSCAN, VIRUSSCAN, VIRUSSCAN (AND IN KATAKANA),
WEBSCAN, WEBSHIELD, WEBSHIELD (AND IN KATAKANA), WEBSTALKER, WEBWALL, WHAT'S THE STATE OF YOUR IDS?, WHO'S WATCHING YOUR
NETWORK, YOUR E-BUSINESS DEFENDER, YOUR NETWORK. OUR BUSINESS. are registered trademarks or trademarks of McAfee, Inc. and/or its affiliates in
the US and/or other countries. Red in connection with security is distinctive of McAfee brand products. All other registered and unregistered trademarks herein
are the sole property of their respective owners.
LICENSE INFORMATION
License Agreement
NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, WHICH
SETS FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH TYPE OF LICENSE
YOU HAVE ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT
ACCOMPANIES YOUR SOFTWARE PACKAGING OR THAT YOU HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET, A FILE
ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEB SITE FROM WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF YOU DO NOT
AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT
TO MCAFEE OR THE PLACE OF PURCHASE FOR A FULL REFUND.
Attributions
This product includes or may include:
Software developed by the OpenSSL Project for use in the OpenSSL To olkit (http://www.openssl.org/). Cryptographic software written by Eric A. Young and
3. Locate your product in the list, and
click the download icon.
User Guideiii
Quick Start Card
For more information
To view the User Guides on the product CD,
ensure that you have Acrobat Reader installed; if
not, install it now from the McAfee product CD.
1Insert your product CD into your CD-ROM
drive.
2Open Windows Explorer: Click Start on
your Windows desktop, and click
3Locate the Manuals folder, and double- click
the User Guide .
PDF you want to open.
Search.
Registration benefits
McAfee recommends that you follow the easy
steps within your product to transmit your
registration directly to us. Registration ensures
that you receive timely and knowledgeable
technical assistance, plus the following benefits:
FREE electronic support
Virus definition (.DAT) file updates for one
year after installation when you purchase
VirusScan software
Go to http://www.mcafee.com/ for pricing
of an additional year of virus signatures.
60-day warranty that guarantees
replacement of your software CD if it is
defective or damaged
SpamKiller filter updates for one year after
installation when you purchase SpamKiller
software
Go to http://www.mcafee.com/ for pricing
of an additional year of filter updates.
McAfee Internet Security Suite updates for
one year after installation when you
purchase MIS software
Go to http://www.mcafee.com/ for pricing
of an additional year of content updates.
Technical Support
For technical support, please visit
http://www.mcafeehelp.com/.
Our support site offers 24-hour access to the
easy-to-use Answer Wizard for solutions to the
most common support questions.
Knowledgeable users can also try our advanced
options, which include a Keyword Search and our
Help Tree. If a solution cannot be found, you can
also access our FREE Chat Now! and E-mail
Express! options. Chat and e-mail help you to
quickly reach our qualified support engineers
through the Internet, at no cost. Otherwise, you
can get phone support information at
The Internet provides a wealth of information and entertainment at your
fingertips. However, as soon as you connect, your computer is exposed to a
multitude of privacy and security threats. Protect your privacy and secure your
computer and data with McAfee Internet Security
award-winning technologies, Internet Security Suite is one of the most
comprehensive sets of privacy and security tools available. McAfee Internet
Security Suite destroys viruses, outwits hackers, secures your personal
information, privatizes your Web browsing, blocks ads and pop-ups, manages
your cookies and passwords, locks down your files, folders and drives, filters
objectionable content, and puts you in control of your computer’s incoming and
outgoing Internet connections.
McAfee Internet Security Suite is a proven security solu tion that provides
powerful protection for today's Internet users.
McAfee Internet Security Suite comprises the following products:
1
Suite. Incorporating McAfee's
McAfee VirusScanon page 17
McAfee Personal Firewall Plus on page 49
McAfee Privacy Serviceon page 81
McAfee SpamKilleron page 103
User Guide11
Introduction
McAfee Internet Security software
McAfee SecurityCenter — Assesses, informs, and warns you about your
computer’s security vulnerability. Each security index quickly evaluates your
exposure to security and Internet-based threats, and then provides
recommendations to quickly and securely protect your computer.
McAfee VirusScan — Scans, detects, fixes, and removes Internet viruses. You can
customize virus scans and determine the response and action when a virus is
detected. You can also configure VirusScan to log virus-related actions
performed on your computer.
McAfee Personal Firewall Plus — Protects your computer while it is connected to
the Internet, and secures your computer’s outgoing and incoming Internet
connections.
McAfee Privacy Service — Combines personal information protection, online
advertisement blocking, and content filtering. It secures your personal
information while providing greater control over your family's Internet
experience. McAfee's Privacy Service ensures that you do not expose
confidential information to online threats and protects you and your family
from inappropriate online content.
McAfee SpamKiller — The rise of fraudulent, inappropriate and offensive e-mail
to adults, children and businesses makes spam protection an essential
component of your computer’s security strategy.
System requirements
Microsoft
Personal computer with Pentium-compatible processor
Windows 98, 2000: 133 MHz or higher
Windows Me: 150 MHz or higher
Windows XP (Home and Pro): 300 MHz or higher
RAM
Windows 98, Me, 2000: 64 MB
Windows XP (Home and Pro): 128 MB
100 MB hard disk space
®
Windows 98, Me, 2000, or XP
Microsoft® Internet Explorer 5.5 or later
NOTE: To upgrade to the latest version of Internet Explorer, visit
12McAfee® Internet Security Suite®software
the Microsoft Web site at http://www.microsoft.com/.
Supported e-mail programs
POP3 (Outlook Express, Outlook, Eudora, Netscape)
MAPI (Outlook)
Web (MSN/Hotmail, or e-mail account with POP3 access)
Toolbar plug-in requirements
Outlook Express 6.0 or later
Outlook 98, 2000 with SP3, 2003, or XP
Internet Explorer 6.0 or later
Supported e-mail programs
Supported instant messaging programs
AOL Instant Messenger 2.1 or later
Yahoo Messenger 4.1 or later
Microsoft Windows Messenger 3.6 or later
MSN Messenger 6.0 or later
Using McAfee SecurityCenter
McAfee SecurityCenter is your one-stop security shop, accessible from its icon in
your Windows system tray or from your Windows desktop. With it, you can
perform these useful tasks:
Get free security analysis for your computer.
Launch, manage, and configure all your McAfee subscriptions from one icon.
See continuously updated virus alerts and the latest product information.
Get quick links to frequently asked questions and account details at the
McAfee web site.
NOTE
For more information about SecurityCenter features, click
Help in the SecurityCenter dialog box.
User Guide13
Introduction
While SecurityCenter is running and all of the McAfee features installed on your
computer are enabled, a red
M icon displays in the Windows system tray. This
area is usually in the lower-right corner of the Windows desktop and contains the
clock.
If one or more of the McAfee applications installed on your computer are disabled,
the McAfee icon changes to black .
To open McAfee SecurityCenter:
1Right-click the McAfee icon in the Windows system tray.
2Click Open SecurityCenter.
To access your McAfee product:
1Right-click the McAfee icon in the Windows system tray.
2Point to the appropriate McAfee product and select the feature you want to
use.
14McAfee® Internet Security Suite®software
Removing Internet Security Suite programs
Removing Internet Security Suite programs
In some situations, you might want to remove Internet Security Suite or some of its
programs.
NOTE
Users must have Administrator rights to uninstall Internet
Security Suite.
1Save all your work and close any open applications.
2Open Control Panel.
On your Windows taskbar, select Start, point to Settings, and then click
Control Panel (Windows 98, ME, and 2000).
On your Windows taskbar, select Start, and then click Control Panel
(Windows XP).
3Click Add/Remove Programs.
4Select the McAfee Uninstall Wizard, then one or more programs, and then click
Uninstall. To remove all the Internet Security products, click Select All, then
Uninstall.
5To proceed with the removal, click Yes.
6If prompted, restart your computer.
User Guide15
Introduction
16McAfee® Internet Security Suite®software
McAfee VirusScan
Welcome to McAfee VirusScan.
McAfee VirusScan is an anti-virus subscription service offering comprehensive,
reliable, and up-to-date virus protection. Powered by award-winning McAfee
scanning technology, VirusScan protects against viruses, worms, Trojan horses,
suspect scripts, hybrid attacks, and other threats.
With it, you get the following features:
ActiveShield — Scan files when they are accessed by either you or your computer.
Scan — Search for viruses and other threats in hard drives, floppy disks, and
individual files and folders.
Quarantine — Encrypt and temporarily isolate suspect files in the quarantine folder
until an appropriate action can be taken.
Hostile activity detection — Monitor your computer for virus-like activity caused by
worm-like activity and suspect scripts.
2
New features
This version of VirusScan provides the following new features:
Spyware and adware detection and removal
VirusScan identifies and removes spyware, adware, and other programs that
jeopardize your privacy and slow down your computer performance.
Daily automatic updates
Daily automatic VirusScan updates protect against the latest identified and
unidentified computer threats.
Fast background scanning
Fast unobtrusive scans identify and destroy viruses, Trojans, worms, spyware,
adware, dialers, and other threats without interrupting you r work.
Real-time security alerting
Security alerts notify you about emergency virus outbreaks and security
threats, and provide response options to remove, neutralize, or learn more
about the threat.
Detection and cleaning at multiple entry points
VirusScan monitors and cleans at your computer’s key entry points: e-mail,
instant message attachments, and Internet downloads.
User Guide17
McAfee VirusScan
E-mail monitoring for worm-like activity
WormStopper™ monitors suspect mass-mailing behaviors and stops viruses
and worms from spreading through e-mail to other computers.
Script monitoring for worm-like activity
ScriptStopper™ monitors suspect script executions and stops viruses and
worms from spreading through e-mail to other computers.
Free instant messaging and e-mail technical support
Live technical support provides prompt, easy assistance using instant
messaging and e-mail.
18McAfee® Internet Security Suite®software
Testing VirusScan
Before initial use of VirusScan, it’s a good idea to test your installation. Use the
following steps to separately test the ActiveShield and Scan features.
Testing ActiveShield
NOTE
To test ActiveShield from the VirusScan tab in SecurityCenter,
click
Test VirusScan to view an online Support FAQ
containing these steps.
To test ActiveShield:
1Go to http://www.eicar.com/ in your web browser.
2Click the The AntiVirus testfile eicar.com link.
3Scroll to the bottom of the page. Under Download, you will see four links.
4Click eicar.com.
Testing VirusScan
If ActiveShield is working properly, it detects the eicar.com file immediately after
you click the link. You can try to delete or quarantine detected files to see how
ActiveShield handles possible threats. See Understanding security alertson page 32
for details.
Testing Scan
Before you can test Scan, you must disable ActiveShield to prevent it from
detecting the test files before Scan does, then download the test files.
To download the test files:
1Disable ActiveShield: Right-click the McAfee icon, point to VirusScan, then
2Download the EICAR test files from the EICAR web site:
click
Disable.
aGo to http://www.eicar.com/.
bClick the The AntiVirus testfile eicar.com link.
User Guide19
McAfee VirusScan
Scroll to the bottom of the page. Under Download, you will see these links:
c
eicar.com contains a line of text that VirusScan will detect as a virus.
eicar.com.txt (optional) is the same file, but with a different file name, for
those users who have difficulty downloading the first link. Simply
rename the file “eicar.com” after you download it.
eicar_com.zip is a copy of the test virus inside a .ZIP compressed file (a
WinZip
eicarcom2.zip is a copy of the test virus inside a .ZIP compressed file,
which itself is inside a .
dClick each link to download its file. For each one, a File Download dialog
™
file archive).
ZIP compressed file.
box appears.
eClick Save, click the Create New Folder button, then rename the folder VSO
Scan Folder
fDouble-click VSO Scan Folder, then click Save again in each Save As dialog
.
box.
3When you are finished downloading the files, close Internet Explorer.
4Enable ActiveShield: Right-click the McAfee icon, point to VirusScan, then
Enable.
click
To test Scan:
1Right-click the McAfee icon, point to VirusScan, then click Scan.
2Using the directory tree in the left pane of the dialog box, go to the VSO Scan
Folder
aClick the + sign next to the C drive icon.
bClick the VSO Scan Folder to highlight it (do not click the + sign next to it).
where you saved the files:
This tells Scan to check only that folder. You can also put the files in
random locations on your hard drive for a more convincing demonstration
of Scan’s abilities.
3In the Scan Options area of the Scan dialog box, ensure that all options are
selected.
4Click Scan on the lower right of the dialog box.
VirusScan scans the
that folder appear in the
You can try to delete or quarantine detected files to see how Scan handles possible
threats. See Understanding threat detectionson page 40 for details.
20McAfee® Internet Security Suite®software
VSO Scan Folder. The EICAR test files that you saved to
List of Detected Files. If so, Scan is working properly.
Using McAfee SecurityCenter
McAfee SecurityCenter is your one-stop security shop, accessible from its icon in
your Windows system tray or from your Windows desktop. With it, you can
perform these useful tasks:
Get free security analysis for your computer.
Launch, manage, and configure all your McAfee subscriptions from one icon.
See continuously updated virus alerts and the latest product information.
Get quick links to frequently asked questions and account details at the
McAfee web site.
NOTE
For more information about its features, click Help in the
SecurityCenter dialog box.
While SecurityCenter is running and all of the McAfee features installed on your
computer are enabled, a red M icon appears in the Windows system tray. This
area is usually in the lower-right corner of the Windows desktop and contains the
clock.
Using McAfee SecurityCenter
If one or more of the McAfee applications installed on your computer are disabled,
the McAfee icon changes to black .
To open the McAfee SecurityCenter:
1Right-click the McAfee icon .
2Click Open SecurityCenter.
To access a VirusScan feature:
1Right-click the McAfee icon .
2Point to VirusScan, then click the feature you want to use.
Using ActiveShield
When ActiveShield is started (loaded into computer memory) and enabled, it is
constantly protecting your computer. ActiveShield scans files when they are
accessed by either you or your computer. When ActiveShield detects a file, it
automatically tries to clean it. If ActiveShield cannot clean the virus, you can
quarantine or delete the file.
Enabling or disabling ActiveShield
ActiveShield is started (loaded into computer memory) and enabled (denoted by
the red icon in your Windows system tray) by default as soon as you restart
your computer after the installation process.
User Guide21
McAfee VirusScan
If ActiveShield is stopped (not loaded) or is disabled (denoted by the black
icon), you can manually run it, as well as configure it to start automatically when
Windows starts.
Enabling ActiveShield
To enable ActiveShield for this Windows session only:
Right-click the McAfee icon, point to VirusScan, then click Enable. The McAfee icon
changes to red .
If ActiveShield is still configured to start when Windows starts, a message tells you
that you are now protected from threats. Otherwise, a dialog box appears that lets
you configure ActiveShield to start when Windows starts (Figure 2-1 on page 23).
22McAfee® Internet Security Suite®software
Disabling ActiveShield
To disable ActiveShield for this Windows session only:
1Right-click the McAfee icon, point to VirusScan, then click Disable.
2Click Yes to confirm.
The McAfee icon changes to black .
If ActiveShield is still configured to start when Windows starts, your computer
will be protected from threats again when you restart your computer.
Configuring ActiveShield options
You can modify ActiveShield starting and scanning options in the ActiveShield tab
of the
McAfee icon in your Windows system tray.
VirusScan Options dialog box (Figure 2-1), which is accessible via the
Using ActiveShield
Starting ActiveShield
ActiveShield is started (loaded into computer memory) and enabled (denoted by
red ) by default as soon as you restart your computer after the installation
process.
If ActiveShield is stopped (denoted by black ), you can configure it to start
automatically when Windows starts (recommended).
Figure 2-1. ActiveShield Options
User Guide23
McAfee VirusScan
NOTE
During updates to VirusScan, the Update Wizard might exit
ActiveShield temporarily to install new files. When the
Wizard
prompts you to click Finish, ActiveShield starts again.
Update
To start ActiveShield automatically when Windows starts:
1Right-click the McAfee icon, point to VirusScan, then click Options.
The
VirusScan Options dialog box opens (Figure 2-1 on page 23).
2Select the Start ActiveShield when Windows starts (recommended) checkbox,
then click
3Click OK to confirm, then click OK.
Apply to save your changes.
Stopping ActiveShield
WARNING
If you stop ActiveShield, your computer is not protected from
threats. If you must stop ActiveShield, other than for updating
VirusScan, ensure that you are not connected to the Internet.
To stop ActiveShield from starting when Windows starts:
1Right-click the McAfee icon, point to VirusScan, then click Options.
The
VirusScan Options dialog box opens (Figure 2-1 on page 23).
2Deselect the Start ActiveShield when Windows starts (recommended) checkbox,
then click
3Click OK to confirm, then click OK.
Apply to save your changes.
Scanning e-mail and attachments
By default, e-mail scanning and automatic cleaning are enabled via the Scan e-mail
and attachments
When this option is enabled, ActiveShield automatically scans and attempts to
clean inbound (POP3) and outbound (SMTP) detected e-mail messages and
attachments for most popular e-mail clients, including the following:
Microsoft Outlook Express 4.0 or later
Microsoft Outlook 97 or later
Netscape Messenger 4.0 or later
option (Figure 2-1 on page 23).
Netscape Mail 6.0 or later
Eudora Light 3.0 or later
Eudora Pro 4.0 or later
Eudora 5.0 or later
24McAfee® Internet Security Suite®software
Pegasus 4.0 or later
NOTE
E-mail scanning is not supported for these e-mail clients:
Web-based, IMAP, AOL, POP3 SSL, and Lotus Notes.
However, ActiveShield scans e-mail attachments when they
are opened.
Using ActiveShield
If you disable the
Scan e-mail and attachments option, the
E-mail Scan options and the WormStopper options (Figure 2-1
on page 26) are automatically disabled. If you disable
outbound e-mail scanning, the WormStopper options are
automatically disabled.
If you change your e-mail scanning options, you must restart
your e-mail program to complete the changes.
Inbound e-mail
If an inbound e-mail message or attachment is detected, ActiveShield performs the
following steps:
Tries to clean the detected e-mail
Tries to quarantine or delete an uncleanable e-mail
Includes an alert file in the inbound e-mail that contains information about the
actions performed to remove the possible threat
Outbound e-mail
If an outbound e-mail message or attachment is detected, ActiveShield performs
the following steps:
Tries to clean the detected e-mail
Tries to quarantine or delete an uncleanable e-mail
NOTE
For details about outbound e-mail scanning errors, see the
online help.
Disabling e-mail scanning
By default, ActiveShield scans both inbound and outbound e-mail. However, for
enhanced control, you can set ActiveShield to scan only inbound or outbound
e-mail.
To disable scanning of inbound or outbound e-mail:
1Right-click the McAfee icon, point to VirusScan, and then click Options.
2Click Advanced, then click the E-mail Scan tab (Figure 2-1).
3Deselect Inbound e-mail messages or Outbound e-mail messages, then click OK.
VirusScan monitors your computer for suspect activity that might indicate a threat
is present on your computer. While VirusScan cleans viruses and other threats,
WormStopper
A computer “worm” is a self-replicating virus that resides in active memory and
might send copies of itself through e-mail. Without WormStopper, you might
notice worms only when their uncontrolled replication consumes system
resources, slowing performance or halting tasks.
The WormStopper protection mechanism detects, alerts, and blocks suspect
activity. Suspect activity might include the following actions on you r computer:
An attempt to forward e-mail to a large portion of your address book
Attempts to forward multiple e-mail messages in rapid succession
If you set ActiveShield to use the default
option in the
for suspect patterns and alerts you when a specified number of e-mails or
recipients has been exceeded within a specified interval.
TM
prevents viruses and worms from spreading further.
Enable WormStopper (recommended)
Advanced Options dialog box, WormStoppe r monitors e-mail activity
To set ActiveShield to scan sent e-mail messages for worm-like activity:
1Right-click the McAfee icon, point to VirusScan, then click Options.
2Click Advanced, then click the E-mail tab.
By default, the following detailed options are enabled:
Pattern matching to detect suspect activity
Alerting when e-mail is sent to 40 or more recipients
Alerting when 5 or more e-mails are sent within 30 seconds
NOTE
If you modify the number of recipients or seconds for
monitoring sent e-mails, it might result in invalid detections.
McAfee recommends that you click
setting. Otherwise, click
Yes to change the default setting to
No to retain the default
your setting.
This option can be automatically enabled after the first time a potential worm
is detected (see Managing potential wormson page 33 for details):
By default, scanning of instant message attachments is enabled via the Scan
inbound instant message attachments
When this option is enabled, VirusScan automatically scans and attempts to clean
inbound detected instant message attachments for most popular instant
messaging programs, including the following:
MSN Messenger 6.0 or later
Yahoo Messenger 4.1 or later
AOL Instant Messenger 2.1 or later
NOTE
For your protection, you cannot disable auto-cleaning of
instant message attachments.
If an inbound instant message attachment is detected, VirusScan performs the
following steps:
Tries to clean the detected message
option (Figure 2-1 on page 23).
Prompts you to quarantine or delete an uncleanable message
Scanning all files
If you set ActiveShield to use the default All files (recommended) option, it scans
every file type that your computer uses, as your computer attempts to use it. Use
this option to get the most thorough scan possible.
To set ActiveShield to scan all file types:
1Right-click the McAfee icon, point to VirusScan, and then click Options.
2Click Advanced, then click the Scanning tab (Figure 2-3 on page 29).
3Click All files (recommended), then click OK.
If you set ActiveShield to use the Program files and documents only option, it scans
program files and documents, but not any other files used by your computer. The
latest virus signature file (
DAT file) determines which file types that ActiveShield
will scan.To set ActiveShield to scan program files and documents only:
1Right-click the McAfee icon, point to VirusScan, and then click Options.
2Click Advanced, then click the Scanning tab (Figure 2-3).
3Click Program files and documents only, then click OK.
Scanning for new unknown viruses
If you set ActiveShield to use the default Scan for new unknown viruses
(recommended)
to the signatures of known viruses, while also looking for telltale signs of
unidentified viruses in the files.
To set ActiveShield to scan for new unknown viruses:
option, it uses advanced heuristic techniques that try to match files
1Right-click the McAfee icon, point to VirusScan, and then click Options.
2Click Advanced, then click the Scanning tab (Figure 2-3).
3Click Scan for new unknown viruses (recommended), then click OK.
User Guide29
McAfee VirusScan
Scanning for scripts
VirusScan monitors your computer for suspect activity that might indicate a threat
is present on your computer. While VirusScan cleans viruses and other threats,
ScriptStopperTM prevents Trojan horses from running scripts that spread viruses
further.
A “Trojan horse” is a suspect program that pretends to be a benign application.
Trojans are not viruses because they do not replicate, but they can be just as
destructive.
The ScriptStopper protection mechanism detects, alerts, and blocks suspect
activity. Suspect activity might include the following action on your computer:
A script execution that results in the creation, copying, or deletion of files, or
the opening of your Windows registry
If you set ActiveShield to use the default
option in the
execution for suspect patterns and alerts you when a specified number of e-mails
or recipients has been exceeded within a specified interval.
To set ActiveShield to scan running scripts for worm-like activity:
1Right-click the McAfee icon, point to VirusScan, then click Options.
2Click Advanced, then click the Exploits tab (Figure 2-4).
3Click Enable ScriptStopper (recommended), then click OK.
If McAfee AntiSpyware is installed on your computer, it
manages all Potentially Unwanted Program activity. Open
McAfee AntiSpyware to configure your options.
If you set ActiveShield to use the default
(recommended)
option in the Advanced Options dialog box, Potentially Unwanted
Scan Potentially Unwanted Programs
Program (PUP) protection quickly detects, blocks, and removes spyware, adware,
and other programs that gather and transmit your private data without your
permission.
To set ActiveShield to scan for PUPs:
1Right-click the McAfee icon, point to VirusScan, and then click Options.
2Click Advanced, then click the PUPs tab (Figure 2-5).
3Click Scan Potentially Unwanted Programs (recommended), then click OK.
If ActiveShield finds a virus, a virus alert similar to Figure 2-6 appears. For most
viruses, Trojan horses, and worms, ActiveShield automatically tries to clean the
file and alerts you. For Potentially Unwanted Programs (PUPs), ActiveShield
detects the file, automatically blocks it, and alerts you.
Figure 2-6. Virus alert
You can then choose how to manage detected files, detected e-mail, suspect scripts,
potential worms, or PUPs, including whether to submit detected files to the
McAfee AVERT labs for research.
For added protection, whenever ActiveShield detects a suspect file, you are
prompted to scan your entire computer immediately. Unless you choose to hide
the scan prompt, it will periodically remind you until you perform the scan.
Managing detected files
1If ActiveShield can clean the file, you can learn more or ignore the alert:
Click Find out more information to view the name, location, and virus name
associated with the detected file.
Click Continue what I was doing to ignore the alert and close it.
2If ActiveShield cannot clean the file, click Quarantine the detected file to encrypt
and temporarily isolate suspect files in the quarantine directory until an
appropriate action can be taken.
A confirmation message appears and prompts you to check your computer for
threats. Click
Scan to complete the quarantine process.
3If ActiveShield cannot quarantine the file, click Delete the detected file to try to
remove the file.
32McAfee® Internet Security Suite®software
Using ActiveShield
Managing detected e-mail
By default, e-mail scanning automatically tries to clean detected e-mail. An alert
file included in the inbound message notifies you whether the e-mail was cleaned,
quarantined, or deleted.
Managing suspect scripts
If ActiveShield detects a suspect script, you can find out more and then stop the
script if you did not intend to initiate it:
Click Find out more information to view the name, location, and description
of the activity associated with the suspect script.
Click Stop this script to prevent the suspect script from running.
If you are sure that you trust the script, you can allow the script to run:
Click Allow this script this time to let all scripts contained within a single file
run once.
Click Continue what I was doing to ignore the alert and let the script run.
Managing potential worms
If ActiveShield detects a potential worm, you can find out more and then stop the
e-mail activity if you did not intend to initiate it:
Click Find out more information to view the recipient list, subject line,
message body, and description of the suspect activity associated with the
detected e-mail message.
Click Stop this e-mail to prevent the suspect e-mail from being sent and
delete it from your message queue.
If you are sure that you trust the e-mail activity, click
ignore the alert and let the e-mail be sent.
Continue what I was doing to
User Guide33
McAfee VirusScan
Managing PUPs
If ActiveShield detects and blocks a Potentially Unwanted Program (PUP), you can
find out more and then remove the program if you did not intend to install it:
Click Find out more information to view the name, location, and
recommended action associated with the PUP.
Click Remove this PUP to remove the program if you did not intend to
install it.
A confirmation message appears.
- If (a) you do not recognize the PUP or (b) you did not install the PUP as
part of a bundle or accept a license agreement in connection with such
programs, click
method.
OK to remove the program using the McAfee removal
- Otherwise, click
Cancel to exit the automatic removal process. If you
change your mind later, you can manually remove the program using the
vendor’s uninstaller.
Click Continue what I was doing to ignore the alert and block the program
this time.
If you (a) recognize the PUP or (b) you might have installed the PUP as part of a
bundle or accepted a license agreement in connection with such programs, you can
allow it to run:
Click Trust this PUP to whitelist this program and always let it run in the
future.
See "Managing trusted PUPs" for details.
Managing trusted PUPs
The programs that you add to the Trusted PUPs list will not be detected by McAfee
VirusScan.
If a PUP is detected and added to the Trusted PUPs list, you can later remove it
from the list if necessary.
If your Trusted PUPs list is full, you must remove some items before you can trust
another PUP.
To remove a program from your Trusted PUPs list:
1Right-click the McAfee icon, point to VirusScan, and then click Options.
2Click Advanced, then click the PUPs tab.
3Click Edit Trusted PUPs List, select the checkbox in front of the file name, and
click
Remove. When you are finished removing items, click OK.
34McAfee® Internet Security Suite®software
Manually scanning your computer
Manually scanning your computer
The Scan feature lets you selectively search for viruses and other threats on hard
drives, floppy disks, and individual files and folders. When Scan finds a suspect
file, it automatically tries to clean the file, unless it is a Potentially Unwanted
Program. If Scan cannot clean the file, you can quarantine or delete the file.
Manually scanning for viruses and other threats
To scan your computer:
1Right-click the McAfee icon, point to VirusScan, then click Scan.
The
Scan dialog box opens (Figure 2-7).
2Click the drive, folder, or file that you want to scan.
3Select your Scan Options. By default, all of the Scan Options are pre-select ed to
provide the most thorough scan possible (Figure 2-7):
Scan subfolders — Use this option to scan files contained in your
subfolders. Deselect this checkbox to allow checking of only the files
visible when you open a folder or drive.
Figure 2-7. Scan dialog box
User Guide35
McAfee VirusScan
Example:
Scan subfolders checkbox. The folders and their contents are not scanned.
The files in Figure 2-8 are the only files scanned if you deselect the
To scan those folders and their contents, you must leave the checkbox
selected.
Figure 2-8. Local disk contents
Scan all files — Use this option to allow the thorough scanning of all file
types. Deselect this checkbox to shorten the scanning time and allow
checking of program files and documents only.
Scan within compressed files — Use this option to reveal hidden files
within .
checking of any files or compressed files within the compressed file.
Sometimes virus authors plant viruses in a .
into another .
detect these viruses as long as you leave this option selected.
ZIP and other compressed files. Deselect this checkbox to prevent
ZIP file, then insert that .ZIP file
ZIP file in an effort to bypass anti-virus scanners. Scan can
Scan for new unknown viruses — Use this option to find the newest viruses
that might not have existing “cures.” This option uses advanced heuristic
techniques that try to match files to the signatures of known viruses, while
also looking for telltale signs of unidentified viruses in the files.
This scanning method also looks for file traits that can generally rule out
that the file contains a virus. This minimizes the chances that Scan gives a
false indication. Nevertheless, if a heuristic scan detects a virus, you should
treat it with the same caution that you would treat a file that you know
contains a virus.
This option provides the most thorough scan, but is generally slower than
a normal scan.
36McAfee® Internet Security Suite®software
Manually scanning your computer
Scan for Potentially Unwanted Programs — Use this option to detect
spyware, adware, and other programs that gather and transmit your
private data without your permission.
NOTE
Leave all options selected for the most thorough scan possible.
This effectively scans every file in the drive or folder that you
select, so allow plenty of time for the scan to complete. The
larger the hard drive and the more files you have, the longer
the scan takes.
4Click Scan to start scanning files.
When the scan is finished, a scan summary shows the number of files scanned,
the number of files detected, the number of Pote ntially Unwanted Programs,
and the number of detected files that were automatically cleaned.
5Click OK to close the summary, and view the list of any detected files in the
Scan dialog box (Figure 2-9).
NOTE
Scan counts a compressed file (.ZIP, .CAB, etc.) as one file
within the
scanned can vary if you have deleted your temporary Internet
files since your last scan.
Figure 2-9. Scan results
Files Scanned number. Also, the number of files
User Guide37
McAfee VirusScan
If Scan finds no viruses or other threats, click Back to select another drive or
6
folder to scan, or click
Close to close the dialog box. Otherwise, see
Understanding threat detections on page 40.
Scanning via Windows Explorer
VirusScan provides a shortcut menu to scan selected files, folders, or drives for
viruses and other threats from within Windows Explorer.
To scan files in Windows Explorer:
1Open Windows Explorer.
2Right-click the drive, folder, or file that you want to scan, and then click Scan.
The
Scan dialog box opens and starts scanning files. By default, all of the
default
Scan Options are pre-selected to provide the most thorough scan
possible (Figure 2-7 on page 35).
Scanning via Microsoft Outlook
VirusScan provides a toolbar icon to scan for viruses and other threats in selected
message stores and their subfolders, mailbox folders, or e-mail messages
containing attachments from within Microsoft Outlook 97 or later.
To scan e-mail in Microsoft Outlook:
1Open Microsoft Outlook.
2Click the message store, folder, or e-mail message containing an attachment
that you want to scan, and then click the e-mail scanning toolbar icon .
The e-mail scanner opens and starts scanning files. By default, all of the default
Scan Options are pre-selected to provide the most thorough scan possible
(Figure 2-7 on page 35).
Automatically scanning for viruses and other threats
Although VirusScan scans files when they are accessed by either you or your
computer, you can schedule automatic scanning in Windows Scheduler to
thoroughly check your computer for viruses and other threats at specified
intervals.
To schedule a scan:
1Right-click the McAfee icon, point to VirusScan, then click Options.
The
VirusScan Options dialog box opens.
2Click the Scheduled Scan tab (Figure 2-10 on page 39).
38McAfee® Internet Security Suite®software
Manually scanning your computer
Figure 2-10. Scheduled Scan Options
3
Select the Scan My Computer at a scheduled time checkbox to en able automatic
scanning.
4Specify a schedule for automatic scanning:
To accept the default schedule (8PM every Friday), click OK.
To edit the schedule:
a. Click
b. Select how often to scan your computer in the
then select additional options in the dynamic area below it:
Daily - Specify the number of days between scans.
Weekly (the default) - Specify the number of weeks between scans as well
as the names of the day(s) of the week.
Monthly - Specify which day of the month to scan. Click Select Months to
specify which months to scan, and click
Edit.
Schedule Task list, and
OK.
Once - Specify which date to scan.
User Guide39
McAfee VirusScan
NOTE
These options in Windows Scheduler are not supported:
At system startup, When idle, and Show multiple schedules. The
last supported schedule remains enabled until you select from
among the valid options.
c. Select the time of day to scan your computer in the
d. To select advanced options, click Advanced.
The
Advanced Schedule Options dialog box opens.
i. Specify a start date, end date, duration, end time, and whether to stop
the task at the specified time if the scan is still running.
ii. Click
click
5Click OK to save your changes and close the dialog box. Otherwise, click
Cancel.
6To revert to the default schedule, click Set to Default. Otherwise, click OK.
OK to save your changes and close the dialog box. Otherwise,
Cancel.
Understanding threat detections
For most viruses, Trojans, and worms, Scan automatically tries to clean the file.
You can then choose how to manage detected files, including whether to submit
them to the McAfee AVERT labs for research. If Scan detect s a pote nt ially
unwanted program, you can manually try to clean, quarantine, or delete it
(AVERT submission is unavailable).
Start time box.
To manage a virus or potentially unwanted program:
1If a file appears in the List of Detected Files, click the checkbox in front of the
file to select it.
NOTE
If more than one file appears in the list, you can select the
checkbox in front of the
File Name list to perform the same
action on all of the files. You can also click the file name in the
Scan Information list to view details from the Virus
Information Library.
2If the file is a Potentially Unwanted Program, you can click Clean to try to clean
it.
3If Scan cannot clean the file, you can click Quarantine to encrypt and
temporarily isolate suspect files in the quarantine directory until an
appropriate action can be taken. (See Managing quarantined fileson page 41 for
details.)
40McAfee® Internet Security Suite®software
If Scan cannot clean or quarantine the file, you can do either of the following:
4
Click Delete to remove the file.
Click Cancel to close the dialog box without taking any further action.
If Scan cannot clean or delete the detected file, consult the Virus Information
Library at http://us.mcafee.com/virusInfo/default.asp for instructions on
manually deleting the file.
If a detected file prevents you from using your Internet connection or from using
your computer at all, try using a Rescue Disk to start your computer. The Rescue
Disk, in many cases, can start a computer if a detected file disables it. See Creating
a Rescue Disk on page 43 for details.
For more help, consult McAfee Customer Support at http://www.mcafeehelp.com/.
Managing quarantined files
The Quarantine feature encrypts and temporarily isolates suspect files in the
quarantine directory until an appropriate action can be taken. Once cleaned, a
quarantined file can then be restored to its original location.
Managing quarantined files
To manage a quarantined file:
1Right-click the McAfee icon, point to VirusScan, then click Manage Quarantined
.
Files
A list of quarantined files appears (Figure 2-11).
Figure 2-11. Manage Quarantined Files dialog box
User Guide41
McAfee VirusScan
Select the checkbox next to the file(s) you want to clean.
2
NOTE
If more than one file appears in the list, you can select the
checkbox in front of the
File Name list to perform the same
action on all of the files. You can also click the virus name in
Status list to view details from the Virus Information
the
Library.
Or, click
click
3Click Clean.
4If the file is cleaned, click Restore to move it back to its original location.
5If VirusScan cannot cl ean the virus, click Delete to remove the file.
6If VirusScan cannot cl ean or delete the file, and if it is not a Potentially
Add, select a suspect file to add to the quarantine list,
Open, then select it in the quarantine list.
Unwanted Program, you can submit the file to the McAfee AntiVirus
TM
Emergency Response Team (AVERT
aUpdate your virus signature files if they are more than two weeks old.
bVerify your subscription.
cSelect the file and click Submit to submit the file to AVERT.
) for research:
VirusScan sends the quarantined file as an attachment with an e-mail
message containing your e-mail address, country, software version, OS,
and the file’s original name and location. The maximum submission size is
one unique 1.5-
7Click Cancel to close the dialog box without taking any further action.
MB file per day.
42McAfee® Internet Security Suite®software
Creating a Rescue Disk
Rescue Disk is a utility that creates a bootable floppy disk that you can use to start
your computer and scan it for viruses if a virus keeps you from starting it normally.
NOTE
You must be connected to the Internet to download the Rescue
Disk image. Also, Rescue Disk is available for computers with
FAT (FAT 16 and FAT 32) hard drive partitions only. It is
unnecessary for NTFS partitions.
To create a Rescue Disk:
1On a non-infected computer, insert a non-infected floppy disk in drive A. You
might want to use Scan to ensure that both the computer and the floppy disk
are virus-free. (See Manually scanning for viruses and other threatson page 35 for
details.)
2Right-click the McAfee icon, point to VirusScan, then click Create Rescue Disk.
The
Create a Rescue Disk dialog box opens (Figure 2-12).
Creating a Rescue Disk
3Click Create to create the Rescue Disk.
If this is your first time creating a Rescue Disk, a message tells you that Rescue
Disk needs to download the image file for the Rescue Disk. Click
download the component now, or click
A warning message tells you that the contents of the floppy disk will be lost.
4Click Yes to continue creating the Rescue Disk.
The creation status appears in the
Figure 2-12. Create a Rescue Disk dialog box
OK to
Cancel to download it later.
Create Rescue Disk dialog box.
User Guide43
McAfee VirusScan
When the message “Rescue disk created” appears, click OK, then close the
5
Create Rescue Disk dialog box.
6Remove the Rescue Disk from the drive, write-protect it, and store it in a safe
location.
Write-protecting a Rescue Disk
To write-protect a Rescue Disk:
1Turn the floppy disk label-side down (the metal circle should be visible).
2Locate the write-protect tab. Slide the tab so the hole is visible.
Using a Rescue Disk
To use a Rescue Disk:
1Turn off the infected computer.
2Insert the Rescue Disk into the drive.
3Turn the computer on.
A gray window with several options appears.
4Choose the option that best suits your needs by pressing the Function keys (for
example, F2, F3).
NOTE
Rescue Disk starts automatically in 60 seconds if you do not
press any of the keys.
Updating a Rescue Disk
It is a good idea to update your Rescue Disk regularly. To update your Rescue
Disk, follow the same instructions for creating a new Rescue Disk.
Automatically reporting viruses
You can anonymously send virus tracking information for inclusion in our World
Virus Map. Automatically opt-in for this free, secure feature either during
VirusScan installation (in the
Virus Map Reporting tab of the VirusScan Options dialog box.
Virus Map Reporting dialog box), or at any time in the
44McAfee® Internet Security Suite®software
Reporting to the World Virus Map
To automatically report virus information to the World Virus Map:
1Right-click the McAfee icon, point to VirusScan, then click Options.
The
VirusScan Options dialog box opens.
2Click the Virus Map Reporting tab (Figure 2-13).
Automatically reporting viruses
Figure 2-13. Virus Map Reporting Options
3Accept the default Yes, I want to participate to anonymously send your virus
information to McAfee for inclusion in its World Virus Map of worldwide
detection rates. Otherwise, select
No, I don’t want to participate to avoid sending
your information.
4If you are in the United States, select the state and enter the zip code where
your computer is located. Otherwise, VirusScan automatically tries to select
the country where your computer is located.
5Click OK.
User Guide45
McAfee VirusScan
Viewing the World Virus Map
Whether or not you participate in the World Virus Map, you can view the latest
worldwide detection rates via the McAfee icon in your Windows system tray.
To view the World Virus Map:
Right-click the McAfee icon, point to VirusScan, then click World Virus Map.
The
World Virus Map web page appears (Figure 2-14).
By default, the World Virus Map shows the number of detected computers
worldwide over the past 30 days, and also when the reporting data was last
updated. You can change the map view to show the number of detected files, or
change the time period to show only the results over the past 7 days or the past 24
hours.
Virus Tracking section lists cumulative totals for the number of scanned files,
The
detected files, and detected computers that have been reported since the date
shown.
46McAfee® Internet Security Suite®software
Figure 2-14. World Virus Map
Updating VirusScan
When you are connected to the Internet, VirusScan automat ically che cks for
updates every four hours, then automatically downloads and installs weekly virus
definition updates without interrupting your work.
Virus definition files are approximately 100 KB and thus have minimal impact on
system performance during download.
If a product update or virus outbreak occurs, an alert appears. Once alerted, you
can then choose to update VirusScan to remove the threat of a virus outbreak.
Automatically checking for updates
McAfee SecurityCenter is automatically configured to check for updates for all of
your McAfee services every four hours when you are connected to the Internet,
then notify you with alerts and sounds. By default, SecurityCenter automatically
downloads and installs any available updates.
NOTE
In some cases, you will be prompted to restart your computer
to complete the update. Be sure to save all of your work and
close all applications before restarting.
Updating VirusScan
Manually checking for updates
In addition to automatically checking for updates every four hours when you are
connected to the Internet, you can also manually check for updates at any time.
To manually check for VirusScan updates:
1Ensure your computer is connected to the Internet.
2Right-click the McAfee icon, then click Updates.
The
SecurityCenter Updates dialog box opens.
3Click Check Now.
If an update exists, the
page 48). Click
If no updates are available, a dialog box tells you that VirusScan is up-to-date.
Click
OK to close the dialog box.
Update to continue.
VirusScan Updates dialog box opens (Figure 2-15 on
User Guide47
McAfee VirusScan
Figure 2-15. Updates dialog box
Log on to the web site if prompted. The Update Wizard installs the update
4
automatically.
5Click Finish when the update is finished installing.
NOTE
In some cases, you will be prompted to restart your computer
to complete the update. Be sure to save all of your work and
close all applications before restarting.
48McAfee® Internet Security Suite®software
McAfee Personal Firewall
Plus
Welcome to McAfee Personal Firewall Plus.
McAfee Personal Firewall Plus software offers advanced protection for your
computer and your personal data. Personal Firewall establishes a barrier between
your computer and the Internet, silently monitoring Internet traffic for suspicious
activities.
With it, you get the following features:
Defends against potential hacker probes and attacks
Complements anti-virus defenses
Monitors Internet and network activity
Alerts you to potentially hostile events
Provides detailed information on suspicious Internet traffic
3
Integrates Hackerwatch.org functionality, including event reporting,
self-testing tools, and the ability to email reported events to other online
authorities
Provides detailed tracing and event research features
New features
Improved Gaming Support
McAfee Personal Firewall Plus protects your computer from intrusion
attempts and suspicious activities during full-screen gameplay, but can hide
alerts if it detects intrusion attempts or suspicious activities. Red alerts appear
after you exit the game.
Improved Access Handling
McAfee Personal Firewall Plus lets users dynamically grant applications
temporary access to the Internet. Access is restricted to the time the application
launches until the time it closes. When Personal Firewall detects an unknown
program, attempting to communicate with the Internet, a Red Alert provides
the option to grant the application temporary access to the Inter ne t.
User Guide49
McAfee Personal Firewall Plus
Enhanced Security Control
Running the Lockdown feature in McAfee Personal Firewall Plus allows you
to instantly block all incoming and outgoing Internet traffic between a
computer and the Internet. Users can enable and disable Lockdown from three
locations in Personal Firewall.
Improved Recovery Options
You can run Reset Options to automatically restore the default settings to
Personal Firewall. If Personal Firewall exhibits undesirable behavior that you
cannot correct, you can choose to undo your current settings and revert to the
product's default settings.
Internet Connectivity Protection
To prevent a user from inadvertently disabling his or her Internet connection,
the option to ban an Internet address is excluded on a Blue Alert when
Personal Firewall detects an Internet connection originates from a DHCP or
DNS server. If the incoming traffic does not originate from a DHCP or DNS
server, the option appears.
Enhanced HackerWatch.org Integration
Reporting potential hackers is easier than ever. McAfee Personal Firewall Plus
improves the functionality of HackerWatch.org, which includes event
submission of potentially malicious events to the database.
Extended Intelligent Application Handling
When an application seeks Internet access, Personal Firewall first checks
whether it recognizes the application as trusted or malicious. If the application
is recognized as trusted, Personal Firewall automatically allows it access to the
Internet so you do not have to.
Advanced Trojan Detection
McAfee Personal Firewall Plus combines application connection management
with an enhanced database to detect and block more potentially malicious
applications, such as Trojans, from accessing the Internet and potentially
relaying your personal data.
Improved Visual Tracing
Visual Trace includes easy-to-read graphical maps showing the originating
source of hostile attacks and traffic worldwide, including detailed
contact/owner information from originating IP addresses.
Improved Usability
McAfee Personal Firewall Plus includes a Setup Assistant and a User Tutorial
to guide users in the setup and use of their firewall. Although the product is
designed to use without any intervention, McAfee provides users with a
wealth of resources to understand and appreciate what the firewall provides
for them.
50McAfee® Internet Security Suite®software
Enhanced Intrusion Detection
Personal Firewall's Intrusion Detection System (IDS) detects common attack
patterns and other suspicious activity. Intrusion detection monitors every data
packet for suspicious data transfers or transfer methods and logs this in the
event log.
Enhanced Traffic Analysis
McAfee Personal Firewall Plus offers users a view of both incoming and
outgoing data from their computers, as well as displaying application
connections including applications that are actively “listening” for open
connections. This allows users to see and act upon applications that might be
open for intrusion.
Removing other firewalls
Before you install McAfee Personal Firewall Plus software, you must uninstall any
other firewall programs on your computer. Please follow your firewall program’s
uninstall instructions to do so.
Removing other firewalls
NOTE
If you use Windows XP, you do not need to disable the built-in
firewall before installing McAfee Personal Firewall Plus.
However, we recommend that you do disable the built-in
firewall. If you do not, you will not receive events in the
Inbound Events log in McAfee Personal Firewall Plus.
Setting the default firewall
McAfee Personal Firewall can manage permissions and traffic for Internet
applications on your computer, even if Windows Firewall is detected as running
on your computer.
When installed, McAfee Personal Firewall automatically disables Windows
Firewall and sets itself as your default firewall. You then experience only McAfee
Personal Firewall functionality and messaging. If you subsequently enable
Windows Firewall via Windows Security Center or Windows Control Panel,
letting both firewalls run on your computer might result in partial loss of logging
in McAfee Firewall as well as duplicate status and alert messaging.
User Guide51
McAfee Personal Firewall Plus
To ensure that your computer is protected by at least one firewall, Windows
Firewall is automatically re-enabled when McAfee Personal Firewall is
uninstalled.
NOTE
If both firewalls are enabled, McAfee Personal Firewall does
not show all the blocked IP addresses in its Inbound Events
tab. Windows Firewall intercepts most of these events and
blocks those events, preventing McAfee Personal Firewall
from detecting or logging those events. However, McAfee
Personal Firewall might block additional traffic based upon
other security factors, and that traffic will be logged.
Logging is disabled in Windows Firewall by default, but if
you choose to enable both firewalls, you can enable Windows
Firewall logging. The default Windows Firewall log is
C:\Windows\pfirewall.log
If you disable McAfee Personal Firewall or set its security setting to
manually enabling Windows Firewall, all firewall protection will be removed
except for previously blocked applications.
Setting the security level
You can configure security options to indicate how Personal Firewall responds
when it detects unwanted traffic. By default, the
In
Standard security level, when an application requests Internet access and you
grant it access, you are granting the application Full Access. Full Access allows the
application the ability to both send data and receive unsolicited data on
non-system ports.
To configure security settings:
1Right-click the McAfee icon in the Windows system tray, point to Personal
Firewall
2Click the Security Settings icon.
3Set the security level by moving the slider to the desired level.
, then select Options.
Open without
Standard security level is enabled.
The security level ranges from Lockdown to Open:
Lockdown — All Internet connections on your computer are closed. You
can use this setting to block ports you configured to be open in the System
Services page.
52McAfee® Internet Security Suite®software
Setting the security level
Tight Security— When an application requests a specific type of access to
the Internet (for example, Outbound Only Access), you can allow or
disallow the application an Internet connection. If the application later
requests Full Access, you can then grant Full Access or restrict it to
Outbound Only access.
Standard Security (recommended)— When an application requests and
then is granted Internet access, the application receives full Internet access
to handle incoming and outgoing traffic.
Trusting Security— All applications are automatically trusted when they
first attempt to access the Internet. However, you can configure Personal
Firewall to use alerts to notify you about new applications on your
computer. Use this setting if you find that some games or streaming media
do not work.
Open — Your firewall is disabled. This setting allows all traffic through
Personal Firewall, without filtering.
NOTE
Previously blocked applications continue to be blocked when
the firewall is set to the
prevent this, you can either change the application's
permissions to
Allow Full Access or delete the Blocked
permission rule from the
Open or Lockdown security setting. To
Internet Applications list.
4Select additional security settings:
NOTE
If your computer runs Windows XP and multiple XP users
have been added, these options are available only if you are
logged on to your computer as an administrator.
Record Intrusion Detection (IDS) Events in Inbound Events Log — If you
select this option, events detected by IDS will appear in the Inbound
Events log. The Intrusion Detection System detects common atta ck type s
and other suspicious activity. Intrusion detection monitors every inbound
and outbound data packet for suspicious data transfers or transfer
methods. It compares these to a “signature” database and automatically
drops the packets coming from the offending computer.
IDS looks for specific traffic patterns used by attackers. IDS checks each
packet that your machine receives to detect suspicious or known-attack
traffic. For example, if Personal Firewall sees ICMP packets, it analyzes
those packets for suspicious traffic patterns by comparing the ICMP traffic
against known attack patterns.
User Guide53
McAfee Personal Firewall Plus
Accept ICMP ping requests — ICMP traffic is used mainly for performing
traces and pings. Pinging is frequently used to perform a quick test before
attempting to initiate communications. If you are using or have used a
peer-to-peer file-sharing program, you might find yourself being pinged a
lot. If you select this option, Personal Firewall allows all ping requests
without logging the pings in the Inbound Events log. If you do not select
this option, Personal Firewall blocks all ping requests and logs the pings in
the Inbound Events log.
Allow restricted users to change Personal Firewall settings — If you run
Windows XP or Windows 2000 Professional with multiple users, select this
option to allow restricted XP users to modify Personal Firewall settings.
5Click OK if you are finished making changes.
Testing McAfee Personal Firewall Plus
You can test your Personal Firewall installation for possible vulnerabilities to
intrusion and suspicious activity.
To test your Personal Firewall installation from the McAfee system tray icon:
Right-click the McAfee icon in the Windows system tray, and select Test
Firewall
.
Personal Firewall opens Internet Explorer and goes to
http://www.hackerwatch.org/, a web site maintained by McAfee. Please follow
the directions on the Hackerwatch.org Probe page to test Personal Firewall.
Using McAfee SecurityCenter
McAfee SecurityCenter is your one-stop security shop, accessible from its icon in
your Windows system tray or from your Windows desktop. With it, you can
perform these useful tasks:
Get free security analysis for your computer.
Launch, manage, and configure all your McAfee subscriptions from one icon.
See continuously updated virus alerts and the latest product information.
Get quick links to frequently asked questions and account details at the
McAfee web site.
NOTE
For more information about its features, click Help in the
SecurityCenter dialog box.
54McAfee® Internet Security Suite®software
About the Summary page
While SecurityCenter is running and all of the McAfee features installed on your
computer are enabled, a red M icon appears in the Windows system tray. This
area is usually in the lower-right corner of the Windows desktop and contains the
clock.
If one or more of the McAfee applications installed on your computer are disabled,
the McAfee icon changes to black .
To launch the McAfee SecurityCent er :
1Right-click the McAfee icon , then select Open SecurityCenter.
To launch Personal Firewall from McAfee SecurityCenter:
1From SecurityCenter, click the Personal Firewall Plus tab.
2Select a task from the I want to menu.
To launch Personal Firewall from Windows:
1Right-click the McAfee icon in the Windows system tray, then point to
Personal Firewall.
2Select a task.
To open Personal Firewall:
Right-click the McAfee icon in the Windows system tray, point to Personal
Firewall,
and select a task.
About the Summary page
The Personal Firewall Summary includes four summary pages:
The Summary pages contain a variety of reports on recent inbound events,
application status, and world-wide intrusion activity reported by
HackerWatch.org. You will also find links to common tasks performed in Personal
Firewall.
User Guide55
McAfee Personal Firewall Plus
To open the Main Summary page in Personal Firewall:
Right-click the McAfee icon in the Windows system tray, point to Personal
Firewall
, then select View Summary (Figure 3-1).
Figure 3-1. Main Summary page
Click the following to navigate to different Summary pages:
ItemDescription
Change ViewClick Change View to open a list of Summary pages. From the list,
select a Summary page to view.
Right arrowClick the right arrow icon to view the next Summary page.
Left arrowClick the left arrow icon to view the previous Summary page.
HomeClick the home icon to return to the Main Summary page.
The Main Summary page provides the following information:
ItemDescription
Security SettingThe security setting status tells you the level of security at which the
firewall is set. Click the link to change the security level.
Blocked EventsThe blocked events status displays the number of events that have
been blocked today. Click the link to view event details from the
Inbound Event page.
56McAfee® Internet Security Suite®software
ItemDescription
About the Summary page
Application
Rule Changes
The application rule status displays the number of application rules
that have been changed recently. Click the link to view the list of
allowed and blocked applications and to modify application
permissions.
What’s New?What’s New? shows the latest application that was granted full
access to the Internet.
Last EventLast Event shows the latest inbound events. You can click a link to
trace the event or to trust the IP address. Trusting an IP address
allows all traffic from the IP address to reach your computer.
Daily ReportDaily Report displays the number of inbound events that Personal
Firewall blocked today, this week, and this month. Click the link to
view event details from the Inbound Event page.
Active
Applications
Active Applications displays the applications that are currently
running on your computer and accessing the Internet. Click an
application to view which IP addresses the application is connecting
to.
Common TasksClick a link in Common Tasks to go to Personal Firewall pages
where you can view firewall activity and perform tasks.
To view the Application Summary page:
1Right-click the McAfee icon in the Windows system tray, point to Personal
Firewall
2Click Change View, then select Application Summary.
, then select View Summary.
The Application Summary page provides the following information:
ItemDescription
Traffic MonitorThe Traffic Monitor shows inbound and outbound Internet
connections over the last fifteen minutes. Click the graph to view
traffic monitoring details.
Active
Applications
What’s New?What’s New? shows the latest application that was granted full
Active Applications shows the bandwidth use of your computer’s
most active applications during the last twenty-four hours.
Application—The application accessing the Internet.
%—The percentage of bandwidth used by the application.
Permission—The type of Internet access that the application is
allowed.
Rule Created—When the application rule was created.
access to the Internet.
User Guide57
McAfee Personal Firewall Plus
ItemDescription
Active
Applications
Common TasksClick a link in Common Tasks to go to Personal Firewall pages
Active Applications displays the applications that are currently
running on your computer and accessing the Internet. Click an
application to view which IP addresses the application is connecting
to.
where you can view application status and perform
application-related tasks.
To view the Event Summary page:
1Right-click the McAfee icon in the Windows system tray, point to Personal
Firewall
2Click Change View, then select Event Summary.
, then select View Summary.
The Event Summary page provides the following information:
ItemDescription
Port
Comparison
Port Comparison shows a pie chart of the most frequently attempted
ports on your computer during the past 30 days. You can click a port
name to view details from the Inbound Events page. You can also
move your mouse pointer over the port number to see a description of
the port.
Top OffendersTop Offenders shows the most frequently blocked IP addresses,
when the last inbound event occurred for each address, and the total
number of inbound events in the past thirty days for each address.
Click an event to view event details from the Inbound Events page.
Daily ReportDaily Report displays the number of inbound events that Personal
Firewall blocked today, this week, and this month. Click a number to
view the event details from the Inbound Events log.
Last EventLast Event shows the latest inbound events. You can click a link to
trace the event or to trust the IP address. Trusting an IP address
allows all traffic from the IP address to reach your computer.
Common TasksClick a link in Common Tasks to go to Personal Firewall pages
where you can view details of events and perform event-related
tasks.
To view the HackerWatch Summary page:
1Right-click the McAfee icon in the Windows system tray, point to Personal
Firewall
2Click Change View, then select HackerWatch Summary.
, then select View Summary.
58McAfee® Internet Security Suite®software
About the Summary page
The HackerWatch Summary page provides the following information.
ItemDescription
World ActivityWorld Activity shows a world map identifying recently blocked
activity monitored by HackerWatch.org. Click the map to open the
Global Threat Analysis Map in HackerWatch.org.
Event TrackingEvent Tracking shows the number of inbound events submitted to
HackerWatch.org.
Global Port
Activity
Global Port Activity shows the top ports, in the past 5 days, that
appear to be threats. Click a port to view the port number and port
description.
Common TasksClick a link in Common Tasks to go to HackerWatch.org pages
where you can get more information on world-wide hacker activity.
User Guide59
McAfee Personal Firewall Plus
About the Internet Applications page
Use the Internet Applications page to view the list of allowed and blocked
applications.
To launch the Internet Applications page:
Right-click the McAfee icon in the Windows system tray, point to Personal
Firewall
, then select Applications (Figure 3-2).
The Internet Applications page provides the following information:
Application names
File names
Current permission levels
Application details: application name and version, company name, path name,
permission, timestamps, and explanations of permission types
60McAfee® Internet Security Suite®software
Figure 3-2. Internet Applications page
Changing application rules
Personal Firewall lets you change access rules for applications.
To change an application rule:
1Right-click the McAfee icon, point to Personal Firewall, then select Internet
Applications
2In the Internet Applications list, right-click the application rule for an
application, and select a different level:
Allow Full Access— Allow the application to establish outbound and inbound
Internet connections
Outbound Access Only— Allow the application to establish an outbound
Internet connection only.
Block This Application — Disallow the application Internet access.
.
NOTE
Previously blocked applications continue to be blocked when
the firewall is set to the
from, you can either change the application's access rule to
Full Access or delete the Blocked permission rule from the
Internet Applications list.
About the Internet Applications page
.
Open or Lockdown. To prevent this
To delete an application rule:
1Right-click the McAfee icon in the Windows system tray, point to Personal
Firewall
2In the Internet Applications list, right-click the application rule, then select
Delete Application Rule.
, then select Internet Applications.
The next time the application requests Internet access, you can set its permission
level to re-add it to the list.
Allowing and blocking Internet applications
To change the list of allowed and blocked Internet applications:
1Right-click the McAfee icon in the Windows system tray, point to Personal
Firewall
2On the Internet Applications page, click one of the following options:
New Allowed Application — Allow an application full Internet access.
New Blocked Application — Disallow an application Internet access.
Delete Application Rule — Remove an application rule.
, then select Internet Applications.
User Guide61
McAfee Personal Firewall Plus
About the Inbound Events page
Use the Inbound Events page to view the Inbound Events log, generated when
Personal Firewall blocks unsolicited Internet connections.
To launch the Inbound Events page:
Right-click the McAfee icon in the Windows system tray, point to Personal
Firewall
, then select Inbound Events (Figure 3-3).
The Inbound Events page provides the following information:
Timestamps
Source IPs
Hostnames
Service or application names
Event details: connection types, connection ports, host name or IP, and
explanations of port events
62McAfee® Internet Security Suite®software
Figure 3-3. Inbound Events page
Understanding events
About IP addresses
IP addresses are numbers: four numbers each between 0 and 255 to be precise.
These numbers identify a specific place that traffic can be directed to on the
Internet.
IP address types
Several IP addresses are unusual for various reasons:
Non-routable IP addresses — These are also referred to as "Private IP Space." These
IP addresses cannot be used on the Internet. Private IP blocks are 10.x.x.x,
172.16.x.x - 172.31.x.x, and 192.168.x.x.
Loop-back IP addresses — Loop-back addresses are used for testing purposes.
Traffic sent to this block of IP addresses comes right back to the device generating
the packet. It never leaves the device, and is primarily used for hardware and
software testing. The Loop-Back IP block is 127.x.x.x.
About the Inbound Events page
Null IP address — This is an invalid address. When detected, Personal Firewall
indicates that the traffic used a blank IP address. Frequently, this indicates that the
sender is deliberately obscuring the origin of the traffic. The sender will not be able
to receive any replies to their traffic unless the packet is received by an application
that understands the contents of the packet that will include instructions specific
to that application. Any address that starts with 0 (0.x.x.x) is a null address. For
example, 0.0.0.0 is a null IP address.
Events from 0.0.0.0
If you see events from IP address 0.0.0.0, there are two likely causes. The first, and
most common, is that your computer has received a badly formed packet. The
Internet isn't always 100% reliable, and bad packets can occur. Since Personal
Firewall sees the packets before TCP/IP can validate them, it might report these
packets as an event.
The other situation occurs when the source IP is spoofed, or faked. Spoofed packets
can be a sign that someone is scanning your computer for Trojans. Personal
Firewall blocks this kind of activity, so your computer is safe.
Events from 127.0.0.1
Events will sometimes list their source IP as 127.0.0.1. This is called a loopback
address or localhost.
Many legitimate programs use the loopback address for communication between
components. For example, you can configure many personal E-mail or Web
servers through a Web interface. To access the interface, you type
“http://localhost/” in your Web browser.
User Guide63
McAfee Personal Firewall Plus
Personal Firewall allows traffic from these programs, so if you see events from
127.0.0.1, it is likely that the source IP address is spoofed, or faked. Spoofed packets
are usually indicate that another computer is scanning yours for Trojans. Personal
Firewall blocks such intrusion attempts, so your computer is safe.
Some programs, notably Netscape 6.2 and higher, require you to add 127.0.0.1 to
the Trusted IP Addresses list. These programs’ components communicate between
each other in such a manner that Personal Firewall cannot determine if the traffic
is local or not.
In the example of Netscape 6.2, if you do not trust 127.0.0.1, then you will not be
able to use your buddy list. Therefore, if you see traffic from 127.0.0.1 and all of the
applications on your computer work normally, then it is safe to block this traffic.
However, if a program (like Netscape) experiences problems, add 127.0.0.1 to the
Trusted IP Addresses list in Personal Firewall.
If placing 127.0.0.1 in the trusted IP list fixes the problem, then you need to weigh
your options: if you trust 127.0.0.1, your program will work, but you will be more
open to spoofed attacks. If you do not trust the address, then your program will
not work, but you will remain protected against certain malicious traffic.
Events from computers on your LAN
Events can be generated from computers on your local area networ k (LAN). To
show that these events are generated by your network, Personal Firewall displays
them in green.
In most corporate LAN settings, you should select
Trusted
in the Trusted IP Addresses options.
Make all computers on your LAN
In some situations, your “local” network can be as dangerous than the Internet,
especially if your computer runs on a high-bandwidth DSL or cable modem based
network. In this case, do not to select
Make all computers on your LAN Trusted.
Instead, add the IP addresses of your local computers to the Trusted IP Addresses
list.
Events from private IP addresses
IP addresses of the format 192.168.xxx.xxx, 10.xxx.xxx.xxx, and 172.16.0.0 -
172.31.255.255 are referred to as non-routable or private IP addresses. These IP
addresses should never leave your network, and can be trusted most of the time .
The 192.168.xxx.xxx block is used with Microsoft Internet Connection Sharing
(ICS). If you are using ICS, and see events from this IP block, you might want to
add the IP address 192.168.255.255 to your Trusted IP Addresses list. This will trust
the entire 192.168.xxx.xxx block.
If you are not on a private network, and see events from these IP ranges, the source
IP address might be spoofed, or faked. Spoofed packets are usually signs that
someone is scanning for Trojans. It's important to remember that Personal Firewall
blocked this attempt, so your computer is safe.
64McAfee® Internet Security Suite®software
Since private IP addresses refer to different computers depending on what
network you are on, reporting these events will have no effect, so there's no need
to do so.
Showing events in the Inbound Events log
The Inbound Events log displays events in a number of ways. The default view
limits the view to events which occur on the current day. You can also view events
that occurred during the past week, or view the complete log.
Personal Firewall also lets you display inbound events from specific days, from
specific Internet addresses (IP addr esses), or events that contain the same event
information.
For information about an event, click the event, and view the information in the
Event Information pane.
Showing today's events
Use this option to review the day’s events.
About the Inbound Events page
To show today’s events:
1Right-click the McAfee icon in the Windows system tray, point to Personal
Firewall
2On the Inbound Events log, right-click an entry, then click Show Today's
Events
, then select Inbound Events.
.
Showing this week's events
Use this option to review weekly events.
To show this week’s events:
1Right-click the McAfee icon in the Windows system tray, point to Personal
Firewall
2On the Inbound Events log, right-click an entry, then click Show This Week's
Events
, then select Inbound Events.
.
Showing the complete Inbound Events log
Use this option to review all events.
To show all of the events in the Inbound Events log:
1Right-click the McAfee icon, point to Personal Firewall, and click Inbound
Events
2On the Inbound Events log, right-click an entry, then click Show Complete Log.
.
The Inbound Events log displays all events from the Inbou nd Events log.
User Guide65
McAfee Personal Firewall Plus
Showing events from a specific day
Use this option to review events from a specific day.
To show a day's events:
1Right-click the McAfee icon in the Windows system tray, point to Personal
Firewall
2On the Inbound Events log, right-click an entry, then click Show Only Events
From this Day
Showing events from a specific Internet address
Use this option to review other events which originate from a particular Internet
address.
To show events of an Internet address:
1Right-click the McAfee icon in the Windows system tray, point to Personal
Firewall
, then select Inbound Events.
.
, and click Inbound Events.
2On the Inbound Events log, right-click an entry, then click Show Only Events
From Selected Internet Address
.
66McAfee® Internet Security Suite®software
Showing events that share identical event information
Use this option to review other events in the Inbound Events log that have the
same information in the Event Information column as the event you selected. You
can find out how many times this event happened, and if it is from the same
source. The Event Information column provides a description of the event and, if
known, the common program or service that uses that port.
To show events that share identical event information:
1Right-click the McAfee icon in the Windows system tray, point to Personal
Firewall
2On the Inbound Events log, right-click an entry, then click Show Only Events
with the same Event Information
, and click Inbound Events.
Responding to inbound events
In addition to reviewing details about events in the Inbound Events log, you can
perform a Visual Trace of the IP addresses for an event in the Inbound Events log,
or get event details at the anti-hacker online community HackerWatch.org web
site.
About the Inbound Events page
.
Tracing the selected event
You can try to perform a Visual Trace of the IP addresses for an event in the
Inbound Events log.
To trace a selected event:
1Right-click the McAfee icon in the Windows system tray, point to Personal
Firewall
2On the Inbound Events log, right-click the event you want to trace, then click
Trace Selected Event. You can also double-click an event to trace an event.
, and select Inbound Events.
By default, Personal Firewall begins a Visual Trace using the integrated Personal
Firewall Visual Trace program.
Getting advice from HackerWatch.org
To get advice from HackerWatch.org:
1Right-click the McAfee icon, point to Personal Firewall, and select Inbound
Events
2Select the event's entry on the Inboun d Events page, then click Get More
Information
.
on the I want to pane.
Your default Web browser launches and opens the HackerWatch.org to retrieve
information about the event type, and advice about whether to report the event.
User Guide67
McAfee Personal Firewall Plus
Reporting an event
To report an event that you think was an attack on your computer:
1Right-click the McAfee icon in the Windows system tray, point to Personal
Firewall
2Click the event you want to report, then click Report This Event in the I want to
pane.
Personal Firewall reports the event to the HackerWatch.org using your unique ID.
Signing up for HackerWatch.org
When you first open the Summary page, Personal Firewall contacts
HackerWatch.org to generate your unique user ID. If you are an existing user, your
sign-up is automatically validated. If you are a new user, you must enter a
nickname and email address, then click the validation link in the confirmation
email from HackerWatch.org to be able to use the event filtering/e-mailing
features at its web site.
, and select Inbound Events.
You can report events to HackerWatch.o rg without validating your user ID.
However, to filter events and email events to a friend, you must sign up for the
service.
Signing up for the service allows your submissions to be tracked and lets us notify
you if HackerWatch.org needs more information or further action from you. We
also require you to sign up because we must confirm any information we receive
for that information to be useful.
All email addresses provided to HackerWatch.org are kept confidential. If a
request for additional information is made by an ISP, that request is routed
through HackerWatch.org; your email address is never exposed.
Trusting an address
You can use the Inbound Events page to add an IP address to the Trusted IP
Addresses list to allow a permanent connection.
If you see an event in the Inbound Events page that contains an IP address that you
need to allow, you can have Personal Firewall allow connections from it at all
times.
To add an IP address to the Trusted IP Addresses list:
1Right-click the McAfee icon in the Windows system tray, point to Personal
Firewall
2Right-click the event whose IP address you want trusted, and click Trust the
Source IP Address
68McAfee® Internet Security Suite®software
, and select Inbound Events.
.
About the Inbound Events page
Verify that the IP address displayed in the Trust This Address dialog is correct, and
OK. The IP address is added to the Trusted IP Addresses list.
click
To verify that the IP address was added:
1Right-click the McAfee icon in the Windows system tray, point to Personal
Firewall
2Click the Trusted & Banned IPs icon, then the Trusted IP Addresses tab.
, and select Options.
The IP address appears checked in the Trusted IP Addresses list.
Banning an address
If an IP address appears in your Inbound Events log, this indicates that traffic from
that address was blocked. Therefore, banning an address adds no additional
protection unless your computer has ports that are deliberately opened through
the System Services feature, or unless your computer has an application that has
permission to receive traffic.
Add an IP address to your banned list only if you have one or more ports that are
deliberately open and if you have reason to believe that you must block that
address from accessing open ports.
If you see an event in the Inbound Events page that contains an IP address that you
want to ban, you can configure Personal Firewall to prevent connections from it at
all times.
You can use the Inbound Events page, which lists the IP addresses of all inbound
Internet traffic, to ban an IP address that you suspect is the source of suspicious or
undesirable Internet activity.
To add an IP address to the Banned IP Addresses list:
1Right-click the McAfee icon in the Windows system tray, point to Personal
Firewall
2The Inbound Events page lists the IP addresses of all inbound Internet traffic.
, then select Inbound Events.
Select an IP address, and then do one of the following:
Right-click the IP address, and then select Ban the Source IP Address.
From the I want to menu, click Ban This Address.
3In the Add Banned IP Address Rule dialog, use one or more of the following
settings to configure the Banned IP Address rule:
A Single IP Address: The IP address to ban. The default entry is the IP
address that you selected from the Inbound Event page.
An IP Address Range: The IP addresses between the address you specify in
From IP Address and the IP address you specify in To IP Address.
User Guide69
McAfee Personal Firewall Plus
Make this rule expire on: Date and time in which the Banned IP Address rule
expires. Select the appropriate drop down menus to select the date and the
time.
Description: Optionally describe the new rule.
Click OK.
4In the dialog box, click Yes to confirm your setting. Click No to return to the
Add Banned IP Address Rule dialog.
If Personal Firewall detects an event from a banned Internet connection, it will alert
you according to the method you specified on the Alert Settings page.
To verify that the IP address was added:
1Click the Options tab.
2Click the Trusted & Banned IPs icon, then click the Banned IP Addresses tab.
The IP address appears checked in the Banned IP Addresses list.
70McAfee® Internet Security Suite®software
Managing the Inbound Events log
You can use the Inbound Events page to manage the events in the Inbound Events
log generated when Personal Firewall blocks unsolicited Internet traffic.
Archiving the Inbound Events log
You can archive the current Inbound Events log to save all of the logged inbound
events, including their date and times, source IPs, hostnames, ports, and event
information. You should archive your Inbound Events log periodically to prevent
the Inbound Events log from growing too large.
To archive the Inbound Events log:
1Right-click the McAfee icon in the Windows system tray, point to Personal
Firewall
2On the Inbound Events page, click Archive.
3On the Archive Log dialog, click Yes to proceed with the operation.
4Click Save to save the archive in the default location, or browse to a location
where you want to save the archive.
, then select Inbound Events.
About the Inbound Events page
Note: By default, Personal Firewall automatically archives the Inbound Events log.
Check or clear
Automatically archive logged events in the Event Log Settings page
to enable or disable the option.
Viewing an archived Inbound Events log
You can view any Inbound Events log that you previously archived. The saved
archive includes date and times, source IPs, hostnames, ports, and event
information for the events.
To view an archived Inbound Events log:
1Right-click the McAfee icon in the Windows system tray, point to Personal
Firewall
2On the Inbound Events page, click View Archives.
3Select or browse for the archive file name and click Open.
, then select Inbound Events.
Clearing the Inbound Events log
You can clear all information from the Inbound Events log.
WARNING
After you clear the Inbound Events log, you cannot recover it. If
you think you will need the Events Log in the future, you should
archive it instead.
To clear the Inbound Events log:
User Guide71
McAfee Personal Firewall Plus
Right-click the McAfee icon, point to Personal Firewall, then select Inbound
1
Events
2On the Inbound Events page, click Clear Log.
3Click Yes in the dialog to clear the log.
Copying an event to the Clipboard
You can copy an event to the clipboard so that you can paste it in a text file using
Notepad.
To copy events to the clipboard:
1Right-click the McAfee icon, point to Personal Firewall, then select Inbound
Events
2Right-click the event in the Inbound Events log.
3Click Copy Selected Event to Clipboard.
4Launch Notepad.
.
.
Type notepad on the command line or click the Windows Start button,
point to
5Click Edit, and then click Paste. The event text appears in Notepad. Repeat this
step until you have all of the necessary events.
6Save the Notepad file in a safe place.
Programs, then Accessories. Select Notepad.
Deleting the selected event
You can delete events from the Inbound Events log.
To delete events from the Inbound Event s l og:
1Right-click the McAfee icon in the Windows system tray, point to Personal
Firewall
2Click the event's entry on the Inbound Events page that you want to delete.
3On the Edit menu, click Delete Selected Event. The event is deleted from the
Inbound Events log.
, then select Inbound Events.
About alerts
We strongly recommend that you become familiar with the types of alerts you will
encounter while using Personal Firewall. Review the following types of alerts that
can appear and the possible responses you can choose, so that you can confidently
respond to an alert.
72McAfee® Internet Security Suite®software
Red alerts
About alerts
NOTE
Recommendations on alerts help you decide how to handle an
alert. For recommendations to appear on alerts, click the
Options tab, click the Alert Settings icon, then select either Use
Smart Recommendations
Recommendations only
(the default) or Display Smart
from the Smart Recommendations list.
Red alerts contain important information that requires your immediate attention:
Internet Application Blocked — This alert appears if Personal Firewall blocks an
application from accessing the Internet. For example, if a Trojan program alert
appears, McAfee automatically denies this program access to the Internet and
recommends that you scan your computer for viruses.
Application Wants to Access the Internet — This alert appears when Personal
Firewall detects Internet or network traffic for new applications.
Application Has Been Modified —This alert appears when Personal Firewall
detects that an application, previously allowed to access the Internet, has
changed. If you have not recently upgraded the application, be careful about
granting the modified application access to the Internet.
Application Requests Server Access — This alert appears when Personal
Firewall detects that an application you have previously allowed to access the
Internet has requested Internet access as a server.
NOTE
The Windows XP SP2 default Automatic Updates setting
downloads and installs updates for the Windows OS and
other Microsoft programs running on your computer without
messaging you. When an application has been modified from
one of Windows silent updates, McAfee Personal Firewall
alerts appear the next time the Microsoft application is run.
IMPORTANT
You must grant access to applications that require Internet
access for online product updates (such as McAfee services) to
keep them up-to-date.
Internet Application Blocked alert
If a Trojan program alert appears (Figure 3-4), Personal Firewall automatically
denies this program access to the Internet and recommends that you scan your
computer for viruses. If McAfee VirusScan is not installed, you can launch McAfee
SecurityCenter.
User Guide73
McAfee Personal Firewall Plus
View a brief description of the event, then choose from these options:
Click Find Out More Information to get details about the event through the
Inbound Events log (see About the Inbound Events pageon page 62 for details).
Figure 3-4. Internet Application Blocked alert
Click Launch McAfee VirusScan to scan your computer for viruses.
Click Continue What I Was Doing if you do not want to take action beyond what
Personal Firewall has already done.
Click Grant Outbound Access to allow an outbound connection (Tight
security).
74McAfee® Internet Security Suite®software
About alerts
Application Wants to Access the Internet alert
If you selected Standard or Tight security in the Security Settings options, Personal
Firewall displays an alert (Figure 3-5) when it detects Internet or network
connections for new or modified applications.
Figure 3-5. Application Wants to Access the Internet alert
If an alert appears recommending caution in allowing the application Internet
access, you can click
Click here to learn more to get more information about the
application. This option appears on the alert only if Personal Firewall is configured
to use Smart Recommendations.
McAfee might not recognize the application trying to gain Internet access
(Figure 3-6).
Figure 3-6. Unrecognized Application alert
User Guide75
McAfee Personal Firewall Plus
Therefore, McAfee cannot give you a recommendation on how to handle the
application. You can report the application to McAfee by clicking
this program
application. Please fill out as much information as you know.
The information you submit is used in conjunction with other research tools by our
HackerWatch operators to determine whether an application warrants being listed
in our known applications database, and if so, how it should be treated by Personal
Firewall.
View a brief description of the event, then choose from these options:
Click Grant Access to allow the application an outbound and inbound Internet
connection.
Click Grant Access Once to grant the application a temporary Internet
connection. Access is limited to the time the application launches to the time it
closes.
Click Block All Access to prohibit an Internet connection.
Tell McAfee about
. A web page appears and asks you for information related to the
Click Grant Outbound Access to allow an outbound connection (Tight
security).
Click Help me choose to view online Help about application access
permissions.
Application Has Been Modified alert
If you selected Trusting, Standard, or Tight security in the Security Settings options,
Personal Firewall displays an alert (Figure 3-7) when Personal Firewall detects that
an application you have previously allowed to access the Internet has changed. If
you have not recently upgraded the application in question, be careful about
granting the modified application access to the Internet.
76McAfee® Internet Security Suite®software
Figure 3-7. Application Has Been Modified alert
About alerts
View a brief description of the event, then choose from these options:
Click Grant Access to allow the application an outbound and inbound Internet
connection.
Click Grant Access Once to grant the application a temporary Internet
connection. Access is limited to the time the application launches to the time it
closes.
Click Block All Access to prohibit an Internet connection.
Click Grant Outbound Access to allow an outbound connection (Tight
security).
Click Help me choose to view online Help about application access
permissions.
Application Requests Server Access alert
If you selected Tight security in the Security Settings options, Personal Firewall
displays an alert (Figure 3-8) when it detects that an application you have
previously allowed to access the Internet has requested Internet access as a server.
For example, an alert appears when MSN Messenger requests server access to send
a file during a chat.
View a brief description of the event, then choose from these options:
Click Grant Access Once to allow the application temporary Internet access.
Access is limited to the time the application launches to the time it closes.
Click Grant Server Access to allow the application an outbound and inbound
Internet connection.
Click Restrict to Outbound Access to prohibit an incoming Internet connection.
Figure 3-8. Application Requests Server Access alert
User Guide77
McAfee Personal Firewall Plus
Click Block All Access to prohibit an Internet connection.
Click Help me choose to view online Help about application access
permissions.Green alerts
Green alerts
Green alerts notify you of events in Personal Firewall, such as applications that
have been automatically granted Internet access.
Program Allowed to Access the Internet — This alert appears when Personal
Firewall automatically grants Internet access for all new applications, then notifies
you (Trusting Security). An example of a modified application is one with
modified rules to automatically allow the application Internet access.
Application Allowed to Access the Internet alert
If you selected Trusting security in the Security Settings options, Personal Firewall
automatically grants Internet access for all new applications, then notifies you with
an alert (Figure 3-9).
View a brief description of the event, then choose from these options:
Click View the Application Log to get details about the event through the
Internet Applications Log (see About the Internet Applications pageon page 60
for details).
Click Turn Off This Alert Type to prevent these type s of alerts fr om appearing.
Click Continue What I Was Doing if you do not want to take action beyond what
Personal Firewall has already done.
Click Block All Access to prohibit an Internet connection.
78McAfee® Internet Security Suite®software
Figure 3-9. Program Allowed to Access the Internet
About alerts
Application Has Been Modified alert
If you selected Trusting security in the Security Settings options, Personal Firewall
automatically grants Internet access for all modified applications. View a brief
description of the event, then choose from these options:
Click View the Application Log to get details about the event through the
Internet Applications Log (see About the Internet Applications pageon page 60
for details).
Click Turn Off This Alert Type to prevent these types of alerts from appearing.
Click Continue What I Was Doing if you do not want to take action beyond what
Personal Firewall has already done.
Click Block All Access to prohibit an Internet connection.
User Guide79
McAfee Personal Firewall Plus
Blue alerts
Blue alerts contain information, but require no response from you.
Connection Attempt Blocked — This alert appears when Personal Firewall
blocks unwanted Internet or network traffic. (Trust ing, Standard, or Tight
Security)
Connection Attempt Blocked alert
If you selected Trusting, Standard, or Tight security, Personal Firewall displays an
alert (Figure 3-10) when it blocks unwanted Internet or network traffic.
Figure 3-10. Connection Attempt Blocked alert
View a brief description of the event, then choose from these options:
Click View the Event Log to get details about the event through the Personal
Firewall Inbound Events log (see About the Inbound Events pageon page 62 for
details).
Click Trace This Address to perform a Visual Trace of the IP addresses for this
event.
Click Ban This Address to block this address from accessing your computer.
The address is added to the Banned IP Addresses list.
Click Trust This Address to allow this IP address to access your computer.
Click Continue What I Was Doing if you do not want to take action beyond what
Personal Firewall has already done
80McAfee® Internet Security Suite®software
McAfee Privacy Service
Thank you for purchasing McAfee® Privacy Service™. McAfee Privacy Service
software offers advanced protection for you, your family, your personal data, and
your computer.
Features
This release of McAfee Privacy Service includes the following features:
Internet time usage rules - Specify days and times when users can access the
Internet.
Custom keyword filtering - Create keyword rules that permit or block users
from accessing Web sites.
Privacy Service backup and restore - Save and restore Privacy Service settings
at any time.
4
Web bug blocker—Block Web bugs (objects obtained at potentially harmful
web sites) so that they are not loaded within browsed web pages.
Pop-up blocker—Prevent pop-up windows from displaying as you browse the
Internet.
Shredder—McAfee Shredder protects your privacy by quickly and safely
erasing unwanted files.
The Administrator
The Administrator specifies which users can access the Internet, when they can use
it, and what they can do on the Internet.
NOTE
The Administrator is considered an adult and as such can
access all web sites but is prompted to allow or prevent the
transmission of added personal identifiable information (PII).
User Guide81
McAfee Privacy Service
Setting up Privacy Service
The Setup Assistant allows you to create the Administrator, manage global
settings, enter personal information, and add users.
Remember your Administrator password and security answer so that you can
logon to Privacy Service. If you cannot logon, you cannot use Privacy Service and
the Internet. Keep your password secret so only you can change Privacy Service
settings. Some Web sites require that cookies are enabled to work properly.
Privacy Service always accepts cookies from McAfee.com.
NOTE
If your PC includes a pre-installed copy of Privacy Service,
some steps described in this documentation may not appear.
For more information, see Setting up a Pre-installed version of
Privacy Service on page 82 and your PC manufacturer's
documentation.
Setting up a Pre-installed version of Privacy Service
If Privacy Service is pre-installed on Windows XP, you must logon to Windows
with a Windows Administrator account to set up the product.
To configure a pre-installed version of Privacy Service:
1If you have not done so already, launch the Setup Assistant using one of the
following methods:
Right-click the McAfee icon in the Windows system tray, point to Privacy
Service
, and then select Setup Privacy Service.
From the Windows Start menu, point to McAfee, and then select McAfee
Privacy Service
.
Double-click the McAfee Privacy Service desktop icon.
Launch the McAfee SecurityCenter, click the privacy service tab, and then
Setup Privacy Service to launch the Setup Assistant.
2Proceed to and complete each step that is provided.
NOTE
To cancel configuration, click Cancel.
82McAfee® Internet Security Suite®software
Retrieving the Administrator Password
Retrieving the Administrator Password
If you forget the Administrator password, you can access the password using the
security information you entered when you created the Administrator profile.
To retrieve the Administrator password:
1Right-click the McAfee icon in the Windows system tray, point to McAfee
Privacy Service
2Select Administrator from the User Name pull-down menu.
3Click Forgot your password?
4Enter the answer to the security question that appears, and then click Get
Password
answer to the security question, you must remove McAfee Privacy Service
from Safe Mode (Windows 2000 and Windows XP only).
Removing Privacy Service with Safe Mode
, then select Sign In.
. A message appears containing your password. If you forget the
To remove Privacy Service with Safe Mode:
1Click Start and point to Shut Down. The Shut Down Windows dialog box
appears.
2Select Shut down from the menu and then click OK.
3Wait until the It is now safe to turn off the computer message appears, and then
turn the computer off.
4Turn the computer back on.
5Begin immediately pressing the F8 key, every other second, until the Windows
Startup
6Select Safe Mode and press Enter.
7When Windows starts, a message appears explaining Safe Mode. Click OK.
8Proceed to Add or Remove Programs, located in the Windows Control Panel.
menu appears.
When you are done, reboot the PC.
9Re-install McAfee Privacy Service and specify the Administrator password.
Make a note of the password you specify.
NOTE
You can remove Privacy Service in Safe Mode in Windows
2000 or Windows XP only.
User Guide83
McAfee Privacy Service
The Startup user
The Startup user is automatically signed in to Privacy Service when the computer
is started.
For example, if a user is on the computer or Internet more than the others, you can
make that user, including the Administrator, the Startup user. When the Startup
user uses the computer, the user is not required to sign in to Privacy Service.
If you have young children, you can also set the Startup user to the youngest. This
way, when an older user uses the computer, they can log off from the young user's
account and then log in again using their own user name and password. This
protects younger users from seeing inappropriate Web sites.
Configuring the Administrator as Startup User
To configure the Administrator as Startup user:
1From the Please Sign In dialog, select your user name from the User name
pull-down menu.
2Enter your password in the Password field.
3Select Make this user the Startup User, and then sign in.
Using McAfee SecurityCenter
McAfee SecurityCenter is your one-stop security shop, accessible from its icon in
your Windows system tray or from your Windows desktop. With it, you can access
Privacy Service and perform other useful tasks:
Get free security analysis for your computer.
Launch, manage, and configure all your McAfee subscriptions from one icon.
See continuously updated virus alerts and the latest product information.
Get quick links to frequently asked questions and account details at the
McAfee web site.
For more information about SecurityCenter features, click
SecurityCenter
When SecurityCenter is running and all of the McAfee features installed on your
computer are enabled, a red M icon appears in the Windows system tray. This
area is usually in the lower-right corner of the Windows desktop and contains the
clock.
dialog box.
Help in the
If one or more of the McAfee applications installed on your computer are disabled,
the McAfee icon changes to black .
84McAfee® Internet Security Suite®software
To launch McAfee SecurityCenter:
Launching McAfee Privacy Service
Right-click the McAfee icon in the Windows system tray, then select
SecurityCenter
.
Launching McAfee Privacy Service
After you install McAfee Privacy Service, the McAfee icon appears in the
Windows system tray, which is located near the system clock. From the McAfee
icon, you can access McAfee Privacy Service, McAfee SecurityCenter, and other
McAfee products installed on your computer.
NOTE
If your product is pre-installed, you must first set it up. For
more information, see Setting up a Pre-installed version of
Privacy Service on page 82.
Launching and signing in to Privacy Service
1Right-click the McAfee icon in the Windows system tray, point to McAfee
Privacy Service
2Select your user name from the User name pull-down menu.
, and then select Sign In.
Open
3Enter your Password in the Password field.
4Click Sign In.
Disabling Privacy Service
You must be logged in to Privacy Service as the Administrator to disable it.
To disable Privacy Service:
Right-click the McAfee icon , point to McAfee Privacy Service, and then
select
Sign Out.
NOTE
If Sign In is in the place of Sign Out, then you are already
signed out.
Updating McAfee Privacy Service
McAfee SecurityCenter regularly checks for updates to Privacy Service while your
computer is running and connected to the Internet. If an update is available,
McAfee SecurityCenter prompts you to update Privacy Service.
To manually check for updates:
Click the Updates icon located in the top pane.
User Guide85
McAfee Privacy Service
Removing and Re-installing Privacy Service
You must be logged in to Privacy Service as the Administrator to un-install the
product.
If this McAfee product is pre-installed on your computer, see your PC
manufacturer's documentation for information about removing and re-installing
Privacy Service.
NOTE
Removing Privacy Service erases all Privacy Service data.
86McAfee® Internet Security Suite®software
Removing Privacy Service
To remove Privacy Service:
1Save all of your work and close any open applications.
2Open the Control Panel:
Windows 98, Windows Me, and Windows 2000 users-Select Start, point to
Settings, and then click Control Panel.
Windows XP users-On your Windows taskbar, select Start, and then click
Control Panel.
3Open the Add/Remove Programs dialog box:
Windows 98, Me, and 2000 users-Double-click Add/Remove Programs.
Windows XP users-Click Add or Remove Programs.
4Select McAfee Privacy Service from the list of programs, and then click
Change/Remove.
Removing and Re-installing Privacy Service
5When asked to confirm the operation, click Yes.
6When you are prompted to restart your system, click Close. Your computer
restarts to complete the un-installation process.
Installing Privacy Service
To install Privacy Service:
1Go to the McAfee Web site and navigate to the Privacy Service page.
2Click the Download link on the Privacy Service page.
3Click Yes on any messages that appear asking if you want to download files
from the McAfee web site.
4Click Start Installation on the Privacy Service Installation window.
5When the download is complete, click Restart to restart your computer. Or,
click
Close if you need to save any work or quit any programs, then restart
your computer as you normally would. You must restart your computer in
order for Privacy Service to work properly.
After the computer restarts, you need to create the Administrator again.
If this McAfee product is pre-installed on your computer, see your PC
manufacturer's documentation for information about re-installing Privacy Service.
To add users, you must sign in to Privacy Service as the Administrator.
1Right-click the McAfee icon in the Windows system tray.
User Guide87
McAfee Privacy Service
Point to McAfee Privacy Service, then select Manage Users. The Select A User
2
dialog box appears.
3Click Add and enter the new user's name in the User name field.
Setting the password
1Enter a password in the Password field. The password can be up to 50
characters and can contain uppercase and lowercase letters and numbers.
2Enter the password again in the Confirm Password field.
3Select Make this user the Startup user if you want this user to be the Startup
user.
4Click Next.
When assigning passwords, consider the age of the person. For example, if you
assign a password to a young child, make the password simple. If you assign a
password to an older teenager or an adult, make the password more complex.
Setting the age group
Select the appropriate age-based setting, and then click Next.
Setting the cookie blocker
Select the appropriate option, and then click Next.
Reject all cookies—Renders cookies unreadable to the web sites that sent them.
Some web sites require you to enable cookies to work properly.
Prompt user to accept cookies—Enables you to decide if you want to accept or
reject cookies on a case-by-case basis. Privacy Service notifies you when a web
site you are about to view wants to send a cookie to your computer. After you
make your choice, you are not asked about that cookie again.
Accept all cookies—Allows web sites to read the cookies they send to your
computer.
NOTE
Some web sites, to work properly, require that cookies are
enabled.
Privacy Service accepts cookies from McAfee at all times.
88McAfee® Internet Security Suite®software
Setting the Internet Time limits
To grant unrestricted Internet use:
1Select Can use Internet anytime.
2Click Create. The new user appears in the Select A User list.
To grant limited Internet use:
1Select Restrict Internet usage, and then click Edit.
2On the Internet Time Limits page, drag across the time grid to select the tim e
and day the user can access the Internet.
You can specify time limits in thirty-minute intervals. Green portions of the
grid are the periods a user can access the Internet. Red portions show when a
user cannot access the Internet. If a user tries to use the Internet when they are
not allowed to, Privacy Service displays a message telling the user that they are
not allowed to use the Internet at this time. To modify the periods a user can
access the Internet, drag across the green portions of the grid .
Setting the Internet Time limits
3Click Done.
4Click Create. The new user appears in the Select A User page. If a user tries to
use the Internet when they are not allowed to, Privacy Service displays a
message telling the user that they are not allowed to use the Internet at this
time.
To prohibit Internet use:
Select
Restrict Internet Usage, and then click Create. When the user uses the
computer, they are prompted to sign in to Privacy Service. They can use the
computer, but not the Internet.
Creating Web Site Permissions with Keywords
Privacy Service maintains a default list of keywords and corresponding rules,
which determines whether a user of a certain age level is permitted to browse a
Web site where a keyword exists.
The Administrator can add his or her own allowable keywords to the Privacy
Service database and associate these with certain age levels. Keyword rules, added
by the Administrator, will override the rule associated with any matching
keyword in the default Privacy Service database. An Administrator can either
lookup existing keywords or specify new keywords to associate with certain age
levels.
To create keyword Web site permissions:
1Right-click the McAfee icon in the Windows system tray, point to Privacy
Service
, then select Options.
User Guide89
McAfee Privacy Service
2
3In the Word Lookup field, type a word for an age level.
4In the Permissions pane, select the age level to associate with the word. Age
Click the Keywords tab.
levels include the following:
Young Child
Child
Younger Teenager
Older Teenager
Adult
The keyword and its selected age group appear in the
Word List.
Age levels that appear above the associated level are blocked from accessing
Web sites which contain the word.
The age level, to which the word was assigned, and those that appear below it,
are allowed to access Web sites where the word exists.
To modify existing Web site permissions:
1Right-click the McAfee icon in the Windows system tray, point to Privacy
Service
2Click the Keywords tab.
3In the Word Lookup field, type a word that you want to modify, and click
Lookup. The word appears if it exists in the Privacy Service database.
, then select Options.
To edit users, you must sign in to Privacy Service as the Administrator.
Changing passwords
1Select the user whose information you are changing and click Edit.
2Select Password, and enter the user's new password in the New password field.
The password can be up to 50 characters and can contain uppercase and
lowercase letters and numbers.
90McAfee® Internet Security Suite®software
Enter the same password in the Confirm password field, and then click Apply.
3
4Click OK in the confirmation dialog box.
NOTE
An Administrator can change a user’s password without
knowing the user’s current password.
Changing a user’s information
1Select the user whose information you are changing and click Edit.
2Select User Info.
3Enter the new user name in the New user name field.
4Click Apply, and then click OK in the confirmation dialog box.
5To restrict a user to viewing the web sites in the Allowed Web Sites list, select
Restrict this user to Web sites in the "Allowed Web Sites" list.
Changing a user’s information
Changing cookie blocker setting
1Select the user whose information you are changing and click Edit.
2Select Cookies, and then select the appropriate option.
Reject all cookies—Renders cookies unreadable to the web sites that sent
them. Some web sites require you to enable cookies to work properly.
Prompt user to accept cookies—Enables you to decide if you want to accept
or reject cookies on a case-by-case basis. Privacy Service notifies you when
a web site you are about to view wants to send a cookie to your computer.
After you make your choice, you are not asked about that cookie again.
Accept all cookies—Allows web sites to read the cookies they send to your
computer.
3Click Apply, and then click OK in the confirmation dialog box.
Editing the Accept and Reject Cookie List
1Select Prompt user to accept cookies and click Edit to specify which web sites
are allowed to read cookies.
2Specify the list you are modifying by selecting Web sites that can set cookies or
Web sites that cannot set cookies.
3In the http:// field, enter the address of the web site that you are accepting or
rejecting cookies from.
User Guide91
McAfee Privacy Service
Click Add. The web site appears in the Web site list.
4
5Click Done when you are finished making changes.
NOTE
Some web sites, to work properly, require that cookies are
enabled.
Privacy Service accepts cookies from McAfee at all times.
Changing the age group
1Select the user whose information you are changing and click Edit.
2Select Age Group.
3Select a new Age Group for the user, and then click Apply.
4Click OK in the confirmation dialog box.
Changing Internet time Limits
1Select the user whose information you are changing and click Edit.
2Select Time Limits and do the following:
To permit unlimited Internet access:
1Select Can use Internet anytime and click Apply.
2Click OK in the confirmation dialog box.
To restrict Internet access:
1Select Restrict Internet usage and click Edit.
2On the Internet Time Limits page, select a green or red square, and then drag
across the grid to change existing times and days a user can access the Internet.
You can specify time limits in thirty-minute intervals. Green portions of the
grid are the periods a user can access the Internet. Red portions show when a
user cannot access the Internet. If a user tries to use the Internet when they are
not allowed to, Privacy Service displays a message telling the user that they are
not allowed to use the Internet at this time.
3Click Apply.
4On the Time Limits page, click OK.
5In the McAfee Privacy Service McAfee Privacy Service confirmation dialog,
OK.
click
92McAfee® Internet Security Suite®software
Changing the Startup user
The Administrator can change the Startup user at any time. If a Startup user
already exists, you do not have to deselect them as a Startup user.
1Select the user that you want to designate as the Startup user, and then click
Edit.
2Select User Info.
3Select Make this user the Startup user.
4Click Apply and then click OK in the confirmation dialog box.
NOTE
You can assign a Startup user from the Please Sign In dialog
also. For more information, see The Startup useron page 84
Removing users
Changing the Startup user
1Select the user you want to remove, and then click Remove.
2Click Yes in the confirmation dialog box.
3Close the Privacy Service window when you are finished making changes.
To configure Privacy Service options, you must sign in to Privacy Service as the
Administrator.
Blocking Web sites
1Click Options, and then select Block List.
2In the http:// field, enter the URL of the web site that you want to block, and
then click
Add. The web site appears in the Blocked Web Sites list.
NOTE
Users (including Administrators) that belong to the Adult
group level can access all web sites, even if the web sites are in
the Blocked Web Sites list. To test blocked web sites,
Administrators must log in as non-adult users.
Allowing Web sites
The Administrator can allow all users to view specific web sites. This overrides
Privacy Service's default settings and web sites added to the Blocked list.
1Click Options, and then select Allow List.
User Guide93
McAfee Privacy Service
In the http:// field, enter the URL of the web site that you want to allow, and
2
then click
Add. The web site appears in the Allowed Web Sites list.
Blocking information
The Administrator can prevent other users from sending specific personal
information over the Internet (the Administrator can still send this information).
When Privacy Service detects personal identifiable information (PII) in something
about to be sent out, the following occurs:
If you are an Administrator, you are prompted, and can decide whether to
send the information or not.
If the logged in user is not the Administrator, the blocked information is
replaced with MFEMFEMFE. For example, if you send the e-mail Lance
Armstrong wins tour, and Armstrong is set as personal information that is to be
blocked, then the e-mail that is actually sent is Lance MFEMFEMFE wins tour.
Adding information
1Click Options, and then select Block Info.
2Click Add. The Select Type pull-down menu appears.
3Select the type of information that you want to block.
4Enter the information in the appropriate fields, and then click OK. The
information you entered appears in the list.
Editing information
1Click Options, and then select Block Info.
2Select the information that you want to edit, and click Edit.
3Make the appropriate changes, and then click OK. If the information does not
need to be changed, click
Removing personal information
1Click Options, and then select Block Info.
Cancel.
2Select the information that you want to remove, and click Remove.
3Click Yes in the confirmation dialog box.
94McAfee® Internet Security Suite®software
Blocking Web bugs
Web bugs are small graphic files that can send messages to third parties, including
tracking your Internet browsing habits or transmitting personal information to an
external database. Third parties can then use this information to create user
profiles.
Blocking advertisements
To prevent web bugs from being loaded within browsed web pages, select
Web Bugs on this computer
.
Blocking advertisements
Advertisements are typically graphics served from a third party domain into a web
page or pop-up window. Privacy Service does not block ads that are served from
the same domain as the host web page.
Pop-ups are secondary browser windows presenting unwanted advertisements,
which automatically display when as you visit a web site. Privacy Service only
blocks those pop-ups that are automatically loaded when a web page loads.
Pop-ups initiated by clicking a link are not blocked by Privacy Service. To display
a blocked pop-up, hold down the CTRL key and refresh the web page.
Configure Privacy Service to block advertisements and pop-ups when you are
using the Internet.
1Click Options, and then select Block Ads.
2Select the appropriate option.
Block
Block ads on this computer—Blocks advertisements while you are using
the Internet.
Block Pop-Ups on this computer—Blocks pop-ups while you are using the
Internet.
3Click Apply, and then click OK in the confirmation dialog box.
To disable pop-up blocking, right-click the web page, point to
Blocker
, and deselect Enable Pop-up Blocker.
McAfee Pop-Up
User Guide95
McAfee Privacy Service
Allowing cookies from specific Web sites
If you block cookies or require to be prompted before they are accepted, and find
that certain web sites do not function properly, then configure Privacy Service to
allow the site to read its cookies.
1Click Options, and then select Cookies.
2In the http:// field, enter the address of the web site that needs to read its
cookies, and then click
list.
Sites
To view the event log, you must sign in to Privacy Service as the Administrator.
Then, select
saved log, select the Saved Logs tab.
Event Log and click any log entry to view its details. To save or view a
Add. The address appears in the Accept Cookie Web
Date and time
By default, the Event Log displays information in chronological order, with the
most recent events at the top. If the Event Log entries are not in chronological
order, click the Date and Time heading.
The date is displayed in a month/day/year format, and the time is displayed in
the A.M./P.M. format.
User
The user is the person who was logged in and using the Internet at the time Privacy
Service recorded the event.
Summary
Summaries display a short, concise description of what Privacy Service is doing to
protect users and what users are doing on the Internet.
Event Details
The Event Details field displays entry details.
Saving the Current Log
The Current Log page displays information about recent administrative and user
actions. You can save this information to view at a future date.
96McAfee® Internet Security Suite®software
To save a current event log
1Sign In to Privacy Service as the Administrator.
2Select Event Log.
3On the Current Log page, click Save Log.
4In the File name field, type the name for the log file.
5Click Save.
Viewing Saved Logs
The Current Log page displays information about recent administrative and user
actions. You can save this information to view at a future date.
To view a saved log
1Sign In to Privacy Service as the Administrator.
Viewing Saved Logs
2Select Event Log.
3On Current Log page, click Open Log.
4In the Select a saved log to view dialog, select the backup database file, and click
Open.
To access the utilities, you must sign in to Privacy Service as the Administrator,
and then click
To remove files, folders, or the entire contents of disks, click
save your Privacy Service database settings, click
click
Restore.
Utilities.
McAfee Shredder. To
Backup. To restore your settings,
Erasing files permanently using McAfee Shredder
McAfee Shredder protects your privacy by quickly and safely erasing
unwanted files.
Deleted files can be recovered from your computer even after you empty your
Recycle Bin. When you delete a file, Windows merely marks that space on your
disk drive as no longer being in use, but the file is still there.
User Guide97
McAfee Privacy Service
Why Windows leaves file remnants
To permanently delete a file, you must repeatedly overwrite the existing file with
new data. If Microsoft Windows securely deleted files, every file operation would
be very slow. Shredding a document does not always prevent that document from
being recovered because some programs make tem p or ary hidden copies of open
documents. If you only shred documents that you see in Explorer, you could still
have temporary copies of those documents. We recommend that you periodically
shred the free space on your disk drive to insure that these temporary copies are
permanently deleted.
NOTE
With computer forensics tools, tax records, job resumes, or
other documents that you had deleted, could be obtained.
What McAfee Shredder erases
With McAfee Shredder, you can securely and permanently erase:
One or more files or folders
An entire disk
The trails that your web surfing leaves behind
Permanently erasing files in Windows Explorer
To shred a file via Windows Explorer:
1Open Windows Explorer, then select th e file or files that you want to shred.
2Right-click your selection, point to Send To, and then select McAfee Shredder.
Emptying the Windows Recycle Bin
If files are in your Recycle Bin, McAfee Shredder offers a more secure method of
emptying your Recycle Bin.
To shred the contents of the Recycle Bin:
1On your Windows desktop, right-click the Recycle Bin.
2Select Shred Recycle Bin, then follow the on-screen instructions.
Customizing Shredder settings
You can:
Specify the number of shredding passes.
Show a warning message when you shred files.
Check your hard disk for errors before shredding.
98McAfee® Internet Security Suite®software
Backing up the Privacy Service database
Add McAfee Shredder to your Send To menu
Place a Shredder icon on your Windows desktop.
To customize Shredder settings, open McAfee Shredder, click
Properties, and then
follow the on-screen instructions.
Backing up the Privacy Service database
You can restore the Privacy Service database two ways. If your database becomes
corrupted or is deleted, Pr ivacy Service prompts you to restore the Privacy Service
database. Alternatively, you can restore your database settings while running
Privacy Service.
1Click Utilities, and then select Backup.
2Click Browse to select a location for the database file, and then click OK.
3Enter a password in the Password field.
4Enter the password again in the Confirm password fiel d, and then click Backup.
5Click OK in the confirmation dialog box.
6Close the Privacy Service window when you are finished.
NOTE
Keep this password secret, and do not forget it. You cannot
restore Privacy Service settings without this password.
Restoring the Backup Database
1Privacy Service provides two ways to restore your original settings:
Load your backup database file after Privacy Service prompts you to
restore your settings because the database is corrupt or deleted.
Load your backup database file while running Privacy Service.
To restore your Privacy Service Settings when prompted:
1Click Browse to locate the file.
2Type your password in the Password field.
3Click Restore.
If you did not back up the P rivacy Service database, or you forg ot your Backup
password, or restoring the database does not work, please remove and
re-install Privacy Service.
To restore your Privacy Settings while running Privacy Service:
User Guide99
McAfee Privacy Service
1
2Click Restore.
3Click Browse, and type the path and name for the backup file.
4Click Open.
5Type your password in the Password field.
6Click Restore, and then click OK in the McAfee Privacy Service confirmation
These instructions do not apply to the Administrator.
You can change your password and user name. We recommend that you change
your password after the Administrator gives it to you. We also recommend that
you change your password once a month, or if you think someone knows your
password. This helps prevent others from using the Internet with your user name.
Click the Utilities tab.
dialog.
Changing your password
1Right-click the McAfee icon, point to McAfee Privacy Service, and then select
Options.
2Click Password and enter your old password in the Old password field.
3Enter your new password in the New password field.
4Type your new password again in the Confirm password field, and then click
Apply.
5Click OK in the confirmation dialog box. You now have a new password.
Changing your user name
1Right-click the McAfee icon, point to McAfee Privacy Service, and then select
Options.
2Click User Info.
3Type your new user name in the New user name field and then click Apply.
4Click OK in the confirmation dialog box. You now have a new user name.
100McAfee® Internet Security Suite®software
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.