Mcafee OFFICE 3.1 User Manual

McAfee Office

Version 3.1
User’s Guide
COPYRIGHT
Copyright (c) 1999-2000 Networks Associates Technology, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in an y form or by any means without the written permission of Networks Associates Technology, In c., or its suppliers or affiliate companies.
* ActiveHelp, Bomb Shelter,Building a World of Trust,CipherLink,Clean-Up,Cloaking, CNX, * ActiveHelp, Bomb Shelter, Building a World of Trust, CipherLink, Clean-Up, Cloaking, CNX, Compass 7, CyberCop, CyberMedia, Data Security Letter, Discover, Distributed Sniffer System, Dr Solomon's, Enterprise Secure Cast, First Aid, ForceField, Gauntlet, GMT, GroupShield, HelpDesk, Hun ter, ISDN Tel/Scope, LM 1, LANGuru, LeadingHelp Desk Technology, Magic Solutions, MagicSpy, MagicTree, Magic University, MagicWin, MagicWord, McAfee, McAfeeAssociates, MoneyMagic,M ore Power To You, MultimediaCloaking, NetCrypto, NetOctopus, NetRoom, NetScan, Net Shield, NetShield, NetStalker, Net Tools, Network Associates, Network General, Network Uptime!, NetXRay, Nuts & Bolts, PC Medic, PCNotary, PGP, PGP (Pretty Good Privacy), PocketScope, Pop-Up, PowerTelnet, Pretty Good Privacy, PrimeSupport, RecoverKey, RecoverKey-International, ReportMagic, RingFence, Router PM, Safe & Sound, SalesMagic, SecureCast, Service Level Manager, ServiceMagic, Site Meter, Sniffer, SniffMaster, SniffNet, Stalker, Statistical Information Retrieval (SIR), SupportMagic, Switch PM, TeleSniffer,TIS, TMach, TMeg, Total Network Security,Total Network Visibility, Total Service Desk, Total Virus Defense, T-POD, Tr u sted Mach,Trusted Mail, Uninstaller, Vi rex, Virex-PC, Virus Fo rum, ViruScan, VirusScan, VShield, WebScan, WebShield, WebSniffer, WebStalker, WebWall, and ZAC 2000 are registered trademarks of Network Associates and/or its affiliates in the US and/or other countries. All other registered and unregistered trademarks in this document are the sole property of their respective owners.
LICENSE AGREEMENT
NOTICE TO ALL USERS: CAREFULLY READ THE FOLLOWING LEGAL AGREEMENT ("AGREEMENT"), FOR TH E LICENSE OF SPECIFIED SOFTWARE ("SOFTWARE") BY NETWORK ASSOCIATES, INC . ("McAfee"). BY CLICKING THE ACCEPT BUTTON OR INSTALLING THE SOFTWARE, YOU (EITHER AN INDIVIDUAL OR A SIN GLE ENTITY) CONSENT TO BE BOUND BY AND BECOME A P ARTY TO THIS AGREEMENT. IF YOU DO NOT AGREE TO ALL OF THE TERMS OF THIS AGREEMENT, CLICK THE BUTTON TH AT INDICATES THAT YOU DO NOT ACCEPT THE TERMS OF THIS AGREEMENT AND DO NOT INSTALL THE SOFTWARE. (IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO THEPLACEOF PURCHASE FORA FULL REFUND.)
1. License G rant. Subject to the payment of the applicable license fees, a nd subject to the terms and
conditions o f this Agreement, McAfee hereby grants t o you a non-exclusive, non-transferable rig ht to use one copy of the specified version of the Software and the accompanying documentation (the "Documentation"). You may install one copy of the Software on one computer, workstation, personal digital assistant, pager, "smart phone" or other electronic device for which the Software was designed (each, a "Client Device"). I f the Software is licensed as a su ite or bundle with more than o n e specified Software product, this license applies to all such specified Software products, subjectto any restrictions or u sage terms specifiedon the ap plicable p r ice list or product
packaging
that apply to any of such Software products individually.
a. Use. The Software is licensed as a single product; it may not be used on more than one Client
Device or by more than one user at a time, except as set forth in this Section 1. The Software is "in use" o n a Client Device when it is loaded into the temporary memory (i.e., random-access memory or RAM) or installed into t he permanent memory (e.g., hard disk, CD-ROM, or other
Issued August 2000 / McAfee Office v3.1
storage device) of that ClientDevice. This license authorizes you to make one copy of the Software solely for backup or archivalpurposes,providedthat the copy you make contains all of the Software's proprietary notices.
b. Server-Mode. You may use the Software on a Client Device as a server ("Server") within a
multi-user or networked en vironment ("Server-Mode") only if such use is permitted in the applicable price list or productpackagingfor the Software. A separate license is required for each Client Device or "seat" that may connect to the Server at any time, regardless of whether such licensed Client Devices or seats are concurrently connected to, accessing or using the Software. Use of so ftware or hardware that reduces the number of Client Devices or seats directlyaccessing or utilizing the Software (e.g ., "multiplexing" or "pooling"software or hardware) does not reduce the number of licenses required (i.e., the required number of licenses would equal the number of distinct inputs to the multiplexing or pooling software or hardware "front end"). If the number of Client Devices or seats that can connect to the Software can exceed the number of licenses you have obtained, then you must have a reasonable mechanism in place to ensure that your use of the Software does not exceed the use limits specified for the lic enses you have obtained. This license authorizes you to make or download one copy of the Documentation for each Client Device or seat that is licensed, provided that each such copy contains all of the Documentation's proprietary notices.(i.e., the required number of licenses would equal the number of distinct inputs to the multiplexing or pooling software or hardware "front end"). If the number of Client Devices or seats that can connect to the Software can exceed the number of licenses you have obtained, then you must have a reasonable mechanism in place to ensure that your use of the Software does not exceed the use limits specified for the licenses you have obtained. This license authorizes you to make or download one copy of the Documentation for each Client Device or seatthat is licensed, providedt hat each such copy containsallof the Documentation'sproprietary notices.
c. VolumeLicenses.If the Software is licensed with volume lic ense termsspecifiedin thea pplicable
price list or product packaging for the Software, you may make, use and install as many additional copies of the Software o n the number of Client Devices as the volume license authorizes. You must have a reasonable mechanism in place to ensure that the number of Client Devices on which the Software has been installed d oes not exceed the number o f licenses you have obtained. This license authorizes you to make or download one copy of the Documentation for each additional copy authorized by the volume license, provided that each such copy contains all of the Documentation's p roprietary notices.
2. Term. This Agreement is effective for an unlimited duration unless and until earlier terminated as
set forth herein. This Agreement will terminate automatically if you fail to comply with any of the limitations or other requirements described herein. Upon any termination or expiration of this Agreement,you must destroy all copies of theS oftware and theDocumentation. Youmay terminate this Agreement at any point by destroying all copies of the Software and the Documentation.
3. Updates. For the time period specified in the applicable price list or product packaging for the
Software you are entitled to download revisions or updates to the Software when and as McAfee publishes them via its electronic bulletin board system, website or through o ther online services. For a period of ninety (90) days from the date of the o riginal purchase of the Software, you are entitled to download one (1) revision or upgrade to the Software when and as McAfee publishes it via its electronic bulletin board system, website or through other online services. After the specified time period,you have no further rights to receive any revisions or upgrades without purchase of a new license or annual upgrade plan to the Software.
4. Ownership Rig h ts. The Software is p rotected by United States copyright laws and international
treaty provisions. McAfee and its suppliers own and retain all righ t, title and interest in and to the Software, including all copyrights, patents, trade secret rights, trademarks and other intellectual property rights therein. Your possession, installation, or use of the Software does not transfer to you any title to the intellectual property in the S oftware, and you will not a cquire any rights to the Software except as expressly set forth in this Agreement. All copies of the Software and Documentation made hereunder must contain the same proprietary notices that appear on and in the Software and Documentation.
User’s Guide iii
5. Restrictions. You may not rent, lease, loan or resell the Software. You may not permit
third parties to benefit from the use or functionality of the Software via a timesharing, service bureau or o ther arrangement, except to the extent such use is specified in the applicable list price or product packaging for the Software. You may not transfer any of the rights granted to you under this Agreement. You may not r everse engineer, decompile, or disassemble the Software, except to the extent the foregoing restriction is expressly prohibited by applicable law. You may not modify, or create derivative works based upon, the Software in whole or in part. You may not copy the Software or Documentation except as expres sly permitted in Section 1 above. Y ou may not remove any proprietary notices or labels on the Software. All rights not expressly set forth hereunder are reserved by McAfee. McAfee reserves the right t o periodically conduct audits upon advance written notice to verify compliance with the terms of this Agreement.
6. Warranty and Disclaimer a. Limited Warranty. McAfee warrants that for sixty (60) days from the date of original
purchasethe media(e.g., diskettes)on which the Software is contained will be freefrom defects in materials and workmanship.
b. Customer Remedies. McAfee's and its suppliers' entire liability and your exclusive
remedy for any br each of the foregoing warranty shall be, at McAfee's option, either (i) return of the purchase price paid fo r t he license, if a ny , o r (ii) replacement o f the defective media in which the Software is c ontained. You must return the defective media to McAfee at your expensewith a copy of your receipt. This limited warranty is void if the defect has resultedfrom accident,abuse, or misapplication. Any replacement media will be warranted for the remainder of the original warranty period. Outside the United States, this remedy is not available to the ex tent McAfee is subject to restrictions under United States export control laws and regulations.
c. Warranty Disclaimer. Except for the limited warranty set forth herein, THE
SOFTWARE IS PROVIDED "AS IS." TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, MCAFEE DISCLAIMS ALL WARR A NTIES, EITHER EXPRESS OR IM PLIED, INCLUDING BUT NOT LIMITED TO IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULA R PURPOSE, AND NONINFRINGEMENT WITH RESPECT TO THE SOFTWARE AND THE ACCOMPANYING DOCUMENTATION. YOU ASSUME RESPONSIBILITY FOR SELECTING THE SOFTWARE TO ACHIEV E YOUR INTENDEDRESULTS,AND FOR THE I NSTALLATION OF, USE OF, AND RESULTS OBTAINED FROM THE SOFTWARE. WITHOUT LIMITING THE FOREGOING PROVISIONS, MCAFEE MAKES NO WARRANTY THAT THE SOFTWARE WILL BE ERROR-FREE OR FR EE FROM INTERRUPTIONS OR OTHER FAILURES OR THAT THE SOFTWARE WILL MEET YOUR REQUIREMENTS. SOME STATES AND JURISDICTIONS DO NOT ALLOW LIMITATIONS ON IMPLIED WARRANTIES, SO THE ABOVE LIMITATION MAY NOT APPLY TO YOU. The foregoing provisions shall be enforceable to the maximum extent permitted by applicable law.
iv McAfee Office
7. Limitation of Liability. UNDER NO CIRCUMSTANCES AND UNDER NO LEGAL THEORY, WHETHER IN TORT, CONTRACT, OR OTHERWISE, SHALL MCAFEE OR ITS SUPPLIERS BE LIABLE TO YOU OR TO ANY OTHER PERSON FOR ANY INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES OF ANY CHARACTER INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF GOODWILL, WORK STOPPAGE,COMPUTERFAILURE OR MALFUNCTION,OR FOR ANY AND ALL OTHER DAMAGES OR LOSSES. IN NO EVENT WILL MCAFEE BE LIABLE FOR ANY DAMAGES IN EXCESS OF THE LIST PRICE MCAFEE CHARGES FOR A LICENSE TO THE SOFTWARE, EVEN IF MCAFEE SHALL HAVE BEEN ADVISED OF T HE POSSIBILITY OF SUCH DAMAGES. THIS LIMITATION OF LIABILITY SHALL NOT APPLY TO LIABILITY FOR DEATH OR PERSONAL INJURY TO THE EXTENT THAT APPLICABLE LAW PROHIBITS SUCH LIMITATION. FURTHERMORE, SOME STATES AND JURISDICTIONS DO NOT ALLOW T HE EXCLUSION OR LIMITATION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THIS LIMITATION A ND EXCLUSION MAY NOT APPLY TO YOU. The foregoing provisions shall be enforceable to the maximum extent permitted by applicable law.
8. United States G overn ment. TheSoftware andaccompanying Documentationaredeemed to be "commercial computer software" and "commercial computer software documentation," respectively, pursuant to DFAR Section 227.7202 and FAR Section
12.212, as applicable. Any use, modification, reproduction, release, performance, d isplay or disclosure of the Software and accompanying Documentation by the United States Government shall be governed solely by the terms of this Agreement and s hall be prohibited except to the extent expressly permitted by the terms of this Agreement.
9. Export Controls. Ne ither the Software nor the Documentation and underlying information or technology may be downloaded or otherwise exported or re-exported (i) into (or to a national or resident of ) Cuba, Iran, Iraq, Libya, North Korea, Sudan, Syria or any other country to which the United States has embargoed goods; or (ii) to anyone on the United States Treasury Department's list o f Specially Designated Nations or the United States Commerce Department's Table of Denial Orders. By downloading or using the Software you are agreeing to the foregoing and you are certifying that you are not located in, under the control of, or a national or resident of any such country or on any such list.
IN ADDITION, YOU SHOULD BE AWARE OF THE FOLLOWING: EXPORT OF THE SOFTWARE MAY BE SUBJECT TO COMPLIANCE WITH THE RULES AND REGULATIONS PROMULGATED FROM TIME TO TIME BY THE BUREAU OF EXPORT ADMINISTRATION, UNITED STATES DEPARTMENT OF COMMERCE, WHICH RESTRICT THE EXPORT AND RE-EXPORT OF CERTAIN PRODUCTS A ND TECHNICAL DATA. IF THE EXPORT OF THE SOFTWARE IS CONTROLLED UNDER SUCH RULES AND REGULATIONS, THEN THE SOFTWARE SHALL NOT BE EXPORTED OR RE-EX PORTED, DIRECTLY OR INDIRECT LY , (A) WITHOUT ALL EXPORT OR RE-EXPORT LICENSES AND UNITED STATES OR OTHER GOVERNMENTAL APPROVALS REQUIRED BY ANY APPLICABLE LAWS, OR (B) IN VIOLATION OF ANY APPLICABLE PROHIBITION AGAINST THE EXPORT OR RE-EXPORT OF ANY PART OF THE SOFTWARE.
User’s Guide v
SOME COUNTRIES HAVE RESTRICTIONS ON THE USE OF ENCRYPTION WITHIN THEIR BORDERS, OR THE IMPORT OR EXPORT OF ENCRYPTION EVEN IF FOR ONLY TEMPORARY PERSONAL OR BUSINESS USE. YOU ACKNOWLEDGE THAT THE IMPLEMENTATION AND ENFORCEMENT OF THESE LAWS IS NOT ALWAYS CONSISTENT AS TO SPECIFIC COUNTRIES. ALTHOUGH THE FOLLOWING COUNTRIES ARE NOT AN EXHAUSTIVE L IST THERE MAY EXIST RESTRICTIONS ON THE EXPORTATION TO, OR IMPORTATION OF, ENCRYPTION BY: BELGIUM, CHINA (INCLUDING HONG KONG), FRANCE, INDIA, INDONESIA, ISRAEL, RUSSIA, SAUDI ARABIA, SINGAPORE, AND SOUTH KOREA. YOU ACKNOWLEDGE IT IS YOUR ULTIMATE RESPONSIBILITY TO COMPLY WITH ANY AND ALL GOVERNMENT EXPORT AND OTHER APPLICABLE LAWS AND THAT MCAFEE HAS NO FURTHER RESPONSIBILITY AFTER THE INITIAL SALE TO YOU WITHIN THE ORIGINAL COUNTRY OF SALE.
10.High Risk Activities. The Software is not fault-tolerant and is not designed or intended for use in hazardous environments requiring fail-safe performance, including without limitation, in the operation of nuclear facilities, aircraft navigation or communication systems, air traffic c o ntrol, weapons systems, direct life-support machines, or any other application in which the failure of the Software could lead directly to death, personal injury, or severe physical or property damage (collectively, "High Risk Activities"). McAfee expressly disc laims any exp ress or imp lied warranty of fitness for High Risk Activities.
11.Miscellaneous. This Agreement is governed by the laws of the United States and the State of California, without reference to conflict of laws principles. The application of the United Nations Convention of Contracts for the International Sale of Goods is expressly excluded. This Agreement s ets forth all rights for the user of theSoftware and is theentire agreement between the parties. This A greement supersedes any other communications with respect to the Software and Documentation. This Agreement may not be modified except b y a written addendum issued by a duly authori zed representative of Mc Afee. N o provision hereof shall be deemed waived unless such w a iver shall be in writing and signedby McAfee or a duly authorizedrepresentative of McAfee. If any provisionof this Agreement is held invalid, the re mainder of this Agreement shall continue in full force and effect. The parties confirm that it is their w ish that this Agreement has been written in the Eng lish language only.
12.McAfee Customer Contact. If you have any questions concerning these terms and conditions, o r if you would like to contact McAfee for any other reason, please call (408) 988-3832,fax(408) 970-9727, or write: McAfeeSoftware,3965 Freedom Circle,Santa C lara, California 95054. http://www.mcafee.com.
Statements made to you in the courseof this sale are subject to the Year 2000 Information and Readiness DisclosureAct (PublicLaw 105-271). In the case of a dispute, this Act m ay reduce your legal rights regarding the use of any statements regarding Year 2000 readiness, unless otherwise specified in your contractor tariff.
vi McAfee Office
Table of Contents
Chapter1. WelcometoMcAfeeOffice...........................15
Programsandfeatures............................................15
Centralinterface.............................................15
McAfeeVirusScan ...........................................16
McAfeeUtilities..............................................16
McAfeeUnInstaller...........................................17
McAfeeInternetGuardDog....................................18
McAfeeFirewall .............................................19
McAfeePGPPersonalPrivacy .................................19
Otherfeatures ...................................................20
McAfeeVirtualOffice .........................................20
McAfeeontheWeb ..........................................20
McAfeeWebView............................................20
Improvements ...................................................21
Wheretogoformoreinformation...................................21
Chapter2. InstallatingMcAfeeOffice ...........................23
Systemrequirements .............................................23
Individualproductrequirements ...............................23
Installation ......................................................24
Chapter3. McAfeeVirusScan..................................27
HowdoesVirusScansoftwarework?................................27
WhatcomeswithVirusScansoftware? ..............................27
What’snewwithVirusScan? .......................................31
StartingtheVirusScanapplication ..................................33
DisplayingtheVirusScanapplicationmainwindow................33
Ifyoususpectyouhaveavirus... ...................................37
WhatdoestheVShieldscannerdo?.................................40
WhyusetheVShieldscanner?.................................41
Browserande-mailclientsupport ..............................42
EnablingorstartingtheVShieldscanner.............................42
User’s Guide vii
Table of Contents
UsingtheVShieldconfigurationwizard ..............................47
UsingtheVShieldshortcutmenu ...................................51
Chapter 4. McAfee Utilities . . . .................................53
McAfeeUtilitiescentralwindow ....................................53
McAfeeUtilitiesProperties ........................................54
CommonDialogstab .........................................54
IconAnimationtab ...........................................54
WindowPatternstab .........................................55
DiskToolstab...............................................55
StartMenutab ..............................................56
TrashGuardtab .............................................56
FileShreddertab ............................................57
QuickCopytab..............................................57
ZipFileManagertab..........................................58
RepairandRecover ..............................................58
DiskMinder.................................................58
UsingDiskMinder .......................................58
CustomizingDiskMinderProperties........................60
CreatingandrevertingtoanUndofile ......................61
UsingDiskMinderinDOS ................................61
McAfeeImage ...............................................62
CreatinganImageofyourdisks ...........................62
SettingImageProperties .................................63
RestoringdrivesfromanImagefile.........................63
RescueDisk ................................................65
UsingaRescueDisk .....................................66
DiskMinderinDOS ......................................66
FirstAid....................................................66
Using CheckUp .........................................66
UsingUniversalUndo ....................................68
UsingAskAdvisor.......................................70
CreatingaRescueDisk...................................70
DiscoverPro ................................................71
DiscoverProwindow ....................................71
viii McAfee Office
Table of Contents
Workingwithadvancedinformation ........................72
SpecifyingDiscoverProsettings...........................74
Usingthemulti-windowviews .............................74
Undelete ...................................................75
CleanandOptimize...............................................76
CleanupWizard .............................................76
DiskTune ..................................................76
UsingDiskTunetodefragmentorconsolidateadisk..........77
Theharddiskmap.......................................78
Settingadvancedoptions.................................78
Specifyingfilecategories .................................80
RegistryWizard .............................................82
Backing up & Restor ing the Registry .......................83
CleaningtheRegistry ....................................84
RepairingtheRegistry ...................................84
TuninguptheRegistry ...................................85
RegistryPro ................................................86
FindingaRegistryentry ..................................86
Findingorphans.........................................87
EditingaRegistryentry ..................................87
ImportingaRegistryfile ..................................87
ExportingaRegistryfile ..................................87
RefreshingtheRegistrydatabase ..........................87
LaunchRocket ..............................................88
QuickCopy .................................................88
ShortcutWizard .............................................89
Prevent an d Protect . . . ...........................................89
CrashProtector .............................................89
RecoveringfromanApplicationError.......................89
Recovering a crashed, locked-up, or hung application .........90
SelectingCrashProtectorProperties .......................91
Deactivating Crash Protector ..............................92
WinGauge ..................................................93
Themostimportantgauges ...............................93
Workingwithgauges.....................................94
User’s Guide ix
Table of Contents
SecureandManage .............................................111
PGP ..........................................................119
ManipulatingtheWinGaugewindow ........................95
ChangingWinGaugeproperties............................97
Savingandloadinggaugesettings ........................101
VirusScan .................................................102
TrashGuard ...............................................102
SpecifyingTrashGuardProperties ........................102
Safe&Sound ..............................................103
RegularbackupswithSafe&Sound .......................103
Creatingautomaticbackups..............................104
Definingyourbackupstrategy............................104
Creating a backup set ...................................105
Restoringfilesfromabackupset .........................108
Modifyingordeletingbackupsets.........................109
Repairingandrebuildingabackupset .....................110
EZSetup ..................................................111
Systemtab ............................................111
Explorertab ...........................................113
Run/Add/Removetab ...................................115
SendTotab ...........................................116
ContextMenutab.......................................116
LaunchPad................................................117
StartingLaunchPad ....................................118
Adding,updating,andremovingicons .....................118
ManipulatingtheLaunchPadwindow......................118
UsingPGP.................................................120
Tocreateakeypair .....................................120
Encryptingemailsandfiles ..............................121
Decryptingemailsandfiles ..............................122
PGPdisk...................................................122
CreatinganewPGPdiskvolume ..........................123
Add/RemovePublicKeys ................................124
McAfeeShredder ...........................................125
Shreddingselectedfiles .................................125
x McAfee Office
Table of Contents
Shreddingnon-filedata..................................127
McAfeeZipManager ........................................127
ZipFiles ..............................................128
UsingZipManWizard ...................................128
SelectingMcAfeeZipManagerproperties ..................129
Extracting,archiving,oraddingfiles.......................131
Buildingself-extractingarchives ..........................131
SwitchingbetweentheWizardandMcAfeeZipManager ......131
UsingAdvancedMcAfeeZipManager......................131
McAfeeOilChange..........................................133
Chapter5. McAfeeFirewall...................................135
AboutMcAfeeFirewall ...........................................135
HowMcAfeeFirewallworks.......................................135
AboutWinsock2................................................136
ConfiguringMcAfeeFirewall ......................................136
Applications ...............................................137
Controlapplications ....................................137
Defaultsettingsforapplications ..........................137
Systems...................................................138
Control system .........................................138
DefaultsettingsforSystemactivity........................138
Password Protection ....................................139
InstructionsforAdministrators....................................139
ConfiguringNetwork,DisplayandLoggingControls..............139
NetworkControl........................................139
DisplayControl ........................................140
LoggingControl........................................140
ConfiguringApplications ....................................140
ConfiguringSystemSettings .................................141
ConfigurationafterAdding/RemovingNetworkDevices ...........142
Using Password Protection ...................................142
Chapter6. McAfeeUnInstaller ................................145
UsingMcAfeeUnInstaller.........................................145
User’s Guide xi
Table of Contents
UsingQuickClean...............................................150
Using Spa ceMaker ..............................................151
UsingRemove..................................................152
UsingTransport ................................................153
UsingArchive ..................................................154
UsingMove ....................................................155
UsingBackTrack................................................156
UsingRestore ..................................................158
UsingPowerClean ..............................................160
AboutReportsdialogbox ........................................168
CreatingtheSmartLinksdatabase .............................145
CustomizationInterview .....................................146
UnInstallerwizards..........................................146
AboutPowerClean ..........................................148
AboutMcAfeeGuardian .....................................148
HowdoIsetupQuickCleantorunautomatically?................150
HowdoIscheduleQuickCleantorunataspecifictime? ..........151
How do I rebuild a transported application on another computer? . .153
How do I set BackTrack Monitor to ru n in the background? ........156
HowdoImonitorinstallationofasingleapplication? .............157
HowdoIundoanapplicationinstallationthatImonitored?........157
HowdoIrestoredeletedfiles? ................................159
WhydoesthePowerCleanfeatureopeninread-onlymode? .......161
PowerCleanmenus .........................................165
Usingthetabpanes?........................................166
Whatdothecolorcodesmean? ..........................166
ChangingthedefaultsforthePowerCleanfeature................167
ViewingchangesdoneusingthePowerCleanfeature ........168
Chapter7. McAfeeInternetGuardDog .........................171
HowInternetGuardDogworks ....................................171
UserSetup ................................................171
VirusScan .................................................171
ActivityLogs ..............................................172
SecurityCheck .............................................172
xii McAfee Office
Table of Contents
InternetGuardDogandyouronlineconnection ......................172
InternetGuardDogfeatures ......................................172
Protection from privacy thr eats . . .............................173
Protection from security threats . .............................173
Protectionfromvirusthreats .................................174
UsingtheInternetGuardDogInterview.............................174
HowInternetGuardDogAdministratorworks........................175
Self-Administrator ..........................................176
How password prote ction works in Guard Dog ......................176
UsingtheInternetGuardDogHomescreen .........................176
HowUserSetupworks ......................................177
UserProfile............................................178
HowInternetFilteringworks .................................178
Internetfiltering ........................................178
ViewingActivityLogs .......................................179
PerformingaSecurityCheck .................................180
Responding to Product Name alert messages . . .................180
Using Browser B uddy to retrieve or store your Web site passwords 181
Privacy features ................................................183
What Cookie Blocker does ...................................183
WhatIdentityProtectordoes .................................184
WhatWebTrailCleanerdoes .................................185
WhatSearchFilterdoes .....................................185
Securityfeatures................................................185
What Gatekeeper does . . ....................................185
WhatFileGuardiandoes .....................................186
WhatPasswordManagerdoes ...............................187
Chapter 8. PGP Personal Privacy . . . ...........................189
Using PGP Personal Privacy . . ....................................189
BasicstepsforusingPGPPersonalPrivacy ....................190
Running PGP Personal Privacy ....................................191
FromtheSystemtray........................................192
PerformingPGPfunctionsfromtheclipboard ...............192
OpeningthePGPkeyswindow............................192
User’s Guide xiii
Table of Contents
SettingPGPPreferences ................................192
GettingHelp ...........................................193
QuittingPGP ..........................................193
Fromsupportedemailapplications ............................193
UsingPGP/MIME .......................................194
FromtheWindowsExplorer ..................................194
Selectingrecipients.....................................194
Takingshortcuts .......................................195
FromthePGPtoolsapplication................................195
PGPdisk .......................................................195
CreatinganewPGPdiskvolume ..............................196
Changing a passphrase . . ....................................197
Add/RemovePublicKeys ....................................198
AppendixA. ProductSupport.................................199
Customerservice ...........................................199
Technicalsupport ..........................................200
Supportviatheweb.....................................200
Telephonesupportnumbers .............................200
Index......................................................201
xiv McAfee Office

1Welcome to McAfee Office

Thankyou fo r purchasingMcAfee Office—a suiteof powerful and easy-to-use Windows software utilities that helps keep your PC working at optimum efficiency and speed, as well as diagnosing, repairing,and protectingyour PC and its valuable data.
McAfee Office contains a suite of utility programs that provide you with diagnostic, preventive, and security tools to help maintain your PC’s health and well-be ing. Use McAfee Office utilities together, or individually, to protect your PC from viruses, ensure privacy of your PC’s data files, and improve overall performance of your computer.

Programs and features

Central interface

Through a central interface, McAfee Office improvs integration with the individual components of the product suite.For example, instead of launching a separate Mc Af e e Utilities main m en u, a user can access all functions of McAfee Utilities directly from the McA fee Office Central interface.
1
Figure 1-1. McAfee Office main win do w
User’s Guide 15
Welcome to McAfee Office

McAfee VirusScan

McAfee Vi rusScan provides complete desktop protectionwith an array of scanning features that keep your system clean, mean, and virus-free. Using onlythe latest technology, VirusScan d etects 100%of viruses including floppy disks, Internet downloads, email attachments, Intranets, shared files, CD-ROM, and online services (even inside the most popular compressed file types).
Hunter, VirusScan’s award-winning scanning engine, includes
ground-breaking variant detection and heuristic technology that detects even new un known macro viruses before they have a chance to inflict damage.
SecureCast ensures that your virus signature files are always the latest.
New updates are pushed directly to your desktop the moment they ar e released.
AVERT (Anti-Virus Emergency Research Team) staffs more than 85
experiencedv irus r esearchers around thew orld, providing c ustomers with unparalleled follow-the-sun support. AVERT even makes hourly beta virus signature files available to all customers 24 hours a day.

McAfee Utilities

McAfee Utilities helps you keep your PC working at optimum efficiency and speed. You can diagnose and repair your system and application software; create a recovery disk and image snapshots of critical sectors of y our hard drives; avoid lost data during application crashes; create backup sets automatically or interactively; back up to a protected volume file, which makes your data recoverable when it otherwise would not be.
From the mo ment you install McAfee Utilit ies, it begins protecting your PC. First, by helping create a recovery diskthat you can use if problems arise. Second, by activating Bomb Shelter, which immediately protects you against losingun saved informationin the eventthat anapplicationcrashes. Next, you can create a backup set of your valuable d ata with Safe & Sound.
After repairing and protecting your system, you’re ready to use other McAfee Utilities to clean and optimize , prevent and protec t, and secure and manage information.
McAfee U tilities can diagnose,repair, and protect your system in the following ways:
Discover shows a wealth of information about your hardware and
software.Italsoletsyourundiagnosticsandbenchmarktests.
16 McAfee Office
Welcome to McAfee Office
DiskMinder safely, easily, a nd quickly diagnoses and repairs existing or
potential disk problems.
McAfee Image saves a cop y of critical disk information in a file and
restores the image later if your disk is corrupted.
Registry Wizard allows you to easily maintain, troubleshoot, or repair the
Registrydatabase.
Rescue Disk createsa custom rescuedisk that you can use to bootup your
PC and begin recovery if y ou can’t start from the system hard drive.
•FirstAidquickly examines areas of your computer for any problems that
can be automatically fixed at the click of a button.
Safe & Sound lets you create automatic or interactive backups of selected
drives, directories, files, or file types. You can back u p to a protected volume file (a separate area on the drive).
NOTE:A protected volume file contains information about each file in every sector to ensure that files can be recovered even if the hard drive’s directories and data are severely damaged or lost. You can also createmirrorbackupsthat instantlyback updata as you saveit, make backups after a time delay when the PC is id le, o r create manual backups.
Trash Guard protects all the files you delete, by sending them to the
RecycleBin.
Undelete lets you recover files that you have deleted.

McAfee UnInstaller

If you think you’re running out of room on your PC and need to buy a new hard drive—think again! Did you know every time you visit a website, useless files are left on your compute r? Remnants of old files are scattered all over your PC. It’s crammedwith bits and pieces of old softwareand junk files that can slow it down and cause problems—and that’s exactly the debris that McAfee UnInstaller gets rid of.
Safe: UnInstaller safely deletes Windows applications but never removes
criticalsystem files, so you can clear your PC with completepeace of mind.
Fast scanning speed: Scans your PC for unwant e d files with thorough link
determination capability.
One-click QuickClean: W hen time is of the essence, t his feature opens up
disk space immediately.
User’s Guide 17
Welcome to McAfee Office
Scheduled cleaning: S chedule UnInstaller to automa tic ally delete usele ss
filesatanytime,dayornight.
BackTrack: Restores and reconstructs your original setup after poor
program installations.
Customization in terview: Notify UnInstaller w hat files are most
important to you, and it will never touch them.
Moves and archive s programs: Moves and archives applications to
another folder, drive, or computer—with all links intact.
Full anti-virus and privacy protection: Now UnInstaller includes
anti-virussoftware that can even eradicate hostile cookies, ActiveX controls, and Java applets.

McAfee Internet Guard Dog

McAfee Internet Guard Dog is designed to ensure that you can use all aspects of th e Internet without worrying that your privacy and c omp uter security will be compromised.
Internet Guard Dog provides security by:
• Checking your computer for potential security risk and privacy issues
allowing you to fix these problems before data is damaged o r your privacy compromised. It checks:
• ProgramsthathaveaccessedtotheInternet.
• Sensitive data such as financial files and the programs that access these files.
• Viruses that can damage the data on your computer or even go so farastoreformatyourharddisk.
• ActiveX control and Java applets that may or may not perform dangerous actions on your computer.
• Alerting you of potential harmful events that will threaten your privacy andsecurity.SomeoftheeventsthattriggersGuardDogtoalertyou include:
• Unwarranted intrusion from other sources on the Internet.
• Programs on y our computer that pass sensitive data to other sites.
• Web sites that send cookies to your computer as you use the Internet.
18 McAfee Office

McAfee Firewall

McAfee Firewall is a personal firewall that lets you monitor, control and log your PC's network activity. It protects you from Internet hackers and keeps your PC private.
McAfeeFirewallfilterstrafficatthedevicesthatyoursystemuses-network cards and modems. This means that it can reject inbound traffic before that traffic can reach vital functions in your PC and before it can waste valuable system resources.
It monitors applications that are either trusted or not trusted. When trusted applications need to access a network, it manages everything in the computer to allow that application's traffic. When it detects non-trusted applications trying to access a network, it blocks all traffic to and from that application.

McAfee PGP Personal Privacy

McAfee PGP Personal Privacy protects the privacy of your email messages and files via encryption so that only the intended recipients can read them. You can also digitally signed messages and files ensuring its authenticityand verifying that information has not been tampered in any way.
Welcome to McAfee Office
Features of the McAfee PGP Personal Privacy include:
• PhotographicUser ID. You can add your photographto yourpublickey. When your Photo ID is signed, it provides additional information when verifying your key.
• PGPdisk Functionality. This encryption application enables you to set aside an area of disk space for storing your sensitive or personal data.
• Sig nature Verification. When signatures collected o n keys are automatically verified when added to your ring, this feature allows you to reverify signatures for added security.
• Unknown Recipient or Signer Server Loo kup. Wh en d ecrypting or verifying a message, you can automatically perform a server lookup via this feature. PGP scans all the keys which the message is encrypted to or signed by to determ ine the identity of the recipient or signer.
User’s Guide 19
Welcome to McAfee Office

Other features

McAfee Virtual Office

McAfee offers full featured web sites with unequaled ease of use. No HT ML or design experience is required to create your multi-page site. Select the
McAfee Ultra Web Site, which has both business and personal templates, as
wellasreal-timecommunicationfeaturessuch aschat andfile exchange, or the free McAfee Basic Web Site.
Your free McAfee Basic Web Site includes five pages—Home, Contact Info, Pictures, Links and My Stuff—to provide information to your friends, colleagues,family.And yoursitecomes with web-basedemail so yo u cankeep in touch from anywhere on the web.

McAfee on the Web

McAfee.com unveiled a new web sit e w ith a host of new services and online applications dedicated to u pdating, upgrading, and managing PCs over the web. McAfee.com provides personalized PC managem ent.
The site delivers Internet-based software services for both the novice and expert user - to defend, diagnose, and repair their PCs.
McAfee.com provides e-software to seamlessly blend the power of the online computer,the ubiquityof the Internet, and the richness of the Web to furnish visually appealing, browser-based, v ersionless software applications that can be accessed at anytime from anywhere via the Internet. T his new wave of Internettechnology is focused on targeted, personalized customer services.
By design, McAfee.com protects the security and respects the privacy of its online community. Users are assured that McAfee.com records their registration information only. As a subsidiary of Network Associates, the world leader in network security, McAfee.com understands its customers' privacyconcernsand has taken extremeprecautions to ensure the integrityof the services provided.

McAfee Web View

This browser, powered by Neoplanet, enables you to control how you experience the Web, making navigation faster and more intuitive. With McAfee Web V iew: you can create your o wn visual and audio backgrounds; accesssiteswithouttypingentire URLaddress;anddownloadfaster,g raphics and files using the Modem Speed Booster. You can also sign up to get FR E E email.
20 McAfee Office

Improvements

Reductionof overlappingfeatures

McAfeeOfficehassubstantiallyreducedthe amount of disk space requiredfor installation by only installing a shared component feature once versus the multiple in stallations required by the previous v ersion.

Microsoft compatibility

McAfee Office is fully co mpatible with Windows ME.

Improveduninstallcapabil ity

McAfee Office will allow yo u to remove all installed component s at once, versus having to remove them individually. This will save the user considerable time and effort if they decide to uninstall or upgra de McAfee Office.

Common rescue disk

McAfee Office will allow the user to create a single rescue d isk for use in the event that their Windows system will not boot.

Single update button

Welcome to McAfee Office
McAfee Office can automatically update all of the installed components via the info button.

Improve d central informati on screen

Additionshave been madeto the McAfeeOffice Central informationscreento monitor for such things as the last time a diagnostic was performed, the last time the user checked for new updates, or if a r escue disk has been created. Click the update button to view any of these information.

Wher e to go for more informa t io n

You can view the User’s Guides for the products contained in McAfee Office CD by opening the Manuals directory on the CD. The User’s Guides are in Adobe Acrob at.PDF file format. To view the User’s Guides, you must have already insta lled Acrobat Reader, either from a previous installation or from the CD.

To open the User’s Guides:

1. Insert the CD into your CD-ROM drive.
User’s Guide 21
Welcome to McAfee Office
2. In Windows Explorer, navigate to the Manuals directoryon the CD and
3. From here you can do the following:
double-click the User’s Guide you want to view. (To open W indows Explorer, click the Start button on your desktop,
point to Programs, and then choose Windows Explorer.) The User’s Guide opens in Acrobat Reader.
• Browse the User’s Guide, by scrolling, using the hyper text links in the Table of Contentsand Index,or searchfor informationusing the Find feature.
• Print one or all pages of th e User ’s Guide fo r offline reference.
• View Acrobat Reader Help for more information on using Acrobat Reader.
NOTE: After installing McAfee Office on your computer, you can al so view addition al product information by openingthe whatsnew.tx t (text document) files. In Windows Explorer:navigate to the Program Files folder on your hard drive; locate the McAfee Office folder; find any whatsnew.txt files in the folder; then double-click to open and view information.
22 McAfee Office

2Installating McAfee Office

System requirements

Prior to installing McAfee Office, please ver ify your existing PC system hardware components and configuration.
The installation requirements and recommendations for the entire suite of McAfee Office are as follows:
®
• Intel 486 or higher, Pen tium
®
•Windows
• 16 MB RAM minimum
• Hard drive with minimum 145 MB free d isk space for complete installation of all products
• 4X CD-ROM recommended
• 256-color VGA or higher monitor
• An Internet connection is n eeded for some of the components
98, Windows 95 or W indows ME
recommended
2

Individu al product requirements

Per product drive and memory requirements are provided below:
McAfeeVirusScan
• Minimum 8 MB of RAM (16 MB recommended)
• 40MBoffreeharddrivespace
McAfee Utilities
• 16 MB required, 32 MB recommended
• 100 MB hard drive space for all components
•CD-ROMdrive
• Internet connection for some fea ture s
McAfeeUnInstal ler
• Minimum 8 MB of RAM (16 MB recommended) for Windows 95/9 8; Minimum 16 MB of RAM for Windows NT
User’s Guide 23
Installating McAfee Office
• 18MBoffreeharddrivespace
McAfee Internet Guard Dog
• 16 megabytes (MB) minimum of RAM
• 20MB free hard diskspace
• Windows 95/98 Web browser (also called a 32-bit browser); 256-color
• Acce ss to the Internet, either a dial-up account with an Internet Se rvice
PGP Personal Privacy
•8MBRAM
•3MBharddiskspace
•CD-ROMdrive
• Windows 95 or Windows 98

Installation

video displayor better
Provider (ISP) or a constant connection through a network.
24 McAfee Office
Whenyoubegin installation of McAfeeOffice,theAutoRunprogramprompts you to choose a location where you want to install McAfee Office. You can accept the default location, or type in a new location.
Use the following procedure to install the su ite of utilities included with McAfee Office.

To install McAfee Office

1. InserttheMcAfeeOfficeCDintotheCD-ROMdrive. The McAfee Office installation window automatically appears.
2. If the McAfee Office installation window does not appear, do the following:
a. Click the Start button on your desktop and choose Run. b. W hen the R un dialog box appears, click the Browse button and
navigate to your CD-ROM drive’s directory. c. Select SETUP.EXE, and then c lick Open. d. Click OK.
Installating McAfee Office
3. Click Install McAfee Office.
4. Follow the instructionsdisplayedin thewindowto complete installation.
NOTE: Prior to installing any application from the McAfee Office
suite, McAfee Office Central will identify any existing co pies o n
your system.
McAfee Office Centralwill pro ceedwith uninstalling thesecopies to
eliminate file redundanciesand minimize disk space consumption
before loading your ne w applications.
User’s Guide 25
Installating McAfee Office
26 McAfee Office

3McAfee VirusScan

How does VirusScan software work?

VirusScan software combines the anti-virus industry’s most capable scan engine with top-notch interface enhancements that give you complete access to that engine’s power. The VirusScan graphical user interface unifies its specialized program components, but without sacrificing the flexibility you need to fit the software into your computing environment. The scan engine, meanwhile, combines the best features of technologies that McAfee and McAfee VirusScan researchers developed independently for more than a decade.

What comes with VirusScan software?

VirusScansoftware consists of several components that combine one or more related programs, each of which play a part in defendingyour computer against viruses and other malicious software. The components are:
The VirusScan Central. This is your main entry point in using all of the
available components of McAfee VirusScan. This home screen (see Figure 1-2) provides relevant information such as the last time a vir us scan was performed on your computer; what VShield s ettings are enabled o r disabled a nd available DAT information and when it was created.
3
User’s Guide 27
McAfee VirusScan
Figure 3-1. McAfee VirusScan Central screen
Through this user-friendly interface, you can access the main functions of McAfee VirusScan. Click the appropriate buttons as displayed to start performing a particular task within McAfee VirusScan (e.g., Scan, Schedule, Quarantine, etc).
28 McAfee Office
You can also click the Update button to start searching and downloading any availableupdatestoMcAfeeVirusScaninstalledon your computer.Makesure that you are connected to the Internet p rior to using this feature. For more information and step-by-step instructions, click the H elp icon on the upper right-hand corner of the window. To view available options in customizing how you want McAfee VirusScan component s to work on your PC, click the Options button.
The VirusScan Console. T his component allows you to create, conf igure
and run VirusScantasks at times you specify. A “task”can include anything from running a scan operation on a set of disks at a specific time orinterval,to runningan updateorupgrade operation.You can also enable or disable the VShield scanner from the Console window.The Console comes with a preset list of tasks that ensures a minimal level of protection for your system—you can, for example, immediately scan and clean your C: drive or all disks on your computer. See “Creating and Configuring Scheduled Tasks” o n page 1 91 of the VirusScan User’s Guide for details.
McAfee VirusScan
The VShield scanner. This compon e nt gives you continuous anti-virus
protection from viruses that arriveon floppy disks,from your network, or from various sources on the Internet.The VShield scannerstarts whenyou start your computer,and stays in memory until you shut down. A flexible setofpropertypagesletsyoutellthescannerwhichpartsofyoursystem to examine, what to look for, which parts to leave alone, and how to respond to any infected files it finds. In addition, the scanne r can alert you when it finds a virus, and c an summarize each of its actions.
The VShield scanner comes with three other specialized mo dules that guard against hostile Java applets and ActiveX controls, that scan e-mail messages and attachments that you receive from the Internet via Lotus cc:Mail, Microsoft Mail o r other mail clients that comply with Microsoft’s MessagingApplication Programming Interface (MAPI) standard,and that block access to dangerous Internet sites. Secure password protection for your configuration options prevents others from making unauthorized changes. The same convenient dialog box controls configuration options for all VShield modules.
Safe & Sound.Thiscomponent allowsyoutocreatebackupsetsin
protectedvolume files, which is the safestand preferred type of backup.A protected volume file is a sectioned-off area of the drive, sometimes called a logical drive.
NOTE:Safe & Sound is only available for Windows 95, 98 and Windows ME.
Quarantine. This component allows yo u to move infected files to a
quarantine folder. This mo ves i nfected files from areas where they can be accessed and enables you to clean or delete them at your convenience.
• T he E-Mail Scan extension. This component allows you to scan your
Microsoft E xchange or Outlook mailbox, or public folders to which you have access, directly on the server. This invaluable “x-ray” peek into your mailbox means tha t VirusScan software can find potential infections b efore they make their way to your desktop, which can stop a Melissa-like virus in its tracks.
• A cc:Mail scanner. This component includes technology optimized for
scanning Lotus cc:Mail mailboxes that do not use the MAPI standard. Install and use this component if your workgroup or network uses cc:Mail v7.x or earlier.
User’s Guide 29
McAfee VirusScan
The Alert Ma nager Client configuration utility. This component lets you
choose a destination for Alert Manager “events” that VirusScan software generateswhen it detects a virus or takes other noteworthy actions. You can also specify a destination directory for older-style Centralized Alerting messages, or supplement either method with Des ktop Management Interface (DMI) alerts sent via your DMI client software.
• T he ScreenScan utility. This op tional component scans your computer as
your screen saver run s during idle periods.
• T he SendVirus utility. This component gives y ou an easy and painless
way to su bmit files that you believe are inf ected directly to McAfee anti-virusresearchers.A simple wizard guides you as you choose files to submit, include contact deta ils and, if you prefe r, s trip out any personal or confidential data from document files.
• T he E m ergency Disk c reation utility. This essential utility helps you to
create a floppy disk that you can use to boot your computer into a virus-free environment, then scan essential s ys tem areas to rem ove any viruses that could load at startup.
Command-line scanners. This component consists of a set of full-featured
scanners you can use to run targeted scan operations from the MS-DOS Prompt or Command Prompt windows, or from protected MS-DOS mode. The set includes:
30 McAfee Office
SCAN.EXE, a scanner for 32-bit environments only.This is the
primary command-line interface. When you run this file, it first
checks its environment to see whether it can run by itself. If your
computer is running in 16 -bit or protected mode, it will trans fer
control to one of the other scanners. – SCANPM.EXE, a scanner for 16- and 32-bit environments. This
scanner provides you with a full set of scanningoptions for 16- and
32-bit protected-mode DOS environments. It also includes support
for extended memory and flexible memory allocations. SCAN.EXE
will transfer control to this scanner when its specialized capabilities
can enable your scan operation to run m o re efficiently. – SCAN86.EXE,a scannerfor16-bitenvironmentsonly.Thisscanner
includes a limited set of cap abilities geared to 16-bit environments.
SCAN.EXE will transfer control to this scanner if your computer is
running in 16-bit mode, but without special memory configurations. – BOOTSCAN.EXE, a smaller, specialize d scanner for use primarily
with the Emergency Disk utility. This scanner ord inarily runs from
a floppy disk you create to provide you with a virus-free boot
environment.
Loading...
+ 180 hidden pages