Copyright (c) 1999-2000 Networks Associates Technology, Inc. All Rights Reserved. No part of this
publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into
any language in an y form or by any means without the written permission of Networks Associates
Technology, In c., or its suppliers or affiliate companies.
TRADEMARK ATTRIBUTIONS
* ActiveHelp, Bomb Shelter,Building a World of Trust,CipherLink,Clean-Up,Cloaking, CNX, * ActiveHelp, Bomb
Shelter, Building a World of Trust, CipherLink, Clean-Up, Cloaking, CNX, Compass 7, CyberCop, CyberMedia,
Data Security Letter, Discover, Distributed Sniffer System, Dr Solomon's, Enterprise Secure Cast, First Aid,
ForceField, Gauntlet, GMT, GroupShield, HelpDesk, Hun ter, ISDN Tel/Scope, LM 1, LANGuru, LeadingHelp
Desk Technology, Magic Solutions, MagicSpy, MagicTree, Magic University, MagicWin, MagicWord, McAfee,
McAfeeAssociates, MoneyMagic,M ore Power To You, MultimediaCloaking, NetCrypto, NetOctopus, NetRoom,
NetScan, Net Shield, NetShield, NetStalker, Net Tools, Network Associates, Network General, Network Uptime!,
NetXRay, Nuts & Bolts, PC Medic, PCNotary, PGP, PGP (Pretty Good Privacy), PocketScope, Pop-Up,
PowerTelnet, Pretty Good Privacy, PrimeSupport, RecoverKey, RecoverKey-International, ReportMagic,
RingFence, Router PM, Safe & Sound, SalesMagic, SecureCast, Service Level Manager, ServiceMagic, Site Meter,
Sniffer, SniffMaster, SniffNet, Stalker, Statistical Information Retrieval (SIR), SupportMagic, Switch PM,
TeleSniffer,TIS, TMach, TMeg, Total Network Security,Total Network Visibility, Total Service Desk, Total Virus
Defense, T-POD, Tr u sted Mach,Trusted Mail, Uninstaller, Vi rex, Virex-PC, Virus Fo rum, ViruScan, VirusScan,
VShield, WebScan, WebShield, WebSniffer, WebStalker, WebWall, and ZAC 2000 are registered trademarks of
Network Associates and/or its affiliates in the US and/or other countries. All other registered and unregistered
trademarks in this document are the sole property of their respective owners.
LICENSE AGREEMENT
NOTICE TO ALL USERS:CAREFULLY READ THE FOLLOWING LEGAL AGREEMENT
("AGREEMENT"), FOR TH E LICENSE OF SPECIFIED SOFTWARE ("SOFTWARE") BY NETWORK
ASSOCIATES, INC . ("McAfee"). BY CLICKING THE ACCEPT BUTTON OR INSTALLING THE
SOFTWARE, YOU (EITHER AN INDIVIDUAL OR A SIN GLE ENTITY) CONSENT TO BE BOUND BY
AND BECOME A P ARTY TO THIS AGREEMENT. IF YOU DO NOT AGREE TO ALL OF THE TERMS
OF THIS AGREEMENT, CLICK THE BUTTON TH AT INDICATES THAT YOU DO NOT ACCEPT THE
TERMS OF THIS AGREEMENT AND DO NOT INSTALL THE SOFTWARE. (IF APPLICABLE, YOU
MAY RETURN THE PRODUCT TO THEPLACEOF PURCHASE FORA FULL REFUND.)
1. License G rant. Subject to the payment of the applicable license fees, a nd subject to the terms and
conditions o f this Agreement, McAfee hereby grants t o you a non-exclusive, non-transferable rig ht
to use one copy of the specified version of the Software and the accompanying documentation (the
"Documentation"). You may install one copy of the Software on one computer, workstation,
personal digital assistant, pager, "smart phone" or other electronic device for which the Software
was designed (each, a "Client Device"). I f the Software is licensed as a su ite or bundle with more
than o n e specified Software product, this license applies to all such specified Software products,
subjectto any restrictions or u sage terms specifiedon the ap plicable p r ice list or product
packaging
that apply to any of such Software products individually.
a. Use. The Software is licensed as a single product; it may not be used on more than one Client
Device or by more than one user at a time, except as set forth in this Section 1. The Software is "in
use" o n a Client Device when it is loaded into the temporary memory (i.e., random-access
memory or RAM) or installed into t he permanent memory (e.g., hard disk, CD-ROM, or other
Issued August 2000 / McAfee Office v3.1
storage device) of that ClientDevice. This license authorizes you to make one copy of
the Software solely for backup or archivalpurposes,providedthat the copy you make
contains all of the Software's proprietary notices.
b. Server-Mode. You may use the Software on a Client Device as a server ("Server") within a
multi-user or networked en vironment ("Server-Mode") only if such use is permitted in the
applicable price list or productpackagingfor the Software. A separate license is required for each
Client Device or "seat" that may connect to the Server at any time, regardless of whether such
licensed Client Devices or seats are concurrently connected to, accessing or using the Software.
Use of so ftware or hardware that reduces the number of Client Devices or seats directlyaccessing
or utilizing the Software (e.g ., "multiplexing" or "pooling"software or hardware) does not reduce
the number of licenses required (i.e., the required number of licenses would equal the number of
distinct inputs to the multiplexing or pooling software or hardware "front end"). If the number
of Client Devices or seats that can connect to the Software can exceed the number of licenses you
have obtained, then you must have a reasonable mechanism in place to ensure that your use of
the Software does not exceed the use limits specified for the lic enses you have obtained. This
license authorizes you to make or download one copy of the Documentation for each Client
Device or seat that is licensed, provided that each such copy contains all of the Documentation's
proprietary notices.(i.e., the required number of licenses would equal the number of distinct
inputs to the multiplexing or pooling software or hardware "front end"). If the number of Client
Devices or seats that can connect to the Software can exceed the number of licenses you have
obtained, then you must have a reasonable mechanism in place to ensure that your use of the
Software does not exceed the use limits specified for the licenses you have obtained. This license
authorizes you to make or download one copy of the Documentation for each Client Device or
seatthat is licensed, providedt hat each such copy containsallof the Documentation'sproprietary
notices.
c. VolumeLicenses.If the Software is licensed with volume lic ense termsspecifiedin thea pplicable
price list or product packaging for the Software, you may make, use and install as many
additional copies of the Software o n the number of Client Devices as the volume license
authorizes. You must have a reasonable mechanism in place to ensure that the number of Client
Devices on which the Software has been installed d oes not exceed the number o f licenses you
have obtained. This license authorizes you to make or download one copy of the Documentation
for each additional copy authorized by the volume license, provided that each such copy contains
all of the Documentation's p roprietary notices.
2. Term. This Agreement is effective for an unlimited duration unless and until earlier terminated as
set forth herein. This Agreement will terminate automatically if you fail to comply with any of the
limitations or other requirements described herein. Upon any termination or expiration of this
Agreement,you must destroy all copies of theS oftware and theDocumentation. Youmay terminate
this Agreement at any point by destroying all copies of the Software and the Documentation.
3. Updates. For the time period specified in the applicable price list or product packaging for the
Software you are entitled to download revisions or updates to the Software when and as McAfee
publishes them via its electronic bulletin board system, website or through o ther online services.
For a period of ninety (90) days from the date of the o riginal purchase of the Software, you are
entitled to download one (1) revision or upgrade to the Software when and as McAfee publishes it
via its electronic bulletin board system, website or through other online services. After the specified
time period,you have no further rights to receive any revisions or upgrades without purchase of a
new license or annual upgrade plan to the Software.
4. Ownership Rig h ts. The Software is p rotected by United States copyright laws and international
treaty provisions. McAfee and its suppliers own and retain all righ t, title and interest in and to the
Software, including all copyrights, patents, trade secret rights, trademarks and other intellectual
property rights therein. Your possession, installation, or use of the Software does not transfer to you
any title to the intellectual property in the S oftware, and you will not a cquire any rights to the
Software except as expressly set forth in this Agreement. All copies of the Software and
Documentation made hereunder must contain the same proprietary notices that appear on and in
the Software and Documentation.
User’s Guideiii
5. Restrictions. You may not rent, lease, loan or resell the Software. You may not permit
third parties to benefit from the use or functionality of the Software via a timesharing,
service bureau or o ther arrangement, except to the extent such use is specified in the
applicable list price or product packaging for the Software. You may not transfer any of
the rights granted to you under this Agreement.You may not r everse engineer,
decompile, or disassemble the Software, except to the extent the foregoing restriction is
expressly prohibited by applicable law. You may not modify, or create derivative works
based upon, the Software in whole or in part. You may not copy the Software or
Documentation except as expres sly permitted in Section 1 above. Y ou may not remove
any proprietary notices or labels on the Software. All rights not expressly set forth
hereunder are reserved by McAfee. McAfee reserves the right t o periodically conduct
audits upon advance written notice to verify compliance with the terms of this
Agreement.
6. Warranty and Disclaimer
a. Limited Warranty. McAfee warrants that for sixty (60) days from the date of original
purchasethe media(e.g., diskettes)on which the Software is contained will be freefrom
defects in materials and workmanship.
b. Customer Remedies. McAfee's and its suppliers' entire liability and your exclusive
remedy for any br each of the foregoing warranty shall be, at McAfee's option, either (i)
return of the purchase price paid fo r t he license, if a ny , o r (ii) replacement o f the
defective media in which the Software is c ontained. You must return the defective
media to McAfee at your expensewith a copy of your receipt. This limited warranty is
void if the defect has resultedfrom accident,abuse, or misapplication. Any replacement
media will be warranted for the remainder of the original warranty period. Outside the
United States, this remedy is not available to the ex tent McAfee is subject to restrictions
under United States export control laws and regulations.
c. Warranty Disclaimer. Except for the limited warranty set forth herein, THE
SOFTWARE IS PROVIDED "AS IS." TO THE MAXIMUM EXTENT PERMITTED BY
APPLICABLE LAW, MCAFEE DISCLAIMS ALL WARR A NTIES, EITHER EXPRESS
OR IM PLIED, INCLUDING BUT NOT LIMITED TO IMPLIED WARRANTIES OF
MERCHANTABILITY,FITNESSFORAPARTICULA RPURPOSE,AND
NONINFRINGEMENT WITH RESPECTTO THE SOFTWARE AND THE
ACCOMPANYING DOCUMENTATION.YOU ASSUME RESPONSIBILITY FOR
SELECTING THE SOFTWARE TO ACHIEV E YOUR INTENDEDRESULTS,AND FOR
THE I NSTALLATION OF, USE OF, AND RESULTS OBTAINED FROM THE
SOFTWARE. WITHOUT LIMITING THE FOREGOING PROVISIONS, MCAFEE
MAKES NO WARRANTY THAT THE SOFTWARE WILL BE ERROR-FREE OR FR EE
FROM INTERRUPTIONS OR OTHER FAILURES OR THAT THE SOFTWARE WILL
MEET YOUR REQUIREMENTS. SOME STATES AND JURISDICTIONS DO NOT
ALLOW LIMITATIONS ON IMPLIED WARRANTIES, SO THE ABOVE LIMITATION
MAY NOT APPLY TO YOU. The foregoing provisions shall be enforceable to the
maximum extent permitted by applicable law.
ivMcAfee Office
7. Limitation of Liability. UNDER NO CIRCUMSTANCES AND UNDER NO LEGAL
THEORY, WHETHER IN TORT, CONTRACT, OR OTHERWISE, SHALL MCAFEE OR
ITS SUPPLIERS BE LIABLE TO YOU OR TO ANY OTHER PERSON FOR ANY
INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES OF ANY
CHARACTER INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF
GOODWILL, WORK STOPPAGE,COMPUTERFAILURE OR MALFUNCTION,OR FOR
ANY AND ALL OTHER DAMAGES OR LOSSES. IN NO EVENT WILL MCAFEE BE
LIABLE FOR ANY DAMAGES IN EXCESS OF THE LIST PRICE MCAFEE CHARGES
FOR A LICENSE TO THE SOFTWARE, EVEN IF MCAFEE SHALL HAVE BEEN
ADVISED OF T HE POSSIBILITY OF SUCH DAMAGES.THIS LIMITATION OF
LIABILITY SHALL NOT APPLY TO LIABILITY FOR DEATH OR PERSONAL INJURY
TO THE EXTENT THAT APPLICABLE LAW PROHIBITS SUCH LIMITATION.
FURTHERMORE, SOME STATES AND JURISDICTIONSDO NOT ALLOW T HE
EXCLUSION OR LIMITATION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES,
SO THIS LIMITATION A ND EXCLUSION MAY NOT APPLY TO YOU. The foregoing
provisions shall be enforceable to the maximum extent permitted by applicable law.
8. United States G overn ment. TheSoftware andaccompanying Documentationaredeemed
to be "commercial computer software" and "commercial computer software
documentation," respectively, pursuant to DFAR Section 227.7202 and FAR Section
12.212, as applicable. Any use, modification, reproduction, release, performance, d isplay
or disclosure of the Software and accompanying Documentation by the United States
Government shall be governed solely by the terms of this Agreement and s hall be
prohibited except to the extent expressly permitted by the terms of this Agreement.
9. Export Controls. Ne ither the Software nor the Documentation and underlying
information or technology may be downloaded or otherwise exported or re-exported (i)
into (or to a national or resident of ) Cuba, Iran, Iraq, Libya, North Korea, Sudan, Syria or
any other country to which the United States has embargoed goods; or (ii) to anyone on
the United States Treasury Department's list o f Specially Designated Nations or the
United States Commerce Department's Table of Denial Orders. By downloading or using
the Software you are agreeing to the foregoing and you are certifying that you are not
located in, under the control of, or a national or resident of any such country or on any
such list.
IN ADDITION, YOU SHOULD BE AWARE OF THE FOLLOWING: EXPORT OF THE
SOFTWARE MAY BE SUBJECT TO COMPLIANCE WITH THE RULES AND
REGULATIONS PROMULGATED FROM TIME TO TIME BY THE BUREAU OF
EXPORT ADMINISTRATION, UNITED STATES DEPARTMENT OF COMMERCE,
WHICH RESTRICT THE EXPORT AND RE-EXPORT OF CERTAIN PRODUCTS A ND
TECHNICAL DATA. IF THE EXPORT OF THE SOFTWARE IS CONTROLLED UNDER
SUCH RULES AND REGULATIONS, THEN THE SOFTWARE SHALL NOT BE
EXPORTED OR RE-EX PORTED, DIRECTLY OR INDIRECT LY , (A) WITHOUT ALL
EXPORT ORRE-EXPORTLICENSES ANDUNITED STATESOR OTHER
GOVERNMENTAL APPROVALS REQUIRED BY ANY APPLICABLE LAWS, OR (B) IN
VIOLATION OF ANY APPLICABLE PROHIBITION AGAINST THE EXPORT OR
RE-EXPORT OF ANY PART OF THE SOFTWARE.
User’s Guidev
SOME COUNTRIES HAVE RESTRICTIONS ON THE USE OF ENCRYPTION WITHIN
THEIR BORDERS, OR THE IMPORT OR EXPORT OF ENCRYPTION EVEN IF FOR
ONLY TEMPORARY PERSONAL OR BUSINESS USE. YOU ACKNOWLEDGE THAT
THE IMPLEMENTATION AND ENFORCEMENT OF THESE LAWS IS NOT ALWAYS
CONSISTENT AS TO SPECIFIC COUNTRIES. ALTHOUGH THE FOLLOWING
COUNTRIES ARE NOT AN EXHAUSTIVE L IST THERE MAY EXIST RESTRICTIONS
ON THE EXPORTATION TO, OR IMPORTATION OF, ENCRYPTION BY: BELGIUM,
CHINA (INCLUDING HONG KONG), FRANCE, INDIA, INDONESIA, ISRAEL,
RUSSIA,SAUDIARABIA,SINGAPORE,ANDSOUTHKOREA.YOU
ACKNOWLEDGE IT IS YOUR ULTIMATE RESPONSIBILITY TO COMPLY WITH ANY
AND ALL GOVERNMENT EXPORT AND OTHER APPLICABLE LAWS AND THAT
MCAFEE HAS NO FURTHER RESPONSIBILITY AFTER THE INITIAL SALE TO YOU
WITHIN THE ORIGINAL COUNTRY OF SALE.
10.High Risk Activities. The Software is not fault-tolerant and is not designed or intended
for use in hazardous environments requiring fail-safe performance, including without
limitation, in the operation of nuclear facilities, aircraft navigation or communication
systems, air traffic c o ntrol, weapons systems, direct life-support machines, or any other
application in which the failure of the Software could lead directly to death, personal
injury, or severe physical or property damage (collectively, "High Risk Activities").
McAfee expressly disc laims any exp ress or imp lied warranty of fitness for High Risk
Activities.
11.Miscellaneous. This Agreement is governed by the laws of the United States and the State
of California, without reference to conflict of laws principles. The application of the
United Nations Convention of Contracts for the International Sale of Goods is expressly
excluded. This Agreement s ets forth all rights for the user of theSoftware and is theentire
agreement between the parties. This A greement supersedes any other communications
with respect to the Software and Documentation. This Agreement may not be modified
except b y a written addendum issued by a duly authori zed representative of Mc Afee. N o
provision hereof shall be deemed waived unless such w a iver shall be in writing and
signedby McAfee or a duly authorizedrepresentative of McAfee. If any provisionof this
Agreement is held invalid, the re mainder of this Agreement shall continue in full force
and effect. The parties confirm that it is their w ish that this Agreement has been written
in the Eng lish language only.
12.McAfee Customer Contact. If you have any questions concerning these terms and
conditions, o r if you would like to contact McAfee for any other reason, please call (408)
988-3832,fax(408) 970-9727, or write: McAfeeSoftware,3965 Freedom Circle,Santa C lara,
California 95054. http://www.mcafee.com.
Statements made to you in the courseof this sale are subject to the Year 2000 Information
and Readiness DisclosureAct (PublicLaw 105-271). In the case of a dispute, this Act m ay
reduce your legal rights regarding the use of any statements regarding Year 2000
readiness, unless otherwise specified in your contractor tariff.
Thankyou fo r purchasingMcAfee Office—a suiteof powerful and easy-to-use
Windows software utilities that helps keep your PC working at optimum
efficiency and speed, as well as diagnosing, repairing,and protectingyour PC
and its valuable data.
McAfee Office contains a suite of utility programs that provide you with
diagnostic, preventive, and security tools to help maintain your PC’s health
and well-be ing. Use McAfee Office utilities together, or individually, to
protect your PC from viruses, ensure privacy of your PC’s data files, and
improve overall performance of your computer.
Programs and features
Central interface
Through a central interface, McAfee Office improvs integration with the
individual components of the product suite.For example, instead of launching
a separate Mc Af e e Utilities main m en u, a user can access all functions of
McAfee Utilities directly from the McA fee Office Central interface.
1
Figure 1-1. McAfee Office main win do w
User’s Guide15
Welcome to McAfee Office
McAfee VirusScan
McAfee Vi rusScan provides complete desktop protectionwith an array of
scanning features that keep your system clean, mean, and virus-free. Using
onlythe latest technology, VirusScan d etects 100%of viruses including floppy
disks, Internet downloads, email attachments, Intranets, shared files,
CD-ROM, and online services (even inside the most popular compressed file
types).
• Hunter, VirusScan’s award-winning scanning engine, includes
ground-breaking variant detection and heuristic technology that detects
even new un known macro viruses before they have a chance to inflict
damage.
• SecureCast ensures that your virus signature files are always the latest.
New updates are pushed directly to your desktop the moment they ar e
released.
• AVERT (Anti-Virus Emergency Research Team) staffs more than 85
experiencedv irus r esearchers around thew orld, providing c ustomers with
unparalleled follow-the-sun support. AVERT even makes hourly beta
virus signature files available to all customers 24 hours a day.
McAfee Utilities
McAfee Utilities helps you keep your PC working at optimum efficiency and
speed. You can diagnose and repair your system and application software;
create a recovery disk and image snapshots of critical sectors of y our hard
drives; avoid lost data during application crashes; create backup sets
automatically or interactively; back up to a protected volume file, which
makes your data recoverable when it otherwise would not be.
From the mo ment you install McAfee Utilit ies, it begins protecting your PC.
First, by helping create a recovery diskthat you can use if problems arise.
Second, by activating Bomb Shelter, which immediately protects you against
losingun saved informationin the eventthat anapplicationcrashes. Next, you
can create a backup set of your valuable d ata with Safe & Sound.
After repairing and protecting your system, you’re ready to use other McAfee
Utilities to clean and optimize , prevent and protec t, and secure and manage
information.
McAfee U tilities can diagnose,repair, and protect your system in the
following ways:
• Discover shows a wealth of information about your hardware and
• DiskMinder safely, easily, a nd quickly diagnoses and repairs existing or
potential disk problems.
• McAfee Image saves a cop y of critical disk information in a file and
restores the image later if your disk is corrupted.
• Registry Wizard allows you to easily maintain, troubleshoot, or repair the
Registrydatabase.
• Rescue Disk createsa custom rescuedisk that you can use to bootup your
PC and begin recovery if y ou can’t start from the system hard drive.
•FirstAidquickly examines areas of your computer for any problems that
can be automatically fixed at the click of a button.
• Safe & Sound lets you create automatic or interactive backups of selected
drives, directories, files, or file types. You can back u p to a protected
volume file (a separate area on the drive).
NOTE:A protected volume file contains information about each file
in every sector to ensure that files can be recovered even if the hard
drive’s directories and data are severely damaged or lost. You can
also createmirrorbackupsthat instantlyback updata as you saveit,
make backups after a time delay when the PC is id le, o r create
manual backups.
• Trash Guard protects all the files you delete, by sending them to the
RecycleBin.
• Undelete lets you recover files that you have deleted.
McAfee UnInstaller
If you think you’re running out of room on your PC and need to buy a new
hard drive—think again! Did you know every time you visit a website, useless
files are left on your compute r? Remnants of old files are scattered all over
your PC. It’s crammedwith bits and pieces of old softwareand junk files that
can slow it down and cause problems—and that’s exactly the debris that
McAfee UnInstaller gets rid of.
• Safe: UnInstaller safely deletes Windows applications but never removes
criticalsystem files, so you can clear your PC with completepeace of mind.
• Fast scanning speed: Scans your PC for unwant e d files with thorough link
determination capability.
• One-click QuickClean: W hen time is of the essence, t his feature opens up
disk space immediately.
User’s Guide17
Welcome to McAfee Office
• Scheduled cleaning: S chedule UnInstaller to automa tic ally delete usele ss
filesatanytime,dayornight.
• BackTrack: Restores and reconstructs your original setup after poor
program installations.
• Customization in terview: Notify UnInstaller w hat files are most
important to you, and it will never touch them.
• Moves and archive s programs: Moves and archives applications to
another folder, drive, or computer—with all links intact.
• Full anti-virus and privacy protection: Now UnInstaller includes
anti-virussoftware that can even eradicate hostile cookies, ActiveX
controls, and Java applets.
McAfee Internet Guard Dog
McAfee Internet Guard Dog is designed to ensure that you can use all aspects
of th e Internet without worrying that your privacy and c omp uter security will
be compromised.
Internet Guard Dog provides security by:
• Checking your computer for potential security risk and privacy issues
allowing you to fix these problems before data is damaged o r your privacy
compromised. It checks:
• ProgramsthathaveaccessedtotheInternet.
• Sensitive data such as financial files and the programs that access
these files.
• Viruses that can damage the data on your computer or even go so
farastoreformatyourharddisk.
• ActiveX control and Java applets that may or may not perform
dangerous actions on your computer.
• Alerting you of potential harmful events that will threaten your privacy
andsecurity.SomeoftheeventsthattriggersGuardDogtoalertyou
include:
• Unwarranted intrusion from other sources on the Internet.
• Programs on y our computer that pass sensitive data to other sites.
• Web sites that send cookies to your computer as you use the
Internet.
18McAfee Office
McAfee Firewall
McAfee Firewall is a personal firewall that lets you monitor, control and log
your PC's network activity. It protects you from Internet hackers and keeps
your PC private.
McAfeeFirewallfilterstrafficatthedevicesthatyoursystemuses-network
cards and modems. This means that it can reject inbound traffic before that
traffic can reach vital functions in your PC and before it can waste valuable
system resources.
It monitors applications that are either trusted or not trusted. When trusted
applications need to access a network, it manages everything in the computer
to allow that application's traffic. When it detects non-trusted applications
trying to access a network, it blocks all traffic to and from that application.
McAfee PGP Personal Privacy
McAfee PGP Personal Privacy protects the privacy of your email messages
and files via encryption so that only the intended recipients can read them.
You can also digitally signed messages and files ensuring its authenticityand
verifying that information has not been tampered in any way.
Welcome to McAfee Office
Features of the McAfee PGP Personal Privacy include:
• PhotographicUser ID. You can add your photographto yourpublickey.
When your Photo ID is signed, it provides additional information when
verifying your key.
• PGPdisk Functionality. This encryption application enables you to set
aside an area of disk space for storing your sensitive or personal data.
• Sig nature Verification. When signatures collected o n keys are
automatically verified when added to your ring, this feature allows you
to reverify signatures for added security.
• Unknown Recipient or Signer Server Loo kup. Wh en d ecrypting or
verifying a message, you can automatically perform a server lookup via
this feature. PGP scans all the keys which the message is encrypted to or
signed by to determ ine the identity of the recipient or signer.
User’s Guide19
Welcome to McAfee Office
Other features
McAfee Virtual Office
McAfee offers full featured web sites with unequaled ease of use. No HT ML
or design experience is required to create your multi-page site. Select the
McAfee Ultra Web Site, which has both business and personal templates, as
wellasreal-timecommunicationfeaturessuch aschat andfile exchange, or the
free McAfee Basic Web Site.
Your free McAfee Basic Web Site includes five pages—Home, Contact Info,
Pictures, Links and My Stuff—to provide information to your friends,
colleagues,family.And yoursitecomes with web-basedemail so yo u cankeep
in touch from anywhere on the web.
McAfee on the Web
McAfee.com unveiled a new web sit e w ith a host of new services and online
applications dedicated to u pdating, upgrading, and managing PCs over the
web. McAfee.com provides personalized PC managem ent.
The site delivers Internet-based software services for both the novice and
expert user - to defend, diagnose, and repair their PCs.
McAfee.com provides e-software to seamlessly blend the power of the online
computer,the ubiquityof the Internet, and the richness of the Web to furnish
visually appealing, browser-based, v ersionless software applications that can
be accessed at anytime from anywhere via the Internet. T his new wave of
Internettechnology is focused on targeted, personalized customer services.
By design, McAfee.com protects the security and respects the privacy of its
online community. Users are assured that McAfee.com records their
registration information only. As a subsidiary of Network Associates, the
world leader in network security, McAfee.com understands its customers'
privacyconcernsand has taken extremeprecautions to ensure the integrityof
the services provided.
McAfee Web View
This browser, powered by Neoplanet, enables you to control how you
experience the Web, making navigation faster and more intuitive. With
McAfee Web V iew: you can create your o wn visual and audio backgrounds;
accesssiteswithouttypingentire URLaddress;anddownloadfaster,g raphics
and files using the Modem Speed Booster. You can also sign up to get FR E E
email.
20McAfee Office
Improvements
Reductionof overlappingfeatures
McAfeeOfficehassubstantiallyreducedthe amount of disk space requiredfor
installation by only installing a shared component feature once versus the
multiple in stallations required by the previous v ersion.
Microsoft compatibility
McAfee Office is fully co mpatible with Windows ME.
Improveduninstallcapabil ity
McAfee Office will allow yo u to remove all installed component s at once,
versus having to remove them individually. This will save the user
considerable time and effort if they decide to uninstall or upgra de McAfee
Office.
Common rescue disk
McAfee Office will allow the user to create a single rescue d isk for use in the
event that their Windows system will not boot.
Single update button
Welcome to McAfee Office
McAfee Office can automatically update all of the installed components via
the info button.
Improve d central informati on screen
Additionshave been madeto the McAfeeOffice Central informationscreento
monitor for such things as the last time a diagnostic was performed, the last
time the user checked for new updates, or if a r escue disk has been created.
Click the update button to view any of these information.
Wher e to go for more informa t io n
You can view the User’s Guides for the products contained in McAfee Office
CD by opening the Manuals directory on the CD. The User’s Guides are in
Adobe Acrob at.PDF file format. To view the User’s Guides, you must have
already insta lled Acrobat Reader, either from a previous installation or from
the CD.
To open the User’s Guides:
1. Insert the CD into your CD-ROM drive.
User’s Guide21
Welcome to McAfee Office
2. In Windows Explorer, navigate to the Manuals directoryon the CD and
3. From here you can do the following:
double-click the User’s Guide you want to view.
(To open W indows Explorer, click the Start button on your desktop,
point to Programs, and then choose Windows Explorer.)
The User’s Guide opens in Acrobat Reader.
• Browse the User’s Guide, by scrolling, using the hyper text links in
the Table of Contentsand Index,or searchfor informationusing the
Find feature.
• Print one or all pages of th e User ’s Guide fo r offline reference.
• View Acrobat Reader Help for more information on using Acrobat
Reader.
NOTE: After installing McAfee Office on your computer, you can al so
view addition al product information by openingthe whatsnew.tx t (text
document) files. In Windows Explorer:navigate to the Program Files
folder on your hard drive; locate the McAfee Office folder; find any
whatsnew.txt files in the folder; then double-click to open and view
information.
22McAfee Office
2Installating McAfee Office
System requirements
Prior to installing McAfee Office, please ver ify your existing PC system
hardware components and configuration.
The installation requirements and recommendations for the entire suite of
McAfee Office are as follows:
®
• Intel 486 or higher, Pen tium
®
•Windows
• 16 MB RAM minimum
• Hard drive with minimum 145 MB free d isk space for complete
installation of all products
• 4X CD-ROM recommended
• 256-color VGA or higher monitor
• An Internet connection is n eeded for some of the components
98, Windows 95 or W indows ME
recommended
2
Individu al product requirements
Per product drive and memory requirements are provided below:
McAfeeVirusScan
• Minimum 8 MB of RAM (16 MB recommended)
• 40MBoffreeharddrivespace
McAfee Utilities
• 16 MB required, 32 MB recommended
• 100 MB hard drive space for all components
•CD-ROMdrive
• Internet connection for some fea ture s
McAfeeUnInstal ler
• Minimum 8 MB of RAM (16 MB recommended) for Windows 95/9 8;
Minimum 16 MB of RAM for Windows NT
User’s Guide23
Installating McAfee Office
• 18MBoffreeharddrivespace
McAfee Internet Guard Dog
• 16 megabytes (MB) minimum of RAM
• 20MB free hard diskspace
• Windows 95/98 Web browser (also called a 32-bit browser); 256-color
• Acce ss to the Internet, either a dial-up account with an Internet Se rvice
PGP Personal Privacy
•8MBRAM
•3MBharddiskspace
•CD-ROMdrive
• Windows 95 or Windows 98
Installation
video displayor better
Provider (ISP) or a constant connection through a network.
24McAfee Office
Whenyoubegin installation of McAfeeOffice,theAutoRunprogramprompts
you to choose a location where you want to install McAfee Office. You can
accept the default location, or type in a new location.
Use the following procedure to install the su ite of utilities included with
McAfee Office.
To install McAfee Office
1. InserttheMcAfeeOfficeCDintotheCD-ROMdrive.
The McAfee Office installation window automatically appears.
2. If the McAfee Office installation window does not appear, do the
following:
a. Click the Start button on your desktop and choose Run.
b. W hen the R un dialog box appears, click the Browse button and
navigate to your CD-ROM drive’s directory.
c. Select SETUP.EXE, and then c lick Open.
d. Click OK.
Installating McAfee Office
3. Click Install McAfee Office.
4. Follow the instructionsdisplayedin thewindowto complete installation.
NOTE: Prior to installing any application from the McAfee Office
suite, McAfee Office Central will identify any existing co pies o n
your system.
McAfee Office Centralwill pro ceedwith uninstalling thesecopies to
eliminate file redundanciesand minimize disk space consumption
before loading your ne w applications.
User’s Guide25
Installating McAfee Office
26McAfee Office
3McAfee VirusScan
How does VirusScan software work?
VirusScan software combines the anti-virus industry’s most capable scan
engine with top-notch interface enhancements that give you complete access
to that engine’s power. The VirusScan graphical user interface unifies its
specialized program components, but without sacrificing the flexibility you
need to fit the software into your computing environment. The scan engine,
meanwhile, combines the best features of technologies that McAfee and
McAfee VirusScan researchers developed independently for more than a
decade.
What comes with VirusScan software?
VirusScansoftware consists of several components that combine one or more
related programs, each of which play a part in defendingyour computer
against viruses and other malicious software. The components are:
• The VirusScan Central. This is your main entry point in using all of the
available components of McAfee VirusScan. This home screen (see Figure
1-2) provides relevant information such as the last time a vir us scan was
performed on your computer; what VShield s ettings are enabled o r
disabled a nd available DAT information and when it was created.
3
User’s Guide27
McAfee VirusScan
Figure 3-1. McAfee VirusScan Central screen
Through this user-friendly interface, you can access the main functions of
McAfee VirusScan. Click the appropriate buttons as displayed to start
performing a particular task within McAfee VirusScan (e.g., Scan, Schedule,
Quarantine, etc).
28McAfee Office
You can also click the Update button to start searching and downloading any
availableupdatestoMcAfeeVirusScaninstalledon your computer.Makesure
that you are connected to the Internet p rior to using this feature. For more
information and step-by-step instructions, click the H elp icon on the upper
right-hand corner of the window. To view available options in customizing
how you want McAfee VirusScan component s to work on your PC, click the
Options button.
• The VirusScan Console. T his component allows you to create, conf igure
and run VirusScantasks at times you specify. A “task”can include
anything from running a scan operation on a set of disks at a specific time
orinterval,to runningan updateorupgrade operation.You can also enable
or disable the VShield scanner from the Console window.The Console
comes with a preset list of tasks that ensures a minimal level of protection
for your system—you can, for example, immediately scan and clean your
C: drive or all disks on your computer. See “Creating and Configuring
Scheduled Tasks” o n page 1 91 of the VirusScan User’s Guide for details.
McAfee VirusScan
• The VShield scanner. This compon e nt gives you continuous anti-virus
protection from viruses that arriveon floppy disks,from your network, or
from various sources on the Internet.The VShield scannerstarts whenyou
start your computer,and stays in memory until you shut down. A flexible
setofpropertypagesletsyoutellthescannerwhichpartsofyoursystem
to examine, what to look for, which parts to leave alone, and how to
respond to any infected files it finds. In addition, the scanne r can alert you
when it finds a virus, and c an summarize each of its actions.
The VShield scanner comes with three other specialized mo dules that
guard against hostile Java applets and ActiveX controls, that scan e-mail
messages and attachments that you receive from the Internet via Lotus
cc:Mail, Microsoft Mail o r other mail clients that comply with Microsoft’s
MessagingApplication Programming Interface (MAPI) standard,and that
block access to dangerous Internet sites. Secure password protection for
your configuration options prevents others from making unauthorized
changes. The same convenient dialog box controls configuration options
for all VShield modules.
protectedvolume files, which is the safestand preferred type of backup.A
protected volume file is a sectioned-off area of the drive, sometimes called a
logical drive.
NOTE:Safe & Sound is only available for Windows 95, 98 and
Windows ME.
• Quarantine. This component allows yo u to move infected files to a
quarantine folder. This mo ves i nfected files from areas where they can be
accessed and enables you to clean or delete them at your convenience.
• T he E-Mail Scan extension. This component allows you to scan your
Microsoft E xchange or Outlook mailbox, or public folders to which you
have access, directly on the server. This invaluable “x-ray” peek into your
mailbox means tha t VirusScan software can find potential infections b efore
they make their way to your desktop, which can stop a Melissa-like virus
in its tracks.
• A cc:Mail scanner. This component includes technology optimized for
scanning Lotus cc:Mail mailboxes that do not use the MAPI standard.
Install and use this component if your workgroup or network uses cc:Mail
v7.x or earlier.
User’s Guide29
McAfee VirusScan
• The Alert Ma nager Client configuration utility. This component lets you
choose a destination for Alert Manager “events” that VirusScan software
generateswhen it detects a virus or takes other noteworthy actions. You
can also specify a destination directory for older-style Centralized Alerting
messages, or supplement either method with Des ktop Management
Interface (DMI) alerts sent via your DMI client software.
• T he ScreenScan utility. This op tional component scans your computer as
your screen saver run s during idle periods.
• T he SendVirus utility. This component gives y ou an easy and painless
way to su bmit files that you believe are inf ected directly to McAfee
anti-virusresearchers.A simple wizard guides you as you choose files to
submit, include contact deta ils and, if you prefe r, s trip out any personal or
confidential data from document files.
• T he E m ergency Disk c reation utility. This essential utility helps you to
create a floppy disk that you can use to boot your computer into a
virus-free environment, then scan essential s ys tem areas to rem ove any
viruses that could load at startup.
• Command-line scanners. This component consists of a set of full-featured
scanners you can use to run targeted scan operations from the MS-DOS
Prompt or Command Prompt windows, or from protected MS-DOS mode.
The set includes:
30McAfee Office
–SCAN.EXE, a scanner for 32-bit environments only.This is the
primary command-line interface. When you run this file, it first
checks its environment to see whether it can run by itself. If your
computer is running in 16 -bit or protected mode, it will trans fer
control to one of the other scanners.
–SCANPM.EXE, a scanner for 16- and 32-bit environments. This
scanner provides you with a full set of scanningoptions for 16- and
32-bit protected-mode DOS environments. It also includes support
for extended memory and flexible memory allocations. SCAN.EXE
will transfer control to this scanner when its specialized capabilities
can enable your scan operation to run m o re efficiently.
–SCAN86.EXE,a scannerfor16-bitenvironmentsonly.Thisscanner
includes a limited set of cap abilities geared to 16-bit environments.
SCAN.EXE will transfer control to this scanner if your computer is
running in 16-bit mode, but without special memory configurations.
–BOOTSCAN.EXE, a smaller, specialize d scanner for use primarily
with the Emergency Disk utility. This scanner ord inarily runs from
a floppy disk you create to provide you with a virus-free boot
environment.
Loading...
+ 180 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.