McAfee VLF09E002RAA, VirusScan 10.0 User Manual

User Guide
Version 10.0
COPYRIGHT
Copyright © 2005 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means without the written permission of McAfee, Inc., or its suppliers or affiliate companies.
TRADEMARK ATTRIBUTIONS
ACTIVE FIREWALL, ACTIVE SECURITY, ACTIVESECURITY (AND IN KATAKANA), ACTIVESHIELD, ANTIVIRUS ANYWARE AND DESIGN, CLEAN-UP, DESIGN (STYLIZED E), DESIGN (STYLIZED N), ENTERCEPT, ENTERPRISE SECURECAST, ENTERPRISE SECURECAST (AND IN KATAKANA), EPOLICY ORCHESTRATOR, FIRST AID, FORCEFIELD, GMT, GROUPSHIELD, GROUPSHIELD (AND IN KATAKANA), GUARD DOG, HOMEGUARD, HUNTER, INTRUSHIELD, INTRUSION PREVENTION THROUGH INNOVATION, M AND DESIGN, MCAFEE, MCAFEE (AND IN KATAKANA), MCAFEE AND DESIGN, MCAFEE.COM, MCAFEE VIRUSSCAN, NA NETWORK ASSOCIATES, NET TOOLS, NET TOOLS (AND IN KATAKANA), NETCRYPTO, NETOCTOPUS, NETSCAN, NETSHIELD, NETWORK ASSOCIATES, NETWORK ASSOCIATES COLLISEUM, NETXRAY, NOTESGUARD, NUTS & BOLTS, OIL CHANGE, PC MEDIC, PCNOTARY, PRIMESUPPORT, RINGFENCE, ROUTER PM, SECURECAST, SECURESELECT, SPAMKILLER, STALKER, THREATSCAN, TIS, TMEG, TOTAL VIRUS DEFENSE, TRUSTED MAIL, UNINSTALLER, VIREX, VIRUS FORUM, VIRUSCAN, VIRUSSCAN, VIRUSSCAN (AND IN KATAKANA), WEBSCAN, WEBSHIELD, WEBSHIELD (AND IN KATAKANA), WEBSTALKER, WEBWALL, WHAT'S THE STATE OF YOUR IDS?, WHO'S WATCHING YOUR NETWORK, YOUR E-BUSINESS DEFENDER, YOUR NETWORK. OUR BUSINESS. are registered trademarks or trademarks of McAfee, Inc. and/or its affiliates in the US and/or other countries. Red in connection with security is distinctive of McAfee brand products. All other registered and unregistered trademarks herein are the sole property of their respective owners.
LICENSE INFORMATION License Agreement
NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, WHICH SETS FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU HAVE ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT ACCOMPANIES YOUR SOFTWARE PACKAGING OR THAT YOU HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET, A FILE ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEB SITE FROM WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO MCAFEE, INC. OR THE PLACE OF PURCHASE FOR A FULL REFUND.
Attributions
This product includes or may include:
Software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/).Cryptographic software written by Eric A. Young and
software written by Tim J. Hudson. similar Free Software licenses which, among other rights, permit the user to copy, modify and redistribute certain programs, or portions thereof, and have access to the source code. The GPL requires that for any software covered under the GPL which is distributed to someone in an executable binary format, that the source code also be made available to those users. For any such software covered under the GPL, the source code is made available on this CD. If any Free Software licenses require that McAfee, Inc. provide rights to use, copy or modify a software program that are broader than the rights granted in this agreement, then such rights shall take precedence over the rights and restrictions herein. Software originally written by Henry Spencer, Copyright 1992, 1993, 1994, 1997 Henry Spencer.
Software originally written by Robert Nordier, Copyright © 1996-7 Robert Nordier.Software written by Douglas W. Sauder.Software developed by the
Apache Software Foundation (http://www.apache.org/). A copy of the license agreement for this software can be found at www.apache.org/licenses/LICENSE-
2.0.txt.International Components for Unicode (“ICU”) Copyright © 1995-2002 International Business Machines Corporation and others.Software developed
by CrystalClear Software, Inc., Copyright © 2000 CrystalClear Software, Inc.  FEAD® Optimizer® technology, Copyright Netopsystems AG, Berlin, Germany.
Outside In
Thai Open Source Software Center Ltd. and Clark Cooper, © 1998, 1999, 2000.Software copyrighted by Expat maintainers.Software copyrighted by The Regents of the University of California, © 1989. Software copyrighted by Gunnar Ritter.Software copyrighted by Sun Microsystems®, Inc.© 2003.Software copyrighted by Gisle Aas. © 1995-2003. Software copyrighted by Michael A. Chase, © 1999-2000. Software copyrighted by Neil Winton, © 1995-1996.
Software copyrighted by RSA Data Security, Inc., © 1990-1992.Software copyrighted by Sean M. Burke, © 1999, 2000.Software copyrighted by Martijn
Koster, © 1995.Software copyrighted by Brad Appleton, © 1996-1999. Software copyrighted by Michael G. Schwern, © 2001.Software copyrighted by Graham Barr, © 1998.Software copyrighted by Larry Wall and Clark Cooper, © 1998-2000.Software copyrighted by Frodo Looijaard, © 1997.Software copyrighted by the Python Software Foundation, Copyright © 2001, 2002, 2003. A copy of the license agreement for this software can be found at www.python.org.
Software copyrighted by Beman Dawes, © 1994-1999, 2002.Software written by Andrew Lumsdaine, Lie-Quan Lee, Jeremy G. Siek © 1997-2000 University of
Notre Dame.Software copyrighted by Simone Bordet & Marco Cravero, © 2002.Software copyrighted by Stephen Purcell, © 2001.Software developed by the Indiana University Extreme! Lab (http://www.extreme.indiana.edu/).Soft ware copyrighted by International Business Machines Corporation and others, © 1995-2003. Software developed by the University of California, Berkeley and its contributors. Software developed by Ralf S. Engelschall <rse@engelschall.com> for use in the mod_ssl project (http://www.modssl.org/). Software copyrighted by Kevlin Henney, © 2000-2002. Software copyrighted by Peter Dimov and Multi Media Ltd. © 2001, 2002.Software copyrighted by David Abrahams, © 2001, 2002. See http://www.boost.org/libs/bind/
bind.html for documentation.Software copyrighted by Steve Cleary, Beman Dawes, Howard Hinnant & John Maddock, © 2000.Software copyrighted by
Boost.org, © 1999-2002.Software copyrighted by Nicolai M. Josuttis, © 1999.Software copyrighted by Jeremy Siek, © 1999-2001.Software copyrighted by Daryle Walker, © 2001.Software copyrighted by Chuck Allison and Jeremy Siek, © 2001, 2002.Software copyrighted by Samuel Krempp, © 2001. See
http://www.boost.org for updates, documentation, and revision history.
copyrighted by Cadenza New Zealand Ltd., © 2000. Software copyrighted by Jens Maurer, © 2000, 2001. Software copyrighted by Jaakko Järvi (jaakko.jarvi@cs.utu.fi), © 1999, 2000.Software copyrighted by Ronald Garcia, © 2002.Software copyrighted by David Abrahams, Jeremy Siek, and Daryle Walker, © 1999-2001.
www.housemarque.com>, © 2001.
copyrighted by Greg Colvin and Beman Dawes, © 1998, 1999.Software copyrighted by Peter Dimov, © 2001, 2002.Software copyrighted by Jeremy Siek and John R. Bandela, © 2001.Software copyrighted by Joerg Walter and Mathias Koch, © 2000-2002.
®
Viewer Technology © 1992-2001 Stellent Chicago, Inc. and/or Outside In® HTML Export, © 2001 Stellent Chicago, Inc.Software copyrighted by
Software copyrighted by Stephen Cleary (shammah@voyager.net), © 2000. Software copyrighted by Housemarque Oy <http://
Some software programs that are licensed (or sublicensed) to the user under the GNU General Public License (GPL) or other
Software copyrighted by Doug Gregor (gregod@cs.rpi.edu), © 2001, 2002.Software
Software copyrighted by Paul Moore, © 1999.Software copyrighted by Dr. John Maddock, © 1998-2002.Software
Issued July 2005 / McAfee® VirusScan® software version 10.0

Quick Start Card

If you are installing your product from a CD or a Web site, print this convenient reference page.
Are you installing your product from a CD?
Yes
1. Insert your product CD into your CD-ROM drive. If the installation does not start automatically, click your Windows desktop, then click
Start on
Run.
Are you installing your product from a Web site?
No
Yes
1. Go to the McAfee Web site, and click
My Account.
2. In the Run dialog box, type D:\SETUP.EXE (where D is the letter of your CD-ROM drive).
2. If prompted, enter your subscribing e-mail address and password, then
Log In to open your Account Info
3. Click OK.
McAfee reserves the right to change Upgrade & Support Plans and policies at any time without notice. McAfee and its
product names are registered trademarks of McAfee, Inc. and/or its affiliates in the US and/or other countries.
© 2005 McAfee, Inc. All Rights Reserved.
click page.
3. Locate your product in the list, and click the download icon.
User Guide iii
Quick Start Card
For more information
To view the User Guides on the product CD, ensure that you have Acrobat Reader installed; if not, install it now from the McAfee product CD.
1 Insert your product CD into your CD-ROM
drive.
2 Open Windows Explorer: Click Start on
your Windows desktop, and click
3 Locate the Manuals folder, and double-click
the User Guide .
PDF you want to open.
Search.
Registration benefits
McAfee recommends that you follow the easy steps within your product to transmit your registration directly to us. Registration ensures that you receive timely and knowledgeable technical assistance, plus the following benefits:
FREE electronic support Virus definition (.DAT) file updates for one
year after installation when you purchase VirusScan software
Go to http://www.mcafee.com/ for pricing of an additional year of virus signatures.
60-day warranty that guarantees
replacement of your software CD if it is defective or damaged
SpamKiller filter updates for one year after
installation when you purchase SpamKiller software
Go to http://www.mcafee.com/ for pricing of an additional year of filter updates.
McAfee Internet Security Suite updates for
one year after installation when you purchase MIS software
Go to http://www.mcafee.com/ for pricing of an additional year of content updates.
Technical Support
For technical support, please visit
http://www.mcafeehelp.com/.
Our support site offers 24-hour access to the easy-to-use Answer Wizard for solutions to the most common support questions.
Knowledgeable users can also try our advanced options, which include a Keyword Search and our Help Tree. If a solution cannot be found, you can also access our FREE Chat Now! and E-mail Express! options. Chat and e-mail help you to quickly reach our qualified support engineers through the Internet, at no cost. Otherwise, you can get phone support information at
http://www.mcafeehelp.com/.
iv McAfee® VirusScan® software version 10.0
Contents
Quick Start Card . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . iii
1 Getting Started . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
New features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
System requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Testing VirusScan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Testing ActiveShield . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Testing Scan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Using McAfee SecurityCenter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
2 Using McAfee VirusScan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Using ActiveShield . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Enabling or disabling ActiveShield . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Configuring ActiveShield options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Understanding security alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Manually scanning your computer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Manually scanning for viruses and other threats . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Automatically scanning for viruses and other threats . . . . . . . . . . . . . . . . . . . . . . . . 29
Understanding threat detections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Managing quarantined files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Creating a Rescue Disk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Write-protecting a Rescue Disk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Using a Rescue Disk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Updating a Rescue Disk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Automatically reporting viruses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Reporting to the World Virus Map . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
Viewing the World Virus Map . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Updating VirusScan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Automatically checking for updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Manually checking for updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
User Guide v
Contents
vi McAfee® VirusScan® software version 10.0

Getting Started

Welcome to McAfee VirusScan.
McAfee VirusScan is an anti-virus subscription service offering comprehensive, reliable, and up-to-date virus protection. Powered by award-winning McAfee scanning technology, VirusScan protects against viruses, worms, Trojan horses, suspect scripts, hybrid attacks, and other threats.
With it, you get the following features:
ActiveShield — Scan files when they are accessed by either you or your computer.
Scan — Search for viruses and other threats in hard drives, floppy disks, and
individual files and folders.
Quarantine — Encrypt and temporarily isolate suspect files in the quarantine folder
until an appropriate action can be taken.
Hostile activity detection — Monitor your computer for virus-like activity caused by
worm-like activity and suspect scripts.

New features

This version of VirusScan provides the following new features:
1
Spyware and adware detection and removal
VirusScan identifies and removes spyware, adware, and other programs that jeopardize your privacy and slow down your computer performance.
Daily automatic updates
Daily automatic VirusScan updates protect against the latest identified and unidentified computer threats.
Fast background scanning
Fast unobtrusive scans identify and destroy viruses, Trojans, worms, spyware, adware, dialers, and other threats without interrupting your work.
Real-time security alerting
Security alerts notify you about emergency virus outbreaks and security threats, and provide response options to remove, neutralize, or learn more about the threat.
Detection and cleaning at multiple entry points
VirusScan monitors and cleans at your computer’s key entry points: e-mail, instant message attachments, and Internet downloads.
User Guide 7
Getting Started
E-mail monitoring for worm-like activity
WormStopper™ monitors suspect mass-mailing behaviors and stops viruses and worms from spreading through e-mail to other computers.
Script monitoring for worm-like activity
ScriptStopper™ monitors suspect script executions and stops viruses and worms from spreading through e-mail to other computers.
Free instant messaging and e-mail technical support
Live technical support provides prompt, easy assistance using instant messaging and e-mail.

System requirements

Microsoft Personal computer with Pentium-compatible processor
Windows 98, 2000: 133 MHz or higher Windows Me: 150 MHz or higher Windows XP (Home and Pro): 300 MHz or higher
RAM
Windows 98, Me, 2000: 64 MB Windows XP (Home and Pro): 128 MB
40 MB hard disk space Microsoft
®
Windows 98, Windows Me, Windows 2000, or Windows XP
®
Internet Explorer 5.5 or later
NOTE
To upgrade to the latest version of Internet Explorer, visit the Microsoft Web site at http://www.microsoft.com/.
Supported e-mail programs
POP3 (Outlook Express, Outlook, Eudora, Netscape)
Supported instant messaging programs
AOL Instant Messenger 2.1 or later Yahoo Messenger 4.1 or later Microsoft Windows Messenger 3.6 or later MSN Messenger 6.0 or later
8 McAfee® VirusScan® software version 10.0

Testing VirusScan

Before initial use of VirusScan, it’s a good idea to test your installation. Use the following steps to separately test the ActiveShield and Scan features.
Testing ActiveShield
NOTE
To test ActiveShield from the VirusScan tab in SecurityCenter, click
Test VirusScan to view an online Support FAQ
containing these steps.
To test ActiveShield:
1 Go to http://www.eicar.com/ in your web browser.
2 Click the The AntiVirus testfile eicar.com link.
3 Scroll to the bottom of the page. Under Download, you will see four links.
4 Click eicar.com.
If ActiveShield is working properly, it detects the eicar.com file immediately after you click the link. You can try to delete or quarantine detected files to see how ActiveShield handles possible threats. See Understanding security alerts on page 23 for details.
Testing VirusScan
Testing Scan
Before you can test Scan, you must disable ActiveShield to prevent it from detecting the test files before Scan does, then download the test files.
To download the test files:
1 Disable ActiveShield: Right-click the McAfee icon, point to VirusScan, then
2 Download the EICAR test files from the EICAR web site:
click
Disable.
a Go to http://www.eicar.com/.
b Click the The AntiVirus testfile eicar.com link.
User Guide 9
Getting Started
Scroll to the bottom of the page. Under Download, you will see these links:
c
eicar.com contains a line of text that VirusScan will detect as a virus.
eicar.com.txt (optional) is the same file, but with a different file name, for
those users who have difficulty downloading the first link. Simply rename the file “eicar.com” after you download it.
eicar_com.zip is a copy of the test virus inside a .ZIP compressed file (a
WinZip
eicarcom2.zip is a copy of the test virus inside a .ZIP compressed file,
which itself is inside a .
d Click each link to download its file. For each one, a File Download dialog
file archive).
ZIP compressed file.
box appears.
e Click Save, click the Create New Folder button, then rename the folder VSO
Scan Folder
f Double-click VSO Scan Folder, then click Save again in each Save As dialog
.
box.
3 When you are finished downloading the files, close Internet Explorer.
4 Enable ActiveShield: Right-click the McAfee icon, point to VirusScan, then
Enable.
click
To test Scan:
1 Right-click the McAfee icon, point to VirusScan, then click Scan.
2 Using the directory tree in the left pane of the dialog box, go to the VSO Scan
where you saved the files:
Folder
a Click the + sign next to the C drive icon.
b Click the VSO Scan Folder to highlight it (do not click the + sign next to it).
This tells Scan to check only that folder. You can also put the files in random locations on your hard drive for a more convincing demonstration of Scan’s abilities.
3 In the Scan Options area of the Scan dialog box, ensure that all options are
selected.
4 Click Scan on the lower right of the dialog box.
VirusScan scans the
VSO Scan Folder. The EICAR test files that you saved to
that folder appear in the
You can try to delete or quarantine detected files to see how Scan handles possible threats. See Understanding threat detections on page 31 for details.
10 McAfee® VirusScan® software version 10.0
List of Detected Files. If so, Scan is working properly.

Using McAfee SecurityCenter

McAfee SecurityCenter is your one-stop security shop, accessible from its icon in your Windows system tray or from your Windows desktop. With it, you can perform these useful tasks:
Get free security analysis for your computer.
Launch, manage, and configure all your McAfee subscriptions from one icon.
See continuously updated virus alerts and the latest product information.
Get quick links to frequently asked questions and account details at the
McAfee web site.
NOTE
For more information about its features, click Help in the
SecurityCenter dialog box.
While SecurityCenter is running and all of the McAfee features installed on your computer are enabled, a red M icon appears in the Windows system tray. This area is usually in the lower-right corner of the Windows desktop and contains the clock.
If one or more of the McAfee applications installed on your computer are disabled, the McAfee icon changes to black .
Using McAfee SecurityCenter
To open the McAfee SecurityCenter:
1 Right-click the McAfee icon .
2 Click Open SecurityCenter.
To access a VirusScan feature:
1 Right-click the McAfee icon .
2 Point to VirusScan, then click the feature you want to use.
User Guide 11
Getting Started
12 McAfee® VirusScan® software version 10.0

Using McAfee VirusScan

Using ActiveShield

When ActiveShield is started (loaded into computer memory) and enabled, it is constantly protecting your computer. ActiveShield scans files when they are accessed by either you or your computer. When ActiveShield detects an infected file, it automatically tries to clean the virus. If ActiveShield cannot clean the virus, you can quarantine or delete the file.
Enabling or disabling ActiveShield
ActiveShield is started (loaded into computer memory) and enabled (denoted by the red icon in your Windows system tray) by default as soon as you restart your computer after the installation process.
If ActiveShield is stopped (not loaded) or is disabled (denoted by the black icon), you can manually run it, as well as configure it to start automatically when Windows starts.
Enabling ActiveShield
To enable ActiveShield for this Windows session only:
2
Right-click the McAfee icon, point to changes to red .
If ActiveShield is still configured to start when Windows starts, a message tells you that you are now protected from threats. Otherwise, a dialog box appears that lets you configure ActiveShield to start when Windows starts (Figure 2-1 on page 14).
VirusScan, then click Enable. The McAfee icon
User Guide 13
Using McAfee VirusScan
Disabling ActiveShield
To disable ActiveShield for this Windows session only:
1 Right-click the McAfee icon, point to VirusScan, then click Disable.
2 Click Yes to confirm.
The McAfee icon changes to black .
If ActiveShield is still configured to start when Windows starts, your computer will be protected from threats again when you restart your computer.
Configuring ActiveShield options
You can modify ActiveShield starting and scanning options in the ActiveShield tab
VirusScan Options dialog box (Figure 2-1), which is accessible via the
of the McAfee icon in your Windows system tray.
Starting ActiveShield
ActiveShield is started (loaded into computer memory) and enabled (denoted by red ) by default as soon as you restart your computer after the installation process.
If ActiveShield is stopped (denoted by black ), you can configure it to start automatically when Windows starts (recommended).
14 McAfee® VirusScan® software version 10.0
Figure 2-1. ActiveShield Options
Using ActiveShield
NOTE
During updates to VirusScan, the Update Wizard might exit ActiveShield temporarily to install new files. When the
prompts you to click Finish, ActiveShield starts again.
Wizard
Update
To start ActiveShield automatically when Windows starts:
1 Right-click the McAfee icon, point to VirusScan, then click Options.
The
VirusScan Options dialog box opens (Figure 2-1 on page 14).
2 Select the Start ActiveShield when Windows starts (recommended) checkbox,
then click
3 Click OK to confirm, then click OK.
Apply to save your changes.
Stopping ActiveShield
WARNING
If you stop ActiveShield, your computer is not protected from threats. If you must stop ActiveShield, other than for updating VirusScan, ensure that you are not connected to the Internet.
To stop ActiveShield from starting when Windows starts:
1 Right-click the McAfee icon, point to VirusScan, then click Options.
The
VirusScan Options dialog box opens (Figure 2-1 on page 14).
2 Deselect the Start ActiveShield when Windows starts (recommended) checkbox,
then click
3 Click OK to confirm, then click OK.
Apply to save your changes.
Scanning e-mail and attachments
By default, e-mail scanning and automatic cleaning are enabled via the Scan e-mail
and attachments
When this option is enabled, ActiveShield automatically scans and attempts to clean inbound (POP3) and outbound (SMTP) infected e-mail messages and attachments for most popular e-mail clients, including the following:
Microsoft Outlook Express 4.0 or laterMicrosoft Outlook 97 or laterNetscape Messenger 4.0 or laterNetscape Mail 6.0 or laterEudora Light 3.0 or laterEudora Pro 4.0 or laterEudora 5.0 or later
option (Figure 2-1 on page 14).
User Guide 15
Using McAfee VirusScan
Pegasus 4.0 or later
NOTE
E-mail scanning is not supported for these e-mail clients: Web-based, IMAP, AOL, POP3 SSL, and Lotus Notes. However, ActiveShield scans e-mail attachments when they are opened.
If you disable the
Scan e-mail and attachments option, the
E-mail Scan options and the WormStopper options (Figure 2-2
on page 17) are automatically disabled. If you disable
outbound e-mail scanning, the WormStopper options are automatically disabled.
If you change your e-mail scanning options, you must restart your e-mail program to complete the changes.
Inbound e-mail
If an inbound e-mail message or attachment is infected, ActiveShield performs the following steps:
Tries to clean the infected e-mail
Tries to quarantine or delete an uncleanable e-mail
Includes an alert file in the inbound e-mail that contains information about the
actions performed to remove the possible threat
Outbound e-mail
If an outbound e-mail message or attachment is infected, ActiveShield performs the following steps:
Tries to clean the infected e-mail
Tries to quarantine or delete an uncleanable e-mail
NOTE
For details about outbound e-mail scanning errors, see the online help.
Disabling e-mail scanning
By default, ActiveShield scans both inbound and outbound e-mail. However, for enhanced control, you can set ActiveShield to scan only inbound or outbound e-mail.
To disable scanning of inbound or outbound e-mail:
1 Right-click the McAfee icon, point to VirusScan, and then click Options.
2 Click Advanced, then click the E-mail Scan tab (Figure 2-2).
3 Deselect Inbound e-mail messages or Outbound e-mail messages, then click OK.
16 McAfee® VirusScan® software version 10.0
Using ActiveShield
Figure 2-2. Advanced ActiveShield Options - E-mail tab
Scanning for worms
VirusScan monitors your computer for suspect activity that might indicate a threat is present on your computer. While VirusScan cleans viruses and other threats, WormStopper
TM
prevents viruses and worms from spreading further.
A computer “worm” is a self-replicating virus that resides in active memory and might send copies of itself through e-mail. Without WormStopper, you might notice worms only when their uncontrolled replication consumes system resources, slowing performance or halting tasks.
The WormStopper protection mechanism detects, alerts, and blocks suspect activity. Suspect activity might include the following actions on your computer:
An attempt to forward e-mail to a large portion of your address book
Attempts to forward multiple e-mail messages in rapid succession
If you set ActiveShield to use the default option in the
Advanced Options dialog box, WormStopper monitors e-mail activity
Enable WormStopper (recommended)
for suspect patterns and alerts you when a specified number of e-mails or recipients has been exceeded within a specified interval.
To set ActiveShield to scan sent e-mail messages for worm-like activity:
1 Right-click the McAfee icon, point to VirusScan, then click Options.
2 Click Advanced, then click the E-mail tab.
User Guide 17
Using McAfee VirusScan
3
Click Enable WormStopper (recommended) (Figure 2-3).
By default, the following detailed options are enabled:
Pattern matching to detect suspect activity
Alerting when e-mail is sent to 40 or more recipients
Alerting when 5 or more e-mails are sent within 30 seconds
NOTE
If you modify the number of recipients or seconds for monitoring sent e-mails, it might result in invalid detections. McAfee recommends that you click setting. Otherwise, click
Yes to change the default setting to
No to retain the default
your setting.
This option can be automatically enabled after the first time a potential worm is detected (see Managing potential worms on page 24 for details):
Automatic blocking of suspect outbound e-mails
Figure 2-3. Advanced ActiveShield Options - E-mail tab
18 McAfee® VirusScan® software version 10.0
Using ActiveShield
Scanning inbound instant message attachments
By default, scanning of instant message attachments is enabled via the Scan
inbound instant message attachments
option (Figure 2-1 on page 14).
When this option is enabled, VirusScan automatically scans and attempts to clean inbound infected instant message attachments for most popular instant messaging programs, including the following:
MSN Messenger 6.0 or laterYahoo Messenger 4.1 or laterAOL Instant Messenger 2.1 or later
NOTE
For your protection, you cannot disable auto-cleaning of instant message attachments.
If an inbound instant message attachment is infected, VirusScan performs the following steps:
Tries to clean the infected message
Prompts you to quarantine or delete an uncleanable message
Scanning all files
If you set ActiveShield to use the default All files (recommended) option, it scans every file type that your computer uses, as your computer attempts to use it. Use this option to get the most thorough scan possible.
To set ActiveShield to scan all file types:
1 Right-click the McAfee icon, point to VirusScan, and then click Options.
2 Click Advanced, then click the Scanning tab (Figure 2-4 on page 20).
3 Click All files (recommended), then click OK.
User Guide 19
Using McAfee VirusScan
Scanning program files and documents only
If you set ActiveShield to use the Program files and documents only option, it scans program files and documents, but not any other files used by your computer. The latest virus signature file ( will scan.To set ActiveShield to scan program files and documents only:
1 Right-click the McAfee icon, point to VirusScan, and then click Options.
Figure 2-4. Advanced ActiveShield Options - Scanning tab
DAT file) determines which file types that ActiveShield
2 Click Advanced, then click the Scanning tab (Figure 2-4). 3 Click Program files and documents only, then click OK.
Scanning for new unknown viruses
If you set ActiveShield to use the default Scan for new unknown viruses
(recommended)
to the signatures of known viruses, while also looking for telltale signs of unidentified viruses in the files.
To set ActiveShield to scan for new unknown viruses:
1 Right-click the McAfee icon, point to VirusScan, and then click Options.
2 Click Advanced, then click the Scanning tab (Figure 2-4).
3 Click Scan for new unknown viruses (recommended), then click OK.
20 McAfee® VirusScan® software version 10.0
option, it uses advanced heuristic techniques that try to match files
Using ActiveShield
Scanning for scripts
VirusScan monitors your computer for suspect activity that might indicate a threat is present on your computer. While VirusScan cleans viruses and other threats, ScriptStopperTM prevents Trojan horses from running scripts that spread viruses further.
A “Trojan horse” is a suspect program that pretends to be a benign application. Trojans are not viruses because they do not replicate, but they can be just as destructive.
The ScriptStopper protection mechanism detects, alerts, and blocks suspect activity. Suspect activity might include the following action on your computer:
A script execution that results in the creation, copying, or deletion of files, or
the opening of your Windows registry
If you set ActiveShield to use the default option in the
Advanced Options dialog box, ScriptStopper monitors script
Enable ScriptStopper (recommended)
execution for suspect patterns and alerts you when a specified number of e-mails or recipients has been exceeded within a specified interval.
To set ActiveShield to scan running scripts for worm-like activity:
1 Right-click the McAfee icon, point to VirusScan, then click Options.
2 Click Advanced, then click the Exploits tab (Figure 2-5).
3 Click Enable ScriptStopper (recommended), then click OK.
Figure 2-5. Advanced ActiveShield Options - Exploits tab
User Guide 21
Using McAfee VirusScan
Scanning for Potentially Unwanted Programs (PUPs)
NOTE
If McAfee AntiSpyware is installed on your computer, it manages all Potentially Unwanted Program activity. Open McAfee AntiSpyware to configure your options.
If you set ActiveShield to use the default
(recommended)
option in the Advanced Options dialog box, Potentially Unwanted
Scan Potentially Unwanted Programs
Program (PUP) protection quickly detects, blocks, and removes spyware, adware, and other programs that gather and transmit your private data without your permission.
To set ActiveShield to scan for PUPs:
1 Right-click the McAfee icon, point to VirusScan, and then click Options.
2 Click Advanced, then click the PUPs tab (Figure 2-6).
3 Click Scan Potentially Unwanted Programs (recommended), then click OK.
Figure 2-6. Advanced ActiveShield Options - PUPs tab
22 McAfee® VirusScan® software version 10.0
Understanding security alerts
If ActiveShield finds a virus, a virus alert similar to Figure 2-7 appears. For most viruses, Trojan horses, and worms, ActiveShield automatically tries to clean the file and alerts you. For Potentially Unwanted Programs (PUPs), ActiveShield detects the file, automatically blocks it, and alerts you.
Using ActiveShield
Figure 2-7. Virus alert
You can then choose how to manage infected files, infected e-mail, suspect scripts, potential worms, or PUPs, including whether to submit infected files to the McAfee AVERT labs for research.
For added protection, whenever ActiveShield detects a suspect file, you are prompted to scan your entire computer immediately. Unless you choose to hide the scan prompt, it will periodically remind you until you perform the scan.
Managing detected files
1 If ActiveShield can clean the file, you can learn more or ignore the alert:
Click Find out more information to view the name, location, and virus name
associated with the infected file.
Click Continue what I was doing to ignore the alert and close it.
2 If ActiveShield cannot clean the file, click Quarantine the detected file to encrypt
and temporarily isolate suspect files in the quarantine directory until an appropriate action can be taken.
A confirmation message appears and prompts you to check your computer for other threats. Click
3 If ActiveShield cannot quarantine the file, click Delete the detected file to try to
remove the file.
Scan to complete the quarantine process.
User Guide 23
Using McAfee VirusScan
Managing detected e-mail
By default, e-mail scanning automatically tries to clean infected e-mail. An alert file included in the inbound message notifies you whether the e-mail was cleaned, quarantined, or deleted.
Managing suspect scripts
If ActiveShield detects a suspect script, you can find out more and then stop the script if you did not intend to initiate it:
If you are sure that you trust the script, you can allow the script to run:
Managing potential worms
If ActiveShield detects a potential worm, you can find out more and then stop the e-mail activity if you did not intend to initiate it:
Click Find out more information to view the name, location, and description
of the activity associated with the suspect script.
Click Stop this script to prevent the suspect script from running.
Click Allow this script this time to let all scripts contained within a single file
run once.
Click Continue what I was doing to ignore the alert and let the script run.
Click Find out more information to view the recipient list, subject line,
message body, and description of the suspect activity associated with the infected e-mail message.
Click Stop this e-mail to prevent the suspect e-mail from being sent and
delete it from your message queue.
If you are sure that you trust the e-mail activity, click ignore the alert and let the e-mail be sent.
24 McAfee® VirusScan® software version 10.0
Continue what I was doing to
Using ActiveShield
Managing PUPs
If ActiveShield detects and blocks a Potentially Unwanted Program (PUP), you can find out more and then remove the program if you did not intend to install it:
Click Find out more information to view the name, location, and
recommended action associated with the PUP.
Click Remove this PUP to remove the program if you did not intend to
install it.
A confirmation message appears.
- If (a) you do not recognize the PUP or (b) you did not install the PUP as part of a bundle or accept a license agreement in connection with such programs, click method.
OK to remove the program using the McAfee removal
- Otherwise, click
Cancel to exit the automatic removal process. If you
change your mind later, you can manually remove the program using the vendor’s uninstaller.
Click Continue what I was doing to ignore the alert and block the program
this time.
If you (a) recognize the PUP or (b) you might have installed the PUP as part of a bundle or accepted a license agreement in connection with such programs, you can allow it to run:
Click Trust this PUP to whitelist this program and always let it run in the
future.
See "Managing trusted PUPs" for details.
Managing trusted PUPs
The programs that you add to the Trusted PUPs list will not be detected by McAfee VirusScan.
If a PUP is detected and added to the Trusted PUPs list, you can later remove it from the list if necessary.
If your Trusted PUPs list is full, you must remove some items before you can trust another PUP.
To remove a program from your Trusted PUPs list:
1 Right-click the McAfee icon, point to VirusScan, and then click Options.
2 Click Advanced, then click the PUPs tab.
3 Click Edit Trusted PUPs List, select the checkbox in front of the file name, and
click
Remove. When you are finished removing items, click OK.
User Guide 25
Using McAfee VirusScan

Manually scanning your computer

The Scan feature lets you selectively search for viruses and other threats on hard drives, floppy disks, and individual files and folders. When Scan finds an infected file, it automatically tries to clean the file, unless it is a Potentially Unwanted Program. If Scan cannot clean the file, you can quarantine or delete the file.
Manually scanning for viruses and other threats
To scan your computer:
1 Right-click the McAfee icon, point to VirusScan, then click Scan.
The
Scan dialog box opens (Figure 2-8).
2 Click the drive, folder, or file that you want to scan.
3 Select your Scan Options. By default, all of the Scan Options are pre-selected to
provide the most thorough scan possible (Figure 2-8):
Scan subfolders — Use this option to scan files contained in your
subfolders. Deselect this checkbox to allow checking of only the files visible when you open a folder or drive.
26 McAfee® VirusScan® software version 10.0
Figure 2-8. Scan dialog box
Manually scanning your computer
Example:
Scan subfolders checkbox. The folders and their contents are not scanned.
The files in Figure 2-9 are the only files scanned if you deselect the
To scan those folders and their contents, you must leave the checkbox selected.
Figure 2-9. Local disk contents
Scan all files — Use this option to allow the thorough scanning of all file
types. Deselect this checkbox to shorten the scanning time and allow checking of program files and documents only.
Scan within compressed files — Use this option to reveal hidden infected
files within . prevent checking of any files or compressed files within the compressed file.
Sometimes virus authors plant viruses in a . into another . detect these viruses as long as you leave this option selected.
ZIP and other compressed files. Deselect this checkbox to
ZIP file, then insert that .ZIP file
ZIP file in an effort to bypass anti-virus scanners. Scan can
Scan for new unknown viruses — Use this option to find the newest viruses
that might not have existing “cures.” This option uses advanced heuristic techniques that try to match files to the signatures of known viruses, while also looking for telltale signs of unidentified viruses in the files.
This scanning method also looks for file traits that can generally rule out that the file contains a virus. This minimizes the chances that Scan gives a false indication. Nevertheless, if a heuristic scan detects a virus, you should treat it with the same caution that you would treat a file that you know contains a virus.
This option provides the most thorough scan, but is generally slower than a normal scan.
User Guide 27
Using McAfee VirusScan
4 Click Scan to start scanning files.
5 Click OK to close the summary, and view the list of any detected files in the
Scan for Potentially Unwanted Programs — Use this option to detect
spyware, adware, and other programs that gather and transmit your private data without your permission.
NOTE
Leave all options selected for the most thorough scan possible. This effectively scans every file in the drive or folder that you select, so allow plenty of time for the scan to complete. The larger the hard drive and the more files you have, the longer the scan takes.
When the scan is finished, a scan summary shows the number of files scanned, the number of files detected, the number of Potentially Unwanted Programs, and the number of detected files that were automatically cleaned.
Scan dialog box (Figure 2-10).
NOTE
Scan counts a compressed file (.ZIP, .CAB, etc.) as one file within the
Files Scanned number. Also, the number of files
scanned can vary if you have deleted your temporary Internet files since your last scan.
28 McAfee® VirusScan® software version 10.0
Figure 2-10. Scan results
Manually scanning your computer
If Scan finds no viruses or other threats, click Back to select another drive or
6
folder to scan, or click
Close to close the dialog box. Otherwise, see
Understanding threat detections on page 31.
Scanning via Windows Explorer
VirusScan provides a shortcut menu to scan selected files, folders, or drives for viruses and other threats from within Windows Explorer.
To scan files in Windows Explorer:
1 Open Windows Explorer.
2 Right-click the drive, folder, or file that you want to scan, and then click Scan.
The
Scan dialog box opens and starts scanning files. By default, all of the
default
Scan Options are pre-selected to provide the most thorough scan
possible (Figure 2-8 on page 26).
Scanning via Microsoft Outlook
VirusScan provides a toolbar icon to scan for viruses and other threats in selected message stores and their subfolders, mailbox folders, or e-mail messages containing attachments from within Microsoft Outlook 97 or later.
To scan e-mail in Microsoft Outlook:
1 Open Microsoft Outlook.
2 Click the message store, folder, or e-mail message containing an attachment
that you want to scan, and then click the e-mail scanning toolbar icon .
The e-mail scanner opens and starts scanning files. By default, all of the default
Scan Options are pre-selected to provide the most thorough scan possible
(Figure 2-8 on page 26).
Automatically scanning for viruses and other threats
Although VirusScan scans files when they are accessed by either you or your computer, you can schedule automatic scanning in Windows Scheduler to thoroughly check your computer for viruses and other threats at specified intervals.
To schedule a scan:
1 Right-click the McAfee icon, point to VirusScan, then click Options.
The
VirusScan Options dialog box opens.
2 Click the Scheduled Scan tab (Figure 2-11 on page 30).
User Guide 29
Using McAfee VirusScan
3
Figure 2-11. Scheduled Scan Options
Select the Scan My Computer at a scheduled time checkbox to enable automatic scanning.
4 Specify a schedule for automatic scanning:
To accept the default schedule (8PM every Friday), click OK.
To edit the schedule:
a. Click
b. Select how often to scan your computer in the then select additional options in the dynamic area below it:
Daily - Specify the number of days between scans.
Weekly (the default) - Specify the number of weeks between scans as well
as the names of the day(s) of the week.
Monthly - Specify which day of the month to scan. Click Select Months to
specify which months to scan, and click
Once - Specify which date to scan.
30 McAfee® VirusScan® software version 10.0
Edit.
Schedule Task list, and
OK.
Manually scanning your computer
NOTE
These options in Windows Scheduler are not supported:
At system startup, When idle, and Show multiple schedules. The
last supported schedule remains enabled until you select from among the valid options.
c. Select the time of day to scan your computer in the
d. To select advanced options, click Advanced.
The
Advanced Schedule Options dialog box opens.
i. Specify a start date, end date, duration, end time, and whether to stop the task at the specified time if the scan is still running.
ii. Click click
5 Click OK to save your changes and close the dialog box. Otherwise, click
Cancel.
6 To revert to the default schedule, click Set to Default. Otherwise, click OK.
OK to save your changes and close the dialog box. Otherwise,
Cancel.
Understanding threat detections
For most viruses, Trojans, and worms, Scan automatically tries to clean the file. You can then choose how to manage detected files, including whether to submit them to the McAfee AVERT labs for research. If Scan detects a potentially unwanted program, you can manually try to clean, quarantine, or delete it (AVERT submission is unavailable).
To manage a virus or Potentially Unwanted Program:
1 If a file appears in the List of Detected Files, click the checkbox in front of the
file to select it.
Start time box.
NOTE
If more than one file appears in the list, you can select the checkbox in front of the
File Name list to perform the same
action on all of the files. You can also click the file name in the
Scan Information list to view details from the Virus
Information Library.
2 If the file is a Potentially Unwanted Program, you can click Clean to try to clean
it.
3 If Scan cannot clean the file, you can click Quarantine to encrypt and
temporarily isolate suspect files in the quarantine directory until an appropriate action can be taken. (See Managing quarantined files on page 32 for details.)
User Guide 31
Using McAfee VirusScan
If Scan cannot clean or quarantine the file, you can do either of the following:
4
Click Delete to remove the file.
Click Cancel to close the dialog box without taking any further action.
If Scan cannot clean or delete the detected file, consult the Virus Information Library at http://us.mcafee.com/virusInfo/default.asp for instructions on manually deleting the file.
If a detected file prevents you from using your Internet connection or from using your computer at all, try using a Rescue Disk to start your computer. The Rescue Disk, in many cases, can start a computer if a detected file disables it. See Creating
a Rescue Disk on page 34 for details.
For more help, consult McAfee Customer Support at http://www.mcafeehelp.com/.

Managing quarantined files

The Quarantine feature encrypts and temporarily isolates suspect files in the quarantine directory until an appropriate action can be taken. Once cleaned, a quarantined file can then be restored to its original location.
To manage a quarantined file:
1 Right-click the McAfee icon, point to VirusScan, then click Manage Quarantined
.
Files
A list of quarantined files appears (Figure 2-12).
Figure 2-12. Manage Quarantined Files dialog box
32 McAfee® VirusScan® software version 10.0
Select the checkbox next to the file(s) you want to clean.
2
NOTE
If more than one file appears in the list, you can select the checkbox in front of the
File Name list to perform the same
action on all of the files. You can also click the virus name in
Status list to view details from the Virus Information
the Library.
Managing quarantined files
Or, click click
3 Click Clean.
4 If the file is cleaned, click Restore to move it back to its original location.
5 If VirusScan cannot clean the virus, click Delete to remove the file.
6 If VirusScan cannot clean or delete the file, and if it is not a Potentially
Unwanted Program, you can submit the file to the McAfee AntiVirus Emergency Response Team (AVERT
a Update your virus signature files if they are more than two weeks old.
b Verify your subscription.
c Select the file and click Submit to submit the file to AVERT.
Add, select a suspect file to add to the quarantine list,
Open, then select it in the quarantine list.
TM
) for research:
VirusScan sends the quarantined file as an attachment with an e-mail message containing your e-mail address, country, software version, OS, and the file’s original name and location. The maximum submission size is one unique 1.5-
7 Click Cancel to close the dialog box without taking any further action.
MB file per day.
User Guide 33
Using McAfee VirusScan

Creating a Rescue Disk

Rescue Disk is a utility that creates a bootable floppy disk that you can use to start your computer and scan it for viruses if a virus keeps you from starting it normally.
NOTE
You must be connected to the Internet to download the Rescue Disk image. Also, Rescue Disk is available for computers with FAT (FAT 16 and FAT 32) hard drive partitions only. It is unnecessary for NTFS partitions.
To create a Rescue Disk:
1 On a non-infected computer, insert a non-infected floppy disk in drive A. You
might want to use Scan to ensure that both the computer and the floppy disk are virus-free. (See Manually scanning for viruses and other threats on page 26 for details.)
2 Right-click the McAfee icon, point to VirusScan, then click Create Rescue Disk.
The
Create a Rescue Disk dialog box opens (Figure 2-13).
Figure 2-13. Create a Rescue Disk dialog box
3 Click Create to create the Rescue Disk.
If this is your first time creating a Rescue Disk, a message tells you that Rescue Disk needs to download the image file for the Rescue Disk. Click download the component now, or click
A warning message tells you that the contents of the floppy disk will be lost.
4 Click Yes to continue creating the Rescue Disk.
The creation status appears in the
34 McAfee® VirusScan® software version 10.0
OK to
Cancel to download it later.
Create Rescue Disk dialog box.
When the message “Rescue disk created” appears, click OK, then close the
5
Create Rescue Disk dialog box.
6 Remove the Rescue Disk from the drive, write-protect it, and store it in a safe
location.
Write-protecting a Rescue Disk
To write-protect a Rescue Disk:
1 Turn the floppy disk label-side down (the metal circle should be visible).
2 Locate the write-protect tab. Slide the tab so the hole is visible.
Using a Rescue Disk
To use a Rescue Disk:
1 Turn off the infected computer.
2 Insert the Rescue Disk into the drive.
3 Turn the computer on.
A gray window with several options appears.

Automatically reporting viruses

4 Choose the option that best suits your needs by pressing the Function keys (for
example, F2, F3).
NOTE
Rescue Disk starts automatically in 60 seconds if you do not press any of the keys.
Updating a Rescue Disk
It is a good idea to update your Rescue Disk regularly. To update your Rescue Disk, follow the same instructions for creating a new Rescue Disk.
Automatically reporting viruses
You can anonymously send virus tracking information for inclusion in our World Virus Map. Automatically opt-in for this free, secure feature either during VirusScan installation (in the
Virus Map Reporting tab of the VirusScan Options dialog box.
Virus Map Reporting dialog box), or at any time in the
User Guide 35
Using McAfee VirusScan
Reporting to the World Virus Map
To automatically report virus information to the World Virus Map:
1 Right-click the McAfee icon, point to VirusScan, then click Options.
The
VirusScan Options dialog box opens.
2 Click the Virus Map Reporting tab (Figure 2-14).
3 Accept the default Yes, I want to participate to anonymously send your virus
information to McAfee for inclusion in its World Virus Map of worldwide detection rates. Otherwise, select your information.
4 If you are in the United States, select the state and enter the zip code where
your computer is located. Otherwise, VirusScan automatically tries to select the country where your computer is located.
5 Click OK.
36 McAfee® VirusScan® software version 10.0
Figure 2-14. Virus Map Reporting Options
No, I don’t want to participate to avoid sending
Viewing the World Virus Map
Whether or not you participate in the World Virus Map, you can view the latest worldwide detection rates via the McAfee icon in your Windows system tray.
To view the World Virus Map:
Right-click the McAfee icon, point to VirusScan, then click World Virus Map.
The
World Virus Map web page appears (Figure 2-15).
Automatically reporting viruses
Figure 2-15. World Virus Map
By default, the World Virus Map shows the number of infected computers worldwide over the past 30 days, and also when the reporting data was last updated. You can change the map view to show the number of infected files, or change the time period to show only the results over the past 7 days or the past 24 hours.
Virus Tracking section lists cumulative totals for the number of scanned files,
The infected files, and infected computers that have been reported since the date shown.
User Guide 37
Using McAfee VirusScan

Updating VirusScan

When you are connected to the Internet, VirusScan automatically checks for updates every four hours, then automatically downloads and installs weekly virus definition updates without interrupting your work.
Virus definition files are approximately 100 KB and thus have minimal impact on system performance during download.
If a product update or virus outbreak occurs, an alert appears. Once alerted, you can then choose to update VirusScan to remove the threat of a virus outbreak.
Automatically checking for updates
McAfee SecurityCenter is automatically configured to check for updates for all of your McAfee services every four hours when you are connected to the Internet, then notify you with alerts and sounds. By default, SecurityCenter automatically downloads and installs any available updates.
NOTE
In some cases, you will be prompted to restart your computer to complete the update. Be sure to save all of your work and close all applications before restarting.
Manually checking for updates
In addition to automatically checking for updates every four hours when you are connected to the Internet, you can also manually check for updates at any time.
To manually check for VirusScan updates:
1 Ensure your computer is connected to the Internet.
2 Right-click the McAfee icon, then click Updates.
The
SecurityCenter Updates dialog box opens.
3 Click Check Now.
If an update exists, the
page 39). Click
If no updates are available, a dialog box tells you that VirusScan is up-to-date. Click
OK to close the dialog box.
Update to continue.
VirusScan Updates dialog box opens (Figure 2-16 on
38 McAfee® VirusScan® software version 10.0
Updating VirusScan
Figure 2-16. Updates dialog box
Log on to the web site if prompted. The Update Wizard installs the update
4
automatically.
5 Click Finish when the update is finished installing.
NOTE
In some cases, you will be prompted to restart your computer to complete the update. Be sure to save all of your work and close all applications before restarting.
User Guide 39
Using McAfee VirusScan
40 McAfee® VirusScan® software version 10.0

Index

A
ActiveShield
cleaning a virus default scan setting disabling enabling scan options scanning all file types scanning all files scanning e-mail and attachments scanning for new unknown viruses scanning for Potentially Unwanted Programs
(PUPs) scanning for scripts scanning for worms scanning inbound instant message
attachments scanning program files and documents
, 20
only
, 15
starting stopping
, 9
testing
alerts
for detected e-mail for detected files for potential worms for PUPs for suspect scripts for viruses
AVERT, submitting suspect files to
, 23
, 15, 17 to 22
, 14
, 13
, 14
, 19
, 19
, 15
, 22
, 21
, 17
, 19
, 15
, 24
, 23
, 24
, 25
, 24
, 23
, 33
C
configuring
VirusScan
ActiveShield
, 26
Scan
creating a Rescue Disk
, 13
, 34
, 20
E
editing whitelists, 25 e-mail and attachments
auto-cleaning
enabling
scanning
disabling enabling errors
, 15
, 16
, 15
, 16
G
getting started with VirusScan, 7
I
inbound instant message attachments
auto-cleaning scanning
, 19
, 19
L
list of detected files (Scan), 28, 31
M
McAfee SecurityCenter, 11 Microsoft Outlook
, 29
N
new features, 7
P
Potentially Unwanted Programs (PUPs), 22
, 25
alerts cleaning deleting detecting quarantining removing trusting
, 31
, 32
, 31
, 31
, 25
, 25
User Guide 41
Index
Q
Quarantine
adding suspect files cleaning files deleting files deleting suspect files managing suspect files restoring cleaned files submitting suspect files
Quick Start Card
, 32
, 32 to 33
, 32
, 33
, 32
, 32 to 33
, 33
, iii
R
Rescue Disk
creating updating using write-protecting
, 34
, 35
, 32, 35
, 35
S
Scan
automatic scanning cleaning a virus or Potentially Unwanted
Program deleting a virus or Potentially Unwanted
Program manual scanning manual scanning via Microsoft Outlook
toolbar manual scanning via Windows Explorer quarantining a virus or Potentially Unwanted
Program Scan all files option Scan for new unknown viruses option Scan for Potentially Unwanted Programs
option Scan subfolders option Scan within compressed files option testing
Scan all files option (Scan) Scan for new unknown viruses option (Scan) Scan for Potentially Unwanted Programs option
(Scan)
, 31
, 32
, 29
, 31
, 28
, 9 to 10
, 28
, 29
, 26
, 29
, 27
, 27
, 26
, 27
, 27
, 27
scan options
ActiveShield
, 26
Scan Scan subfolders option (Scan) Scan within compressed files option (Scan) scanning
all files
compressed files
for new unknown viruses
for Potentially Unwanted Programs (PUPs)
for scripts
for worms
program files and documents only
scheduling automatic scans
subfolders
via Microsoft Outlook toolbar
via Windows Explorer scheduling scans scripts
alerts
allowing
stopping ScriptStopper submitting suspect files to AVERT system requirements
, 14, 19 to 20
, 26
, 19, 27
, 27
, 27
, 21
, 17
, 20
, 29
, 26
, 29
, 29
, 29
, 24
, 24 , 24 , 21
, 33
, 8
T
technical support, 32 testing VirusScan Trojans
alerts
detecting Trusted PUPs List
, 9
, 23
, 31
, 25
U
Update Wizard, 15 updating
a Rescue Disk
VirusScan
automatically manually
using a Rescue Disk
, 35
, 38
, 38
, 35
, 27
, 22
42 McAfee® VirusScan® software version 10.0
V
viruses
, 23
alerts allowing suspect scripts cleaning deleting deleting detected files detecting detecting with ActiveShield quarantining quarantining detected files reporting automatically stopping potential worms stopping suspect scripts
VirusScan
getting started reporting viruses automatically scanning via Microsoft Outlook toolbar scanning via Windows Explorer scheduling scans testing updating automatically updating manually
, 23, 31
, 23, 31
, 31
, 23, 31
, 7
, 9
, 24
, 23
, 23
, 35, 37
, 24
, 24
, 29
, 38
, 38
Index
, 23
, 35, 37
, 29
, 29
W
whitelisted programs, 25 whitelisting
, 25
PUPs Windows Explorer World Virus Map
reporting
viewing worms
, 23 to 24
alerts
detecting
stopping WormStopper write-protecting a Rescue Disk
, 29
, 35
, 37
, 23, 31
, 24
, 17
, 35
User Guide 43
User Guide
Version 7.0
COPYRIGHT
Copyright © 2005 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means without the written permission of McAfee, Inc., or its suppliers or affiliate companies.
TRADEMARK ATTRIBUTIONS
ACTIVE FIREWALL, ACTIVE SECURITY, ACTIVESECURITY (AND IN KATAKANA), ACTIVESHIELD, ANTIVIRUS ANYWARE AND DESIGN, CLEAN-UP, DESIGN (STYLIZED E), DESIGN (STYLIZED N), ENTERCEPT, ENTERPRISE SECURECAST, ENTERPRISE SECURECAST (AND IN KATAKANA), EPOLICY ORCHESTRATOR, FIRST AID, FORCEFIELD, GMT, GROUPSHIELD, GROUPSHIELD (AND IN KATAKANA), GUARD DOG, HOMEGUARD, HUNTER, INTRUSHIELD, INTRUSION PREVENTION THROUGH INNOVATION, M AND DESIGN, MCAFEE, MCAFEE (AND IN KATAKANA), MCAFEE AND DESIGN, MCAFEE.COM, MCAFEE VIRUSSCAN, NA NETWORK ASSOCIATES, NET TOOLS, NET TOOLS (AND IN KATAKANA), NETCRYPTO, NETOCTOPUS, NETSCAN, NETSHIELD, NETWORK ASSOCIATES, NETWORK ASSOCIATES COLLISEUM, NETXRAY, NOTESGUARD, NUTS & BOLTS, OIL CHANGE, PC MEDIC, PCNOTARY, PRIMESUPPORT, RINGFENCE, ROUTER PM, SECURECAST, SECURESELECT, SPAMKILLER, STALKER, THREATSCAN, TIS, TMEG, TOTAL VIRUS DEFENSE, TRUSTED MAIL, UNINSTALLER, VIREX, VIRUS FORUM, VIRUSCAN, VIRUSSCAN, VIRUSSCAN (AND IN KATAKANA), WEBSCAN, WEBSHIELD, WEBSHIELD (AND IN KATAKANA), WEBSTALKER, WEBWALL, WHAT'S THE STATE OF YOUR IDS?, WHO'S WATCHING YOUR NETWORK, YOUR E-BUSINESS DEFENDER, YOUR NETWORK. OUR BUSINESS. are registered trademarks or trademarks of McAfee, Inc. and/or its affiliates in the US and/or other countries. Red in connection with security is distinctive of McAfee brand products. All other registered and unregistered trademarks herein are the sole property of their respective owners.
LICENSE INFORMATION License Agreement
NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, WHICH SETS FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU HAVE ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT ACCOMPANIES YOUR SOFTWARE PACKAGING OR THAT YOU HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET, A FILE ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEB SITE FROM WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO MCAFEE OR THE PLACE OF PURCHASE FOR A FULL REFUND.
Attributions
This product includes or may include:
Software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/).Cryptographic software written by Eric A. Young and
software written by Tim J. Hudson. similar Free Software licenses which, among other rights, permit the user to copy, modify and redistribute certain programs, or portions thereof, and have access to the source code. The GPL requires that for any software covered under the GPL which is distributed to someone in an executable binary format, that the source code also be made available to those users. For any such software covered under the GPL, the source code is made available on this CD. If any Free Software licenses require that McAfee provide rights to use, copy or modify a software program that are broader than the rights granted in this agreement, then such rights shall take precedence over the rights and restrictions herein.Software originally written by Henry Spencer, Copyright 1992, 1993, 1994, 1997 Henry Spencer.Software originally written by Robert Nordier, Copyright © 1996-7 Robert Nordier. Software written by Douglas W. Sauder. Software developed by the Apache Software Foundation (http://www.apache.org/). A copy of the license agreement for this software can be found at www.apache.org/licenses/LICENSE-2.0.txt.
International Components for Unicode (“ICU”) Copyright © 1995-2002 International Business Machines Corporation and others.Software developed by
CrystalClear Software, Inc., Copyright © 2000 CrystalClear Software, Inc.  FEAD® Optimizer® technology, Copyright Netopsystems AG, Berlin, Germany.
Outside In
Thai Open Source Software Center Ltd. and Clark Cooper, © 1998, 1999, 2000.Software copyrighted by Expat maintainers.Software copyrighted by The Regents of the University of California, © 1989. Software copyrighted by Gunnar Ritter.Software copyrighted by Sun Microsystems®, Inc.© 2003.Software copyrighted by Gisle Aas. © 1995-2003. Software copyrighted by Michael A. Chase, © 1999-2000. Software copyrighted by Neil Winton, © 1995-1996.
Software copyrighted by RSA Data Security, Inc., © 1990-1992.Software copyrighted by Sean M. Burke, © 1999, 2000.Software copyrighted by Martijn
Koster, © 1995.Software copyrighted by Brad Appleton, © 1996-1999. Software copyrighted by Michael G. Schwern, © 2001.Software copyrighted by Graham Barr, © 1998.Software copyrighted by Larry Wall and Clark Cooper, © 1998-2000.Software copyrighted by Frodo Looijaard, © 1997.Software copyrighted by the Python Software Foundation, Copyright © 2001, 2002, 2003. A copy of the license agreement for this software can be found at www.python.org.
Software copyrighted by Beman Dawes, © 1994-1999, 2002.Software written by Andrew Lumsdaine, Lie-Quan Lee, Jeremy G. Siek © 1997-2000 University of
Notre Dame.Software copyrighted by Simone Bordet & Marco Cravero, © 2002.Software copyrighted by Stephen Purcell, © 2001.Software developed by the Indiana University Extreme! Lab (http://www.extreme.indiana.edu/).Soft ware copyrighted by International Business Machines Corporation and others, © 1995-2003. Software developed by the University of California, Berkeley and its contributors. Software developed by Ralf S. Engelschall <rse@engelschall.com> for use in the mod_ssl project (http://www.modssl.org/). Software copyrighted by Kevlin Henney, © 2000-2002. Software copyrighted by Peter Dimov and Multi Media Ltd. © 2001, 2002.Software copyrighted by David Abrahams, © 2001, 2002. See http://www.boost.org/libs/bind/
bind.html for documentation.Software copyrighted by Steve Cleary, Beman Dawes, Howard Hinnant & John Maddock, © 2000.Software copyrighted by
Boost.org, © 1999-2002.Software copyrighted by Nicolai M. Josuttis, © 1999.Software copyrighted by Jeremy Siek, © 1999-2001.Software copyrighted by Daryle Walker, © 2001.Software copyrighted by Chuck Allison and Jeremy Siek, © 2001, 2002.Software copyrighted by Samuel Krempp, © 2001. See
http://www.boost.org for updates, documentation, and revision history.
copyrighted by Cadenza New Zealand Ltd., © 2000. Software copyrighted by Jens Maurer, © 2000, 2001. Software copyrighted by Jaakko Järvi (jaakko.jarvi@cs.utu.fi), © 1999, 2000.Software copyrighted by Ronald Garcia, © 2002.Software copyrighted by David Abrahams, Jeremy Siek, and Daryle Walker, © 1999-2001.
www.housemarque.com>, © 2001.
copyrighted by Greg Colvin and Beman Dawes, © 1998, 1999.Software copyrighted by Peter Dimov, © 2001, 2002.Software copyrighted by Jeremy Siek and John R. Bandela, © 2001.Software copyrighted by Joerg Walter and Mathias Koch, © 2000-2002.
PATENT INFORMATION
Protected by US Patents 6,496,875; 6,668,289.
®
Viewer Technology © 1992-2001 Stellent Chicago, Inc. and/or Outside In® HTML Export, © 2001 Stellent Chicago, Inc.Software copyrighted by
Software copyrighted by Stephen Cleary (shammah@voyager.net), © 2000. Software copyrighted by Housemarque Oy <http://
Some software programs that are licensed (or sublicensed) to the user under the GNU General Public License (GPL) or other
Software copyrighted by Doug Gregor (gregod@cs.rpi.edu), © 2001, 2002.Software
Software copyrighted by Paul Moore, © 1999.Software copyrighted by Dr. John Maddock, © 1998-2002.Software
Issued July 2005 / McAfee® SpamKiller® software version 7.0

Quick Start Card

If you are installing your product from a CD or a Web site, print this convenient reference page.
Are you installing your product from a CD?
Yes
1. Insert your product CD into your CD-ROM drive. If the installation does not start automatically, click your Windows desktop, then click
Start on
Run.
Are you installing your product from a Web site?
No
Yes
1. Go to the McAfee Web site, and click
My Account.
2. In the Run dialog box, type D:\SETUP.EXE (where D is the letter of your CD-ROM drive).
2. If prompted, enter your subscribing e-mail address and password, then
Log In to open your Account Info
3. Click OK.
McAfee reserves the right to change Upgrade & Support Plans and policies at any time without notice. McAfee and its
product names are registered trademarks of McAfee, Inc. and/or its affiliates in the US and/or other countries.
© 2005 McAfee, Inc. All Rights Reserved.
click page.
3. Locate your product in the list, and click the download icon.
User Guide iii
Quick Start Card
For more information
To view the User Guides on the product CD, ensure that you have Acrobat Reader installed; if not, install it now from the McAfee product CD.
1 Insert your product CD into your CD-ROM
drive.
2 Open Windows Explorer: Click Start on
your Windows desktop, and click
3 Locate the Manuals folder, and double-click
the User Guide .
PDF you want to open.
Search.
Registration benefits
McAfee recommends that you follow the easy steps within your product to transmit your registration directly to us. Registration ensures that you receive timely and knowledgeable technical assistance, plus the following benefits:
FREE electronic support Virus definition (.DAT) file updates for one
year after installation when you purchase VirusScan software
Go to http://www.mcafee.com/ for pricing of an additional year of virus signatures.
60-day warranty that guarantees
replacement of your software CD if it is defective or damaged
SpamKiller filter updates for one year after
installation when you purchase SpamKiller software
Go to http://www.mcafee.com/ for pricing of an additional year of filter updates.
McAfee Internet Security Suite updates for
one year after installation when you purchase MIS software
Go to http://www.mcafee.com/ for pricing of an additional year of content updates.
Technical Support
For technical support, please visit
http://www.mcafeehelp.com/.
Our support site offers 24-hour access to the easy-to-use Answer Wizard for solutions to the most common support questions.
Knowledgeable users can also try our advanced options, which include a Keyword Search and our Help Tree. If a solution cannot be found, you can also access our FREE Chat Now! and E-mail Express! options. Chat and e-mail help you to quickly reach our qualified support engineers through the Internet, at no cost. Otherwise, you can get phone support information at
http://www.mcafeehelp.com/.
iv McAfee® SpamKiller® software version 7.0
Contents
Quick Start Card . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . iii
1 Getting Started . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
User options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Understanding the top pane . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Understanding the Summary page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Microsoft Outlook and Outlook Express integration . . . . . . . . . . . . . . . . . . . . . . . . . . 11
System requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Using McAfee SecurityCenter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
2 Using SpamKiller . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Disabling SpamKiller . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
3 Managing E-mail Accounts and Users . . . . . . . . . . . . . . . . . . . . . 17
Adding e-mail accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Adding an e-mail account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Pointing your e-mail client to SpamKiller . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Deleting e-mail accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Deleting an e-mail account from SpamKiller . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Editing e-mail account properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
POP3 accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
MSN/Hotmail accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
MAPI accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Adding users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
User passwords and protecting children from spam . . . . . . . . . . . . . . . . . . . . . . . . . 26
Logging on to SpamKiller in a multi-user environment . . . . . . . . . . . . . . . . . . . . . . . 27
User Guide v
Contents
4 Using the Friends List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Opening a Friends List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Importing address books . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Importing an address book by automatic import . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Importing an address book manually . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Editing address book information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Deleting an address book from the automatic import list . . . . . . . . . . . . . . . . . . . . . . 32
Adding friends . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Adding friends from the Blocked E-mail or Accepted E-mail page . . . . . . . . . . . . . . . 33
Adding friends from the Friends page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Adding friends from Microsoft Outlook . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Editing friends . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Deleting friends . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
5 Working With Blocked and Accepted Messages . . . . . . . . . . . . 37
Blocked E-mail page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Accepted E-mail page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Tasks for Blocked E-mail and Accepted E-mail . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
Rescuing messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
From the Blocked E-Mail page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
From the SpamKiller folder in Microsoft Outlook or Outlook Express . . . . . . . . . . . . 41
Blocking messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
From the Accepted E-mail page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
From Microsoft Outlook . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
Where are the blocked messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
Deleting a message manually . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
Modifying how spam messages are processed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
Tagging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
Blocking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
Modifying how SpamKiller processes spam messages . . . . . . . . . . . . . . . . . . . . . . . 43
Using the AntiPhishing filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Adding friends to a Friends List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Adding filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Regular expressions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
Reporting spam to McAfee . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Sending complaints manually . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Sending error messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Sending an error message manually . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
vi McAfee® SpamKiller® software version 7.0
Contents
6 Frequently Asked Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
SpamKiller is unable to communicate with its server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Starting the SpamKiller server manually . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
SpamKiller server is blocked by firewalls or internet filtering programs . . . . . . . . . . . 51
Cannot connect to the e-mail server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
Verifying your connection to the Internet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
Verifying the POP3 server address for SpamKiller . . . . . . . . . . . . . . . . . . . . . . . . . . 52
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
User Guide vii
Contents
viii McAfee® SpamKiller® software version 7.0

Getting Started

Welcome to McAfee SpamKiller.
McAfee SpamKiller software helps stop spam from entering your e-mail Inbox. With it, you get the following features:

User options

Block spam using filters, and quarantine spam outside of your Inbox
View blocked and accepted messages
Monitor and filter multiple e-mail accounts
Import friends’ addresses into the Friends List
Fight back against spammers (report spam, complain about spam, create
custom filters)
Protect children from viewing spam messages
One-click block and one-click rescue
1

Filtering

Double-byte character set support
Multi-user support (for Windows 2000 and Windows XP)
Update filters automatically
Create custom filters to block e-mail that contain mostly images, invisible text,
or invalid formatting
Multi-tiered core filtering engine
Dictionary attack filter
Multi-level adaptive filtering
Security filters
User Guide 9
Getting Started

Features

This version of SpamKiller offers the following features:
Filtering - advanced filtering options provide new filtering techniques,
including support for meta-character filtering and junk text identification.
Phishing - AntiPhishing browser plug-in via an Internet Explorer toolbar
easily identifies and blocks potential phishing Web sites.
Microsoft Outlook and Outlook Express integration - toolbar provides a folder
within your mail client to block spam directly.
Installation - streamlined setup and configuration. Automatic account
detection assures smooth setup, configuration, and integration with existing e-mail accounts.
Updates - auto-updates run silently in the background, always vigilant to
minimize your exposure to emerging spam threats.
Interface - intuitive user interface for keeping your computer free of spam.
Support - free live instant messaging and e-mail technical support for easy,
prompt, and live customer service.
Spam message processing - by default, spam messages are tagged as [SPAM]
and placed in the SpamKiller folder in Outlook and Outlook Express, or your Inbox. Tagged messages also appear on the Accepted E-mail page.

Understanding the top pane

The following icons appear in the top pane of each SpamKiller page:
Click Switch User to log on as a different user.
Note: Switch user is available only if your computer runs Windows 2000 or
Windows XP, multiple users have been added to SpamKiller, and you are logged on to SpamKiller as an administrator.
Click Support to open the online Support page for McAfee, which provides
hot topics on SpamKiller and other McAfee products, answers to frequently asked questions, and more. You must be connected to the Internet to access the Support page.
Click Help to open the online Help, which provides detailed instructions
on setting up and using SpamKiller.
10 McAfee® SpamKiller® software version 7.0

Understanding the Summary page

Click the Summary tab to open the Summary page (Figure 1-1).
Overview of your SpamKiller status - indicates if filtering is enabled, when a
Friends List was last updated, and the number of spam messages you received today. From here you can disable or enable SpamKiller filtering, update Friends Lists, and open the Blocked E-mail page.
Most recent e-mails that were identified as spam and blocked - the latest spam
messages that SpamKiller blocked (messages removed from your Inbox).
E-mail Overview - the total number of e-mail, spam (blocked messages), and
percentage of total spam you have received.
Recent Spam - a breakdown of the type of spam you received in the past 30
days.
Understanding the Summary page
Figure 1-1. Summary page
Microsoft Outlook and Outlook Express integration
You can access core SpamKiller features from Outlook Express 6.0, Outlook 98, Outlook 2000, and Outlook XP, by selecting the SpamKiller menu or the SpamKiller toolbar.
The SpamKiller toolbar appears to the right of the standard toolbars in Outlook and Outlook Express. If the toolbar is not visible, expand the e-mail application window or click the arrows to see more toolbars.
User Guide 11
Getting Started
When the SpamKiller toolbar first appears in your e-mail application, you can only use the toolbar commands on new messages. Existing spam e-mail must be manually deleted.

System requirements

Microsoft
Personal computer with Pentium-compatible processor
Windows 98 or 2000: 133 MHz or higher
Windows Me: 150 MHz or higher
Windows XP (Home and Pro): 300 MHz or higher
RAM
Windows 98, Me, or 2000: 64 MB
Windows XP (Home and Pro): 128 MB
35 MB hard disk space
Microsoft Internet Explorer 5.5 or later
®
Windows 98, Windows Me, Windows 2000, or Windows XP
NOTE
To upgrade to the latest version of Internet Explorer, visit the Microsoft Web site at http://www.microsoft.com/.
Supported e-mail programs
POP3 (Outlook Express, Outlook, Eudora, Netscape)
MAPI (Outlook)
Web (MSN/Hotmail, or e-mail account with POP3 access)
Required for the toolbar plug-in
Outlook Express 6.0 or later
Outlook 98, 2000 with SP3, 2003, or XP
Internet Explorer 6.0 or later
12 McAfee® SpamKiller® software version 7.0

Using McAfee SecurityCenter

The McAfee SecurityCenter is your one-stop security shop. Seamless integration with the McAfee SecurityCenter provides a consolidated view of your computer’s security status, plus the latest security and virus alerts. You can run SecurityCenter from the McAfee icon in your Windows system tray or from your Windows desktop.
NOTE
For more information about its features, click Help in the SecurityCenter dialog box.
While the SecurityCenter is running and all of the McAfee features installed on your computer are enabled, a red (Windows XP notification area).
If one or more of the McAfee applications installed on your computer are disabled, the McAfee icon changes to black: .
To open the McAfee SecurityCenter:
1 Right-click the McAfee icon .
2 Click Open SecurityCenter.
To access a SpamKiller feature:
M icon appears in the Windows system tray
Using McAfee SecurityCenter
1 Right-click the McAfee icon .
2 Point to SpamKiller, and then click the feature you want to use.
User Guide 13
Getting Started
14 McAfee® SpamKiller® software version 7.0

Using SpamKiller

When you install SpamKiller, the McAfee icon appears on your system tray located near your system clock. From the McAfee icon, you can access SpamKiller, McAfee SecurityCenter, and other McAfee products installed on your computer.

Disabling SpamKiller

You can disable SpamKiller and prevent e-mail from being filtered.
To disable filtering:
2
Right-click the McAfee icon , point to click the
To enable filtering:
Right-click the McAfee icon, point to
Summary tab, and then click Click here to enable.
Summary tab, and then click Click here to disable.
SpamKiller, and then click Disable. Or
SpamKiller, and then click Enable. Or click the
User Guide 15
Using SpamKiller
16 McAfee® SpamKiller® software version 7.0

Managing E-mail Accounts and Users

Adding e-mail accounts

You can add the following e-mail accounts:
Standard e-mail account (POP3) - most home users have this type of account
MSN/Hotmail account - MSN/Hotmail Web-based accounts
NOTE
If your computer runs Windows 2000 or Windows XP, and you plan to add multiple users to SpamKiller, you must add users before you can add e-mail accounts to their user profiles. For more information, see Adding users on page 25. If you add multiple users to SpamKiller, the account is added to the profile of the user who is currently logged on to SpamKiller.
3
User Guide 17
Managing E-mail Accounts and Users
Adding an e-mail account
1 Click the Settings tab to open the Settings page (Figure 3-1), and then click
E-mail Accounts. The E-mail Accounts dialog box appears and displays all
e-mail accounts added to SpamKiller.
NOTE
If multiple users were added to SpamKiller, the list displays the e-mail accounts of the user who is currently logged on to SpamKiller.
2 Click Add. The E-mail Accounts wizard appears.
3 Follow the instructions on the dialog boxes that appear.
If you add an MSN/Hotmail account, SpamKiller searches for an MSN/Hotmail address book to import into your Personal Friends List.
Figure 3-1. Settings page
Pointing your e-mail client to SpamKiller
If you add an account that SpamKiller does not detect (the account does not appear
Select Account dialog box), or you want to read your MSN/Hotmail e-mail
in the as a POP3 account in SpamKiller, point your e-mail client to SpamKiller by changing the incoming e-mail server.
For example, if your incoming e-mail server is “mail.mcafee.com”, change it to “localhost”.
18 McAfee® SpamKiller® software version 7.0

Deleting e-mail accounts

Delete an e-mail account from SpamKiller if you no longer want SpamKiller to filter it.
Deleting an e-mail account from SpamKiller
1 Click the Settings tab, and then select E-mail Accounts. The E-mail Accounts
dialog box appears and displays all e-mail accounts added to SpamKiller.
NOTE
If multiple users were added to SpamKiller, the list displays the e-mail accounts of the user who is currently logged on to SpamKiller.
2 Select an account, and then click Delete.

Editing e-mail account properties

You can edit information about an e-mail account you added to SpamKiller. For example, change the e-mail address, the account description, server information, how often SpamKiller checks the account for spam, and how your computer connects to the Internet.
Deleting e-mail accounts
POP3 accounts
Editing POP3 accounts
1 Click the Settings tab, and then click E-mail Accounts. The E-mail Accounts
dialog box appears and displays all e-mail accounts added to SpamKiller.
2 Select a POP3 account, and then click Edit.
3 Click the General tab to edit the account description and e-mail address.
Description - description of the account. You can type any information in
E-mail address - e-mail address of the account.
4 Click the Servers tab to edit server information.
Incoming e-mail - name of the server that receives incoming mail.
NOTE
If multiple users were added to SpamKiller, the list displays the e-mail accounts of the user who is currently logged on to SpamKiller.
this box.
User Guide 19
Managing E-mail Accounts and Users
User name - user name you use to access the account. Also known as
Account Name.
Password - password you use to access the account.
Outgoing e-mail - name of the server that sends outgoing mail. Click More
to edit authentication requirements for the outgoing server.
5 Click the Checking tab to edit how often SpamKiller checks the account for
spam:
a Select Check every or Check daily at, and then type or select a time in the
corresponding box. If you enter the number zero, SpamKiller only checks the account when it connects.
b Select additional times for SpamKiller to filter the account:
Check on startup - if you have a direct connection, and you want
SpamKiller to check the account every time your computer starts.
Check when a connection is dialed - if you have a dial-up connection, and
you want SpamKiller to check the account every time you connect to the Internet.
6 Click the Connection tab to specify how SpamKiller dials an Internet
connection so that it can check your Inbox for new messages to filter.
Never dial a connection - SpamKiller does not automatically dial a
connection for you. You must first manually start your dial-up connection.
Dial when needed - an Internet connection is not available, SpamKiller
automatically attempts to connect using your default dial-up Internet connection.
Always dial - SpamKiller automatically attempts to connect using the
dial-up connection you specify.
Stay connected after filtering is done - your computer stays connected to the
Internet after filtering is finished.
7 Click the Advanced tab to edit advanced options.
Leave spam messages on the server - if you want a copy of blocked
messages to remain on your e-mail server. You can view mail from your e-mail client and the SpamKiller Blocked E-mail page. If the checkbox is not selected, you can only view blocked messages from the Blocked E-mail page.
POP3 port - (POP3 port number) POP3 server handles incoming messages.
SMTP port - (SMTP port number) SMTP server handles outgoing messages.
20 McAfee® SpamKiller® software version 7.0
Editing e-mail account properties
Server timeout - length of time SpamKiller waits to receive e-mail before
timing out and stopping.
Increase the server time-out value if you have problems receiving mail. Your e-mail connection might be slow; therefore, increasing the server time-out value allows SpamKiller to wait longer before timing out.
8 Click OK.
User Guide 21
Managing E-mail Accounts and Users
MSN/Hotmail accounts
Editing MSN/Hotmail accounts
1 Click the Settings tab, and then click E-mail Accounts.
The
E-mail Accounts dialog box appears and displays all e-mail accounts
added to SpamKiller.
NOTE
If multiple users were added to SpamKiller, the list displays the e-mail accounts of the user who is currently logged on to SpamKiller.
2 Select an MSN/Hotmail account, and then click Edit.
3 Click the General tab to edit the account description and e-mail address.
Description - description of the account. You can type any information in
this box.
E-mail address - e-mail address of the account.
4 Click the Servers tab to edit server information.
Incoming e-mail - name of the server that receives incoming mail.
Password - password you use to access the account.
Outgoing e-mail - name of the server that sends outgoing mail.
Use an SMTP server for outgoing e-mail - if you plan to send error messages
and do not want to include the MSN signature line in the error message. The MSN signature line makes it easy for spammers to recognize that the error message is fake.
Click
More to change authentication requirements for the outgoing server.
5 Click the Checking tab to specify how often SpamKiller checks the account for
spam:
a Select Check every or Check daily at, and then type or select a time in the
corresponding box. If you enter the number zero, SpamKiller only checks the account when it connects.
b Select additional times for SpamKiller to filter the account:
Check on startup — Select this option if you have a direct connection, and
you want SpamKiller to check the account every time SpamKiller starts.
Check when a connection is dialed — Select this option if you have a dial-up
connection, and you want SpamKiller to check the account every time you connect to the Internet.
22 McAfee® SpamKiller® software version 7.0
Editing e-mail account properties
Click the Connection tab to specify how SpamKiller dials an Internet
6
connection so that it can check your Inbox for new messages to filter.
Never dial a connection - SpamKiller does not automatically dial a
connection for you. You must first manually start your dial-up connection.
Dial when needed - when an Internet connection is not available,
SpamKiller automatically attempts to connect using your default dial-up Internet connection.
Always dial - SpamKiller automatically attempts to connect using the
dial-up connection you specify.
Stay connected after filtering is done - your c omp uter stays connected to the
Internet after filtering is finished.
7 Click OK.
Configuring a Hotmail account to block spam in Outlook or Outlook Express
SpamKiller can filter Hotmail accounts directly. See the online help for details. However, you cannot block messages or add friends using the SpamKiller toolbar in Outlook or Outlook Express until you configure your Hotmail account.
1 Configure your Hotmail account in MSK.
2 If you have an existing Hotmail account in Outlook or Outlook Express, you
must remove it first.
3 Add your Hotmail account to Outlook or Outlook Express. Ensure that you
select
4 Name the incoming server as localhost.
5 Type the name of the available outgoing SMTP server (required).
6 Complete the account configuration process. You can now block new Hotmail
spam e-mail or add a friend.
MAPI accounts
The following conditions are required for SpamKiller to successfully integrate with MAPI in Outlook:
Only for Outlook 98, Outlook was initially installed with
Corporate/Workgroup support.
Only for Outlook 98, the first e-mail account is a MAPI account.
The computer is logged on to the domain.
POP3 for the account type and incoming mail server type.
User Guide 23
Managing E-mail Accounts and Users
Editing MAPI accounts
1 Click the Settings tab, and then click E-mail Accounts. The E-mail Accounts
dialog box appears and displays all e-mail accounts added to SpamKiller.
NOTE
If multiple users were added to SpamKiller, the list displays the e-mail accounts of the user who is currently logged on to SpamKiller.
2 Select a MAPI account, and then click Edit.
3 Click the General tab to edit the account description and e-mail address.
Description - description of the account. You can type any information in
this box.
E-mail address - e-mail address of the account.
4 Click the Profile tab to edit profile information.
Profile - MAPI profile for the account.
Password - password that corresponds with the MAPI profile if you have
set one up (not necessarily the e-mail account password).
5 Click the Connection tab to specify how SpamKiller dials an Internet
connection so that it can check your Inbox for new messages to filter:
Never dial a connection - SpamKiller does not automatically dial a
connection for you. You must first manually start your dial-up connection.
Dial when needed - when an Internet connection is not available,
SpamKiller automatically attempts to connect using your default dial-up Internet connection.
Always dial - SpamKiller automatically attempts to connect using the
dial-up connection you specify.
Stay connected after filtering is done - your computer stays connected to the
Internet after filtering is finished.
6 Click OK.
24 McAfee® SpamKiller® software version 7.0

Adding users

SpamKiller can set up multiple users, corresponding to the users set up on your Windows 2000 or Windows XP operating system.
When SpamKiller is installed on your computer, an administrator user profile is automatically created for the Windows user who was logged on. If you add e-mail accounts to SpamKiller during installation, the e-mail accounts are added to that administrator’s user profile.
Before you add more e-mail accounts to SpamKiller, determine if you need to add more SpamKiller users. Adding users is beneficial if multiple people use your computer and have their own e-mail accounts. Each user’s e-mail account is added to their user profile, allowing users to manage their e-mail accounts, personal settings, personal filters, and Personal Friends List.
User types define the tasks a user can perform in SpamKiller. The following table is a summary of permissions for each user type. Administrators can perform all tasks while limited users can only perform tasks according to their personal profiles. For example, administrators can view the whole content of blocked messages, while limited users can only view the subject line.
Tasks Administrator Limited User
Adding users
Manage personal e-mail accounts, Personal Filters, Personal Friends List, and personal sound settings
Manage personal Blocked E-mail and Accepted E-mail pages
View message text of blocked messages X
View message text of accepted messages X X
Manage Global Filters and the Global Friends List X
Report spam to McAfee X X
Send complaints and error messages X X
Manage complaints and error messages (create, edit, and delete message templates)
Manage users (create, edit, and remove users) X
Backup and restore SpamKiller X
View the Summary page of spam received X X
XX
XX
X
When a user logs on to your computer after being added, they are prompted to add an e-mail account to their user profile.
To add and manage users, the following is required:
You must be logged on to SpamKiller as an administrator.
User Guide 25
Managing E-mail Accounts and Users
You must have Windows 2000 or Windows XP on your computer.
The users you are adding or managing must have Windows user accounts.
User passwords and protecting children from spam
Creating a user password enhances the privacy level. A user’s personal settings, Friends List, and Accepted E-mail list cannot be accessed by another user without the log on password. Creating passwords is also beneficial in preventing children from accessing SpamKiller and viewing the content of spam messages.
Creating a password for an existing SpamKiller user
1 Click the Settings tab, and then click Users.
2 Select a user, and then click Edit.
3 Type a password in the Password box. When the user accesses SpamKiller,
they must use the password to log on.
IMPORTANT
If you forget your password, you cannot retrieve it. Only a SpamKiller administrator user can create a new password for you.
Adding a user to SpamKiller
1 Click the Settings tab, and then click Users.
2 Click Add.
A list of Windows users appears. To add a user who does not appear on the list, create a Windows user account for that person. Then, the new user must log on to your computer at least once. Afterwards, add the user to SpamKiller.
NOTE
Windows users with administrator rights have SpamKiller administrator rights.
3 Select a user to add, and then click OK. The user is added to SpamKiller, and
the user name appears in the list of SpamKiller users.
4 Click Close when you are finished adding users.
To create a password for a user, see Creating a password for an existing SpamKiller
user on page 26.
The next time the user logs on to your computer, they are prompted to add an e-mail account to their SpamKiller user profile. You can add e-mail accounts to the user profile if you are logged on to SpamKiller as the user and have the necessary e-mail account information. For details, see Adding e-mail accounts on page 17.
26 McAfee® SpamKiller® software version 7.0
Editing SpamKiller user profile
1 Click the Settings tab, and then click Users. A list of SpamKiller users appears.
2 Select a user, and then click Edit.
3 Type a new name and password.
Deleting a SpamKiller user profile
WARNING
When you remove a user profile, you also remove the user’s e-mail accounts from SpamKiller.
1 Click the Settings tab, and then click Users. A list of SpamKiller users appears.
2 Select a user from the list, and then click Delete.
Logging on to SpamKiller in a multi-user environment
When users log on to your computer and open SpamKiller, they are automatically logged on to SpamKiller under their user profiles. If SpamKiller passwords are assigned to users, they must type their passwords in the appears.
Log On dialog box that
Adding users
Switching between users
You must be logged on to SpamKiller as an administrator.
1 Click Switch User located at the top of the page. The Switch User dialog box
appears.
2 Select a user, and then click OK. If the user has a password, the Log On dialog
box appears. Type the user password in the
Password box, and then click OK.
User Guide 27
Managing E-mail Accounts and Users
28 McAfee® SpamKiller® software version 7.0

Using the Friends List

We recommend that you add your friends’ names and e-mail addresses to a Friends List. SpamKiller does not block messages from those on the list; therefore, adding friends helps ensure that legitimate messages get through.
SpamKiller enables you to add names, e-mail addresses, domains, and mailing lists to the Friends Lists. You can add addresses one at a time, or all at once by importing an address book from your e-mail program.
SpamKiller maintains two types of lists:
Global Friends List - affects all the e-mail accounts for the users in SpamKiller.
If multiple users were added, you must be logged on to SpamKiller as an administrator in order to manage this list.
Personal Friends List - affects all the e-mail accounts associated with a specific
user. If multiple users were added, you must be logged on to SpamKiller as the user in order to manage this list.
You can add friends to a Friends List to ensure their e-mail is not blocked. The Friends page displays names and addresses that you added to the Friends List. The Friends page also shows the date you added a friend and the total number of messages received from that friend.
4
Click the the view mailing lists in the Friends List.
To switch between the Global Friends List and your Personal Friends List, click the down arrow located on the then select
E-mail Addresses tab to view e-mail addresses on the Friends List. Click
Domains tab to view domain addresses on the list. Click the Mailing Lists tab to
E-mail Address, Domains, or Mailing Lists tab, and
Personal Friends List.
User Guide 29
Using the Friends List

Opening a Friends List

1 To open a Friends List, click the Friends tab. The Friends page appears
(Figure 4-1).
2 Click the E-mail Address, Domains, or Mailing List tab. The Global Friends List
appears. To view your Personal Friends List, click the down arrow on one of the tabs, and then select
NOTE
If your computer runs Windows 2000 or Windows XP, and multiple users were added to SpamKiller, limited users can only view their Personal Friends List.
Personal Friends List.
Figure 4-1. Friends page

Importing address books

Import address books into a Friends List manually or by automatic import. Automatic import enables SpamKiller to check your address books regularly for new addresses and automatically import them into a Friends List.
You can import address books from the following e-mail programs:
Microsoft Outlook (version 98 and later)
Microsoft Outlook Express (all versions)
30 McAfee® SpamKiller® software version 7.0
Netscape Communicator (version 6 and earlier versions if exported as an LDIF
file)
Qualcomm Eudora (version 5 and later)
IncrediMail Xe
MSN/Hotmail
Any program that can export its address book as a plain text file
Importing an address book by automatic import
You can update your Personal Friends List regularly by creating a schedule for importing addresses from address books.
1 Click the Settings tab, and then click Address Books. The Import Address Books
dialog box appears, which shows a list of address books that SpamKiller checks regularly and imports new addresses from.
2 Click Add. The Import Schedule dialog box appears.
3 Select the Type of address book to import and the address book Source.
4 From the Schedule box, select how often SpamKiller must check the address
book for new addresses.
Importing address books
5 Click OK. After an update, new addresses appear in your Personal Friends List.
Importing an address book manually
You can manually import address books into your Personal Friends List or the Global Friends List.
NOTE
If your computer runs Windows 2000 or Windows XP, and multiple users were added to SpamKiller, you must be logged on as an administrator to add friends to the Global Friends List.
1 Click the Friends tab, and then click Import Address Book.
The
Import Address Book dialog box appears, showing a list of address book
types that you can import.
2 Select a type of address book to import, or click Browse to import addresses
stored in a file.
To import the address book into your Personal Friends List only, ensure that the
Add to Personal Friends List checkbox is selected. To import the address
book into the Global Friends List only, ensure that the checkbox is not selected.
User Guide 31
Using the Friends List
Click Next. A confirmation page lists the number of addresses that SpamKiller
3
added.
4 Click Finish. The addresses appear in the Global Friends List or your Personal
Friends List.
Editing address book information
Edit information for an address book that was imported automatically.
1 Click the Settings tab, and then click Address Books.
2 Select an address book, and then click Edit.
3 Edit address book information, and then click OK.
Deleting an address book from the automatic import list
Remove an address book entry when you no longer want SpamKiller to automatically import addresses from that book.
1 Click the Settings tab, and then click Address Books.
2 Select an address book, and then click Delete. A confirmation dialog box
appears.
3 Click Yes to remove the address book from the list.
32 McAfee® SpamKiller® software version 7.0

Adding friends

Adding friends
To ensure that you receive all e-mail from friends, add your friends’ names and addresses to a Friends List. You can add friends from the Friends page, the Blocked E-mail page, the Accepted E-mail page, and from Microsoft Outlook or Outlook Express.
NOTE
If your computer runs Windows 2000 or Windows XP, and multiple users were added to SpamKiller, you must be logged on as an administrator to add friends to the Global Friends List.
Adding friends from the Blocked E-mail or Accepted E-mail page
1 Click the Messages tab, and then click the Blocked E-mail or Accepted E-mail
tab.
Or
From the SpamKiller menu in Microsoft Outlook or Outlook Express, select
View Blocked Messages to open the Blocked E-mail page for that account.
The Blocked E-mail or Accepted E-mail page appears.
2 Select a message from a sender that you want to add to a Friends List, and then
Add a Friend.
click
3 In the Address box, type the address to add to the Friends List. The Address box
might already contain the address from the selected message.
4 Type the name of the friend in the Name box.
5 Select the address type you want to add from the Friend type box:
Single e-mail address - the sender's e-mail address is added to the Domains
section in the Friends List.
Everyone at a domain - the domain name is added to Domains section in the
Friends List. SpamKiller accepts all e-mail coming from the domain.
Mailing list - the address is added to the Mailing List section in the Friends
List.
To add the address to your Personal Friends List only, ensure that the
Personal Friends List
Friends List only, ensure that the checkbox is not selected.
6 Click OK. All messages from that friend are marked as being messages from a
friend and appear in the Accepted E-Mail page.
checkbox is selected. To add the address to the Global
User Guide 33
Add to
Using the Friends List
Adding friends from the Friends page
1 Click the Friends tab, and then click Add a Friend. The Friend Properties dialog
box appears.
2 In the Address box, type the address to add to the Friends List.
3 Type the name of your friend in the Name box.
4 Select the address type you want to add from the Friend type box:
Single e-mail address - the sender's e-mail address is added to the Domains
section in the Friends List.
Everyone at a domain - the domain name is added to Domains section in the
Friends List. SpamKiller accepts all e-mail coming from the domain.
Mailing list - the address is added to the Mailing List section in the Friends
List.
To add the address to your Personal Friends List only, ensure that the
Personal Friends List
checkbox is selected. To add the address to the Global
Friends List only, ensure that the checkbox is not selected.
5 Click OK. All messages from that friend are marked as being messages from a
friend and appear in the Accepted E-Mail page.
Adding friends from Microsoft Outlook
1 Open your e-mail account in Microsoft Outlook or Outlook Express.
2 Select a message from a sender that you want to add to a Friends List.
3 Click in the Microsoft Outlook toolbar. All messages from that friend are
marked as being messages from a friend and appear in the Accepted E-Mail page.

Editing friends

1 Click the Friends tab, and then click the E-mail Addresses, Domains, or Mailing
tab.
Lists
The Global Friends List appears. To view your Personal Friends List, click the down arrow on one of the tabs, and then select
NOTE
If your computer runs Windows 2000 or Windows XP, and multiple users were added to SpamKiller, only administrators can access the Global Friends List.
Add to
Personal Friends List.
2 Select an address from the list, and then click Edit.
34 McAfee® SpamKiller® software version 7.0
Edit the appropriate information, and then click OK.
3

Deleting friends

Remove addresses you no longer want in a Friends List.
1 Click the Friends tab, and then click the E-mail Addresses, Domains, or Mailing
tab.
Lists
The Global Friends List appears. To view your Personal Friends List, click the down arrow on one of the tabs, and then select
NOTE
If your computer runs Windows 2000 or Windows XP, and multiple users were added to SpamKiller, only administrators can access the Global Friends List.
2 Select an address from the list, and then click Delete a friend. A confirmation
dialog box appears.
3 Click Yes to delete the friend.
Deleting friends
Personal Friends List.
User Guide 35
Using the Friends List
36 McAfee® SpamKiller® software version 7.0

Working With Blocked and Accepted Messages

Click the Messages tab to open the Messages page (Figure 5-1) and access your blocked and accepted messages. The Blocked E-mail and Accepted E-mail pages have similar features.
5

Blocked E-mail page

Click the Blocked E-mail tab in the Messages page to view blocked messages.
NOTE
You can also access blocked messages in Microsoft Outlook by selecting the SpamKiller menu, and then clicking
Blocked Messages
Blocked messages are messages that SpamKiller identified as spam, removed from your Inbox, and placed in the Blocked E-mail page.
The Blocked E-mail page displays all spam messages that were removed from your e-mail accounts. To view blocked e-mail for a specific account, click the down arrow located on the
Figure 5-1. Messages page
View
.
Blocked E-mail tab, and then select the account to view.
User Guide 37
Working With Blocked and Accepted Messages
The top message pane lists spam messages and are sorted by date. The most recent message appears first. The bottom preview pane contains the message text for the selected message.
NOTE
If your computer runs Windows 2000 or Windows XP, multiple users have been added to SpamKiller, and you are logged on to SpamKiller as a limited user, the message contents do not appear in the bottom preview pane.
The middle pane shows message details. Click the down arrows to expand the message details pane and view the message text and headers in native format, including any HTML formatting tags. following.
Action - how SpamKiller processed the spam message. Action is associated
with the action of the filter that blocked the message.
Reason - why SpamKiller blocked the message. You can click the reason to
open the filter editor and view the filter. The filter editor displays what the filter looks for in a message, and the action that SpamKiller takes against messages found by the filter.
From - the sender of the message.
Date - the date the message was sent to you.
The message details pane shows the
To - to whom the message was sent.
Subject - the topic that appears in the message subject line.
The left column contains icons next to messages if manual complaints or error messages have been sent.
Complaint sent - a complaint was sent about the message.
Error message sent - an error message was sent to the reply address in the
spam message.
Complaint and error messages sent - both a complaint and error message
were sent.
For more information on where blocked messages are, see Where are the blocked
messages on page 42.
38 McAfee® SpamKiller® software version 7.0

Accepted E-mail page

Click the Accepted E-mail tab in the Messages page to view accepted messages.
The Accepted E-mail page displays all Inbox messages in all of your e-mail accounts. However, for MAPI accounts, the Accepted E-mail page does not contain internal e-mail. To view accepted e-mail for a specific account, click the down arrow on the
Like the Blocked E-mail page, the top message pane lists messages that are sorted by date. The bottom preview pane contains the message text of the selected message.
The middle pane explains if a message was sent by someone on a Friends List, or if the message fits the criteria of a filter, but the filter action was set to either or
Mark as Possible Spam. Click the down arrows to expand the message details
pane, view the message text and headers in native format, including any HTML formatting tags.
Accepted E-mail tab, and then select an account to view.
NOTE
SpamKiller is designed to accept legitimate e-mail. However, if legitimate e-mail appears in the Blocked E-mail list, you can move the messages back to your Inbox (and the Accepted E-mail list) by selecting the messages, and then clicking
Rescue this message.
Accepted E-mail page
Accept
The message details pane shows the following.
Action - how SpamKiller processed the message.
Reason - if a message was flagged, explains why SpamKiller flagged the
message.
From - the sender of the message.
Date - the date the message was sent to you.
To - to whom the message was sent.
Subject - the topic that appears in the message subject line.
One of the following icons appears next to a message.
E-mail from a friend - SpamKiller detected that the sender of the message
is on a Friends List. This message is one you want to keep.
Possible spam - the message matches a filter with an action set to Mark as
possible spam.
Complaint sent - a complaint was sent about the message.
Error message sent - an error message was sent to the reply address on the
spam message.
User Guide 39
Working With Blocked and Accepted Messages
Complaint and error messages sent - both a complaint and error message
were sent.

Tasks for Blocked E-mail and Accepted E-mail

The right panel on the Blocked E-mail and Accepted E-mail pages lists tasks you can perform.
Block this message - remove a message from your Inbox and put it in the
SpamKiller Blocked E-mail page. (This option appears on the Accepted E-mail page only.)
Rescue this message - put a message back in your Inbox (this option appears
on the Blocked E-mail page only) and open the can automatically add the sender to your Friends list and rescue all messages from the sender.
Delete this message - remove a selected message.
Add a friend - add the sender’s name, e-mail address, domain, or a mailing list
to a Friends List.
Add a filter - create a filter.
Report to McAfee - inform McAfee of specific spam messages you receive.
Rescue Options dialog box. You
Send a complaint - send a complaint about spam to the administrator of the
sender’s domain or to another e-mail address you type.
Send an error - send an error message to the reply address of a spam message.
40 McAfee® SpamKiller® software version 7.0

Rescuing messages

If the Blocked E-mail page or the SpamKiller folder in Microsoft Outlook and Outlook Express contains legitimate mail, you can put those messages back in your Inbox.
From the Blocked E-Mail page
1 Click the Messages tab, and then click the Blocked E-mail tab.
Or
From the SpamKiller menu in Microsoft Outlook or Outlook Express, select
View Blocked Messages to open the Blocked E-mail page for that account.
2 Select a message and click Rescue this message . The Rescue Options dialog
box appears.
Add Friend - add the sender to your Friends list.
Rescue all from same sender - rescue all blocked messages from the sender
of the selected message.
3 Click OK. The message is put back in your Inbox and the Accepted E-mail page.
Rescuing messages
From the SpamKiller folder in Microsoft Outlook or Outlook Express
Select the message(s) and click Rescue Selection from the SpamKiller menu or toolbar. Your selection is put back in the Inbox and the message tag ([SPAM] by default) is removed.

Blocking messages

Block spam messages that are currently in your Inbox. When you block a message, SpamKiller automatically creates a filter to remove that message from your Inbox. You can block Inbox messages from the Accepted E-mail page, or from Microsoft Outlook or Outlook Express.
From the Accepted E-mail page
1 Click the Messages tab, and then click the Accepted E-mail tab. The Accepted
E-mail page appears and displays messages that are currently in your Inbox.
2 Select a message, and then click Block this message. The message is removed
from your Inbox and the Accepted E-mail page, and copy of the message appears in the Blocked E-mail page.
User Guide 41
Working With Blocked and Accepted Messages
From Microsoft Outlook
In Microsoft Outlook, messages from members of an Exchange server are considered safe and are not filtered by SpamKiller. Only messages from external sources are filtered.
1 Open your Microsoft Outlook or Outlook Express Inbox.
2 Select a message, and then click . A copy of the message is put in the
Blocked E-mail page.

Where are the blocked messages

By default, spam messages are tagged as [SPAM] and placed in the SpamKiller folder in Outlook and Outlook Express, or your Inbox. Tagged messages also appear on the Accepted E-mail page.

Deleting a message manually

1 Click the Messages tab, and then click the Blocked E-mail tab.
Or
From the SpamKiller menu in Microsoft Outlook or Outlook Express, select
View Blocked Messages to open the Blocked E-mail page for that account.
2 Select a message to delete.
3 Click Delete this message. A confirmation dialog box appears.
4 Click Yes to delete the message.

Modifying how spam messages are processed

When spam is found, the message is tagged or blocked. Spam messages are removed from your server every time SpamKiller connects to it.
Tagging
The e-mail subject line is tagged with [SPAM] and the message goes in your Inbox or SpamKiller folder, if you have Microsoft Outlook or Outlook Express.
Blocking
The message is removed and placed in the SpamKiller Blocked E-mail page. If legitimate mail is blocked, you can rescue the message (see Rescuing messages).
42 McAfee® SpamKiller® software version 7.0

Using the AntiPhishing filter

SpamKiller automatically removes blocked messages from the Blocked E-mail page after 15 days. You can change how often blocked messages are removed.
SpamKiller does not automatically remove messages from the Accepted E-mail page since this page reflects the messages currently in your Inbox.
Modifying how SpamKiller processes spam messages
1 Click the Settings tab, and then click the Filtering Options icon.
2 Click the Processing tab.
Put spam in Blocked E-mail box - spam messages are removed from your
Inbox and put in the SpamKiller Blocked E-mail page.
Tag spam and keep in Inbox - this is the default setting. Spam messages
remain in your Inbox, but the subject line of the message includes [SPAM].
Keep blocked e-mail for ____ days - blocked messages remain in the Blocked
E-mail page for the duration you specify.
Keep accepted e-mail for ____ days - accepted messages remain in the
Accepted E-mail page for the duration you specify.
3 Click OK.
Using the AntiPhishing filter
Unsolicited e-mail is categorized as spam (e-mails soliciting you to purchase), or phishing (e-mails soliciting you to provide personal information to a known or potential scam Web site).
The McAfee AntiPhishing filter helps protect you from Web sites that are blacklisted (confirmed phishing or related scam Web sites), or graylisted (contain some dangerous content or links to blacklisted Web sites).
If you browse to a known or potential scam Web site, you are redirected to the McAfee AntiPhishing Filter page.
To change AntiPhishing settings, follow these steps.
1 Open Internet Explorer.
2 In the Tools menu, select McAfee AntiPhishing Filter.
Enable Web site filtering - enabled by default. To disable AntiPhishing filtering,
clear this checkbox.
Allow access to blacklisted Web sites - places a link on the redirection page for
blacklisted sites. Clicking this link takes you to the Web site.
User Guide 43
Working With Blocked and Accepted Messages
Allow access to graylisted Web sites - places a link on the redirection page for
graylisted sites. Clicking this link takes you to the Web site.
3 When you are finished, click OK.

Adding friends to a Friends List

See Adding friends from the Blocked E-mail or Accepted E-mail page on page 33.

Adding filters

For more information on filters, see Working With Filters in the online Help.
1 To create a Global Filter, click the Settings tab, select Global Filters, and click
Add.
Or
To create a Personal Filter, click the click
Add.
Settings tab, select Personal Filters, and
Or
Click the click
2 Click Add to begin creating a filter condition. The Filter Condition dialog box
Messages tab, click the Blocked E-mail or Accepted E-mail tab, and
Add a Filter.
appears.
3 Create a filter condition by following these steps.
A filter condition is a statement that tells SpamKiller what to look for in a message. In the example “The message text contains mortgage,” the filter searches for messages containing the word “mortgage.” For more information, see Filter Conditions in the Online Help.
a Select a condition type from the first box.
b Select or type values in the subsequent boxes.
c If the following options appear, select them to further define the filter
condition.
Also look in formatting codes - this option appears only if the filter
condition is defined to search the message text. If you select this checkbox, SpamKiller searches both the message text and the message formatting codes for the text you indicated.
44 McAfee® SpamKiller® software version 7.0
Adding filters
Match variations - allows SpamKiller to detect common deliberate
misspellings used by spammers. For example, the word “common” might be misspelled as “c0mm0n” to evade filters.
Regular Expressions (RegEx) - allows you to specify character patterns
used in filter conditions. To test a character pattern, click
Case-sensitive - this option only appears for conditions in which you typed
Test RegEx.
a condition value. If you select this checkbox, SpamKiller distinguishes between upper-case and lower-case letters in the value you typed.
d Click OK.
4 Create another filter condition as follows, or go to Step 5 to select a filter action.
a Click Add, and then create the filter condition. Click OK when you are
finished creating the filter condition.
Both filter conditions appear in the Filter Conditions list and are joined by
and. The and indicates that SpamKiller looks for messages that match both
filter conditions. If you want SpamKiller to look for messages that match either one of the conditions, change selecting
b Click Add to create another condition, or go to Step 5 to select a filter action.
or from the box that appears.
and to or by clicking and, and then
If you created a total of three or more filter conditions, you can group filter conditions to create clauses. For examples of grouping, see Grouping Filters in the online Help.
To group filter conditions, select a filter condition, and click ungroup filter conditions, select a grouped condition, and click
5 Select a filter action from the Action box. The filter action tells SpamKiller how
Group. To
Ungroup.
to process messages found by that filter. For more information, see Filter Actions in the online Help.
6 Click Advanced to select advanced filter options (selecting advanced options is
not required). For more information, see Advanced Filter Options in the online Help.
7 Click OK when you are finished creating the filter.
NOTE
To edit a condition, select it and click Edit. To delete a condition, select it and click
Delete.
User Guide 45
Working With Blocked and Accepted Messages
Regular expressions
Regular expressions are only available for the following filter conditions: The
, The message text, At least one of the following phrases.
subject
These special characters and sequences can be used as regular expressions when defining filter conditions. For example:
The regular expression [0-9]*\.[0-9]+ matches floating point numbers given non
engineering notation. The regular expression matches: “12.12”, “.1212”, and “12.0”, but not “12” and “12”.
The regular expression \D*[0-9]+\D* matches all words with numbers:
“SpamKi11er” and V1AGRA” but not “SpamKiller” and “VIAGRA”.
\
Marks the next character as either a special character or a literal. For example, “n““ matches the character “n“. “\n“ matches a new line character. The sequence “\\“ matches “\“ and “\(“ matches “(“.
^
Matches the beginning of input.
$
Matches the end of input.
*
Matches the preceding character zero or more times. For example, “zo*“ matches either “z“ or “zoo“.
+
Matches the preceding character one or more times. For example, “zo+“ matches “zoo“ but not “z“.
?
Matches the preceding character zero or one time. For example, “a?ve?“ matches the “ve“ in “never“.
.
Matches any single character except a new line character.
(pattern)
Matches pattern and remembers the match. The matched substring can be retrieved from the resulting Matches collection, using Item [0]...[n]. To match parentheses characters ( ), use “\(“ or “\)“.
46 McAfee® SpamKiller® software version 7.0
Adding filters
x|y
Matches either x or y. For example, “z|wood“ matches “z“ or “wood“. “(z|w)oo“ matches “zoo“ or “wood“.
{n}
The n is a non negative integer. Matches exactly n times. For example, “o{2}“ does not match the “o“ in “Bob,“ but matches the first two o's in “foooood“.
{n,}
The n is a non negative integer. Matches at least n times. For example, “o{2,}“ does not match the “o“ in “Bob“ and matches all the o's in “foooood.“ “o{1,}“ is equivalent to “o+“. “o{0,}“ is equivalent to “o*“.
{n,m}
The m and n are non negative integers. Matches at least n and at most m times. For example, “o{1,3}“ matches the first three o's in “fooooood.“ “o{0,1}“ is equivalent to “o?“.
[xyz]
A character set. Matches any one of the enclosed characters. For example, “[abc]“ matches the “a“ in “plain“.
[^xyz]
A negative character set. Matches any character not enclosed. For example, “[^abc]“ matches the “p“ in “plain“.
[a-z]
A range of characters. Matches any character in the specified range. For example, “[a-z]“ matches any lowercase alphabetic character in the range “a“ through “z“.
[^m-z]
A negative range characters. Matches any character not in the specified range. For example, “[m-z]“ matches any character not in the range “m“ through “z“.
\b
Matches a word boundary, that is, the position between a word and a space. For example, “er\b“ matches the “er“ in “never“ but not the “er“ in “verb“.
\B
Matches a non-word boundary. “ea*r\B“ matches the “ear“ in “never early“.
\d
Matches a digit character. Equivalent to [0-9].
User Guide 47
Working With Blocked and Accepted Messages
\D
Matches a non-digit character. Equivalent to [^0-9].
\f
Matches a form-feed character.
\n
Matches a new line character.
\r
Matches a carriage return character.
\s
Matches any white space including space, tab, form-feed, etc. Equivalent to “[ \f\n\r\t\v]“.
\S
Matches any nonwhite space character. Equivalent to “[^ \f\n\r\t\v]“.
\t
Matches a tab character.
\v
Matches a vertical tab character.
\w
Matches any word character including underscore. Equivalent to “[A-Za-z0-9_]“.
\W
Matches any non-word character. Equivalent to “[^A-Za-z0-9_]“.
\num
Matches num, where num is a positive integer. A reference back to remembered matches. For example, “(.)\1“ matches two consecutive identical characters.
\n
Matches n, where n is an octal escape value. Octal escape values must be 1, 2, or 3 digits long. For example, “\11“ and “\011“ both match a tab character. “\0011“ is the equivalent of “\001“ & “1“. Octal escape values must not exceed 256. If they do, only the first two digits comprise the expression. Allows ASCII codes to be used in regular expressions.
48 McAfee® SpamKiller® software version 7.0
\xn
Matches n, where n is a hexadecimal escape value. Hexadecimal escape values must be exactly two digits long. For example, “\x41“ matches “A“. “\x041“ is equivalent to “\x04“ & “1“. Allows ASCII codes to be used in regular expressions.”

Reporting spam to McAfee

You can report spam to McAfee, where they analyze it to create filter updates.
1 Click the Messages tab, and then click the Blocked E-mail or Accepted Mail tab.
The Blocked E-mail or Accepted E-mail page appears.
2 Select a message, and then click Report to McAfee. A confirmation dialog box
appears.
3 Click Yes. The message is automatically sent to McAfee.

Sending complaints manually

Send a complaint to prevent a sender from sending you more spam. For more information on sending complaints, see Sending Complaints and Error Messages in the online Help.
Reporting spam to McAfee
1 Click the Messages tab, and then click the Blocked E-mail or Accepted E-mail
tab. A list of messages appears.
2 Select a message to complain about, and then click Send a complaint. The Send
Complaint
3 Select whom you want to send the complaint to.
4 Click Next, and then follow the instructions on the dialog boxes that appear.
dialog box appears.
WARNING
In most cases you should not select Sender. Sending a complaint to the sender of the spam validates your e-mail address, which can increase the number of spam you receive from that sender.

Sending error messages

For more information on sending error messages, see Sending Complaints and Error Messages in the online Help.
Send an error message to prevent a sender from sending you more spam.
User Guide 49
Working With Blocked and Accepted Messages
Sending an error message manually
1 Click the Messages tab, and then click the Blocked E-mail or Accepted E-mail
tab. A list of messages appears.
2 To send an error message about a specific spam message, select the message,
and then click spam message.
Send error. An error message is sent to the reply address in the
50 McAfee® SpamKiller® software version 7.0

Frequently Asked Questions

SpamKiller is unable to communicate with its server

If the SpamKiller server does not start or is being blocked by another application, it cannot communicate with its server.
Starting the SpamKiller server manually
This section only applies to Microsoft Windows 2000 and XP users.
1 Click Start and select Run.
2 Type SERVICES.MSC and click OK.
3 Right-click the McAfee SpamKiller Server and select Start. The server service
starts.
SpamKiller server is blocked by firewalls or internet filtering programs
If the SpamKiller Server service is already started and running, follow these steps.
6
1 Verify that SpamKiller Server and/or MSKSrvr.exe have full access for any
installed firewall programs, including McAfee Personal Firewall.
2 Verify that LocalHost and/or 127.0.0.1 are not blocked or banned in any
installed firewall program. including McAfee Personal Firewall.
3 Disable any internet privacy or internet filtering programs.
User Guide 51
Frequently Asked Questions

Cannot connect to the e-mail server

If the SpamKiller server attempts to connect to the POP3 server and the connection fails, follow these steps.
Verifying your connection to the Internet
Dial-up Users
1 Click Continue what I was doing on the error message (if necessary).
2 Establish a connection to the Internet.
3 Maintain the connection for at least 15 minutes to see if the message
re-appears.
Broadband (Cable, DSL)
1 Click Continue what I was doing on the error message (if necessary).
2 Verify that you are connected to the Internet by surfing to a site.
Verifying the POP3 server address for SpamKiller
1 Right-click the McAfee icon in the system tray (lower right hand corner), point
to
SpamKiller, and select Settings.
2 Click E-mail Accounts.
3 Highlight the e-mail account in the error message.
4 Click Edit.
5 Select the Servers tab.
6 Note the server address in the Incoming e-mail box and compare it with the
Incoming e-mail server address your Internet Service Provider (ISP) has listed for your e-mail account. The server addresses should match.
7 Verify the password by re-entering the password provided by your ISP for
your e-mail account.
8 Click OK.
9 Click Close.
52 McAfee® SpamKiller® software version 7.0

Index

A
Accepted E-mail
adding to a Friends List icons in the accepted messages list sending error messages
, 40
tasks
working with accepted messages Accepted E-mail page adding an e-mail address to a Friends List adding e-mail accounts adding filters administrator AntiPhishing filter, using
, 44
, 25 to 26
, 44
, 39
, 49
, 37
, 39
, 17
, 43
B
Blocked E-mail
adding to a Friends List
icons in the blocked messages list
modifying how spam messages are
processed rescuing messages sending error messages tasks where are the blocked messages working with blocked messages
Blocked E-mail page blocking messages
, 42
, 40
, 37
, 41
, 44
, 38
, 41
, 49
, 42 , 37
E
e-mail accounts, 17
, 17
adding deleting editing editing MAPI accounts editing MSN/Hotmail accounts editing POP3 accounts pointing your e-mail client to SpamKiller
, 19
, 19
, 23
, 22
, 19
, 33
, 18
F
features, 10 filtering
disabling
enabling filters, adding frequently asked questions Friends List
adding an e-mail address
adding friends from the Blocked E-mail or
importing an address book Friends page
, 15
, 15
, 44
, 51
, 29
Accepted E-mail page
, 30
, 33
, 33
, 30
G
getting started with SpamKiller, 9
H
Help icon, 10
I
importing an address book into a Friends List, 30
L
logging on to SpamKiller in a multi-user
environment
, 27
M
McAfee SecurityCenter, 13 Messages page
, 37
P
passwords, 26 pointing your e-mail client to SpamKiller protecting children
, 26
, 18
Q
Quick Start Card, iii
User Guide 53
Index
R
regular expressions, 46 reporting spam to McAfee rescuing messages
, 49
, 41
S
SecurityCenter, 13 Settings page SpamKiller
Accepted E-mail page Blocked E-mail page disabling filtering
enabling filtering Summary page Support icon Switch User icon switching users system requirements
, 18
, 39
, 37
, 15
, 15
, 11
, 10
, 10
, 27
, 12
T
tasks for blocked and accepted messages, 40
U
users, 17
adding users
creating passwords
deleting user profiles
editing user profiles
logging on to SpamKiller
switching users
user types
54 McAfee® SpamKiller® software version 7.0
, 25
, 26
, 27
, 27
, 27
, 27
, 25
Index
User Guide 55
Loading...