McAfee INTERNET GUARD DOG 3.0 User manual

Category
Software manuals
Type
User manual

This manual is also suitable for

Internet Guard Dog
User’s Guide
Version 3.0
COPYRIGHT
Copyright © 2000 Network Associates, Inc. and its Affiliated Companies. All Rights Reserved. No part
of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated
into any language in any form or by any means without the written permission of Network Associates,
Inc.
TRADEMARK ATTRIBUTIONS
* ActiveHelp, Bomb Shelter, Building a World of Trust, CipherLink, Clean-Up, Cloaking, CNX,
Compass 7, CyberCop, CyberMedia, Data Security Letter, Discover, Distributed Sniffer System, Dr
Solomon’s, Enterprise Secure Cast, First Aid, ForceField, Gauntlet, GMT, GroupShield, HelpDesk,
Hunter, ISDN Tel/Scope, LM 1, LANGuru, Leading Help Desk Technology, Magic Solutions, MagicSpy,
MagicTree, Magic University,MagicWin, MagicWord, McAfee, McAfee Associates, MoneyMagic, More
Power ToYou,Multimedia Cloaking,NetCrypto, NetOctopus, NetRoom,NetScan, Net Shield,NetShield,
NetStalker, Net Tools, Network Associates, Network General, Network Uptime!, NetXRay, Nuts & Bolts,
PC Medic, PCNotary, PGP, PGP (Pretty Good Privacy), PocketScope, Pop-Up, PowerTelnet, Pretty
Good Privacy, PrimeSupport, RecoverKey, RecoverKey-International, ReportMagic, RingFence,Router
PM, Safe & Sound, SalesMagic, SecureCast, Service Level Manager, ServiceMagic, Site Meter, Sniffer,
SniffMaster, SniffNet, Stalker, Statistical Information Retrieval (SIR), SupportMagic, Switch PM,
TeleSniffer, TIS, TMach, TMeg, Total Network Security, Total Network Visibility, Total Service Desk,
Total Virus Defense, T-POD, Trusted Mach, Trusted Mail, Uninstaller, Virex, Virex-PC, Virus Forum,
ViruScan, VirusScan, VShield, WebScan, WebShield, WebSniffer, WebStalker WebWall, and ZAC 2000
are registered trademarks of Network Associates and/or its affiliates in the US and/or other countries. All
other registered and unregistered trademarks in this document are the sole property of their respective
owners.
LICENSE AGREEMENT
NOTICE TO ALL USERS: CAREFULLY READ THE FOLLOWING LEGAL AGREEMENT
("AGREEMENT"), FOR THE LICENSE OF SPECIFIED SOFTWARE ("SOFTWARE") BY
NETWORK ASSOCIATES, INC. ("McAfee"). BY CLICKING THE ACCEPT BUTTON OR
INSTALLING THE SOFTWARE, YOU (EITHER AN INDIVIDUAL OR A SINGLE ENTITY)
CONSENT TO BE BOUND BY AND BECOME A PARTY TO THIS AGREEMENT. IF YOU DO
NOT AGREE TO ALL OF THE TERMS OF THIS AGREEMENT, CLICK THE BUTTON THAT
INDICATES THAT YOU DO NOT ACCEPT THE TERMS OF THIS AGREEMENT AND DO NOT
INSTALL THE SOFTWARE. (IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO THE
PLACE OF PURCHASE FOR A FULL REFUND.)
1. License Grant. Subject to the payment of the applicable license fees, and subject to the terms and
conditions of this Agreement, McAfee hereby grants to you a non-exclusive, non-transferable right
to use one copy of the specified version of the Software and the accompanying documentation (the
"Documentation"). You may install one copy of the Software on one computer, workstation,
personal digital assistant, pager, "smart phone" or other electronic device for which the Software
was designed (each, a "Client Device"). If the Software is licensed as a suite or bundle with more
than one specified Software product, this license applies to all such specified Software products,
subject to any restrictions or usage terms specified on the applicable price list or product packaging
that apply to any of such Software products individually.
Issued February 2000/ Internet Guard Dog v3.0
(i.e., the required number of licenses would equal the number of distinct inputs to the
multiplexing or pooling software or hardware "front end"). If the number of Client Devices or
seats that can connect to the Software can exceed the number of licenses you have obtained, then
you must have a reasonable mechanism in place to ensure that your use of the Software does not
exceed the use limits specified for the licenses you have obtained. This license authorizes you to
make or download one copy of the Documentation for each Client Device or seat that is licensed,
provided that each such copy contains all of the Documentation's proprietary notices.
c. Volume Licenses. If the Software is licensed with volume license terms specified in the
applicable price list or product packaging for the Software, you may make, use and install as
many additional copies of the Software on the number of Client Devices as the volume license
authorizes. You must have a reasonable mechanism in place to ensure that the number of Client
Devices on which the Software has been installed does not exceed the number of licenses you
have obtained. This licenseauthorizes you to make or downloadone copy of the Documentation
for each additional copy authorized by the volume license, provided that each such copy contains
all of the Documentation's proprietary notices.
2. Term. This Agreement is effective for an unlimited duration unless and until earlier terminated as
set forth herein. This Agreement will terminate automatically if you fail to comply with any of the
limitations or other requirements described herein. Upon any termination or expiration of this
Agreement, you must destroy all copies of the Software and the Documentation. You may
terminate this Agreement at any point by destroying all copies of the Software and the
Documentation.
3. Updates. For the time period specified in the applicable price list or product packaging for the
Software you are entitled to download revisions or updates to the Software when and as McAfee
publishes them via its electronic bulletin board system, website or through other online services.
For a period of ninety (90) days from the date of the original purchase of the Software, you are
entitled to download one (1) revision or upgrade to the Software when and as McAfee publishes it
via its electronic bulletin board system, website or through other online services. After the
specified time period, you have no further rights to receive any revisions or upgrades without
purchase of a new license or annual upgrade plan to the Software.
4. Ownership Rights. The Software is protected by United States copyright laws and international
treaty provisions. McAfee and its suppliers own and retain all right, title and interest in and to the
Software, including all copyrights, patents, trade secret rights, trademarks and other intellectual
property rights therein. Your possession, installation, or use of the Software does not transfer to
you any title to the intellectual property in the Software, and you will not acquire any rights to the
Software except as expressly set forth in this Agreement. All copies of the Software and
Documentation made hereunder must contain the same proprietary notices that appear on and in the
Software and Documentation.
User’s Guide iii
5. Restrictions. You may not rent, lease, loan or resell the Software. You may not permit third parties
to benefit from the use or functionality of the Software via a timesharing, service bureau or other
arrangement, except to the extent such use is specified in the applicable list price or product
packaging for the Software. You may not transfer any of the rights granted to you under this
Agreement. You may not reverse engineer, decompile, or disassemble the Software, except to the
extent the foregoing restriction is expressly prohibited by applicable law. You may not modify, or
create derivative works based upon, the Software in whole or in part. You may not copy the
Software or Documentation except as expressly permitted in Section 1 above. You may not remove
any proprietary notices or labels on the Software. All rights not expressly set forth hereunder are
reserved by McAfee. McAfee reserves the right to periodically conduct audits upon advance
written notice to verify compliance with the terms of this Agreement.
6. Warranty and Disclaimer
a. Limited Warranty. McAfee warrants that for sixty (60) days from the date of original purchase
the media (e.g., diskettes) on which the Software is contained will be free from defects in
materials and workmanship.
b. Customer Remedies. McAfee's and its suppliers' entire liability and your exclusive remedy for
any breach of the foregoing warranty shall be, at McAfee's option, either (i) return of the
purchase price paid for the license, if any, or (ii) replacement of the defective media in which the
Software is contained. You must return the defective media to McAfee at your expense with a
copy of your receipt. This limited warranty is void if the defect has resulted from accident,
abuse, or misapplication. Any replacement media will be warranted for the remainder of the
original warranty period. Outside the United States, this remedy is not available to the extent
McAfee is subject to restrictions under United States export control laws and regulations.
c. Warranty Disclaimer. Except for the limited warranty set forth herein, THE SOFTWARE IS
PROVIDED "AS IS." TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE
LAW, MCAFEE DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO IMPLIED WARRANTIES OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND
NONINFRINGEMENT WITH RESPECT TO THE SOFTWARE AND THE
ACCOMPANYING DOCUMENTATION. YOU ASSUME RESPONSIBILITY FOR
SELECTING THE SOFTWARE TO ACHIEVE YOUR INTENDED RESULTS, AND FOR
THE INSTALLATION OF, USE OF, AND RESULTS OBTAINED FROM THE SOFTWARE.
WITHOUT LIMITING THE FOREGOING PROVISIONS, MCAFEE MAKES NO
WARRANTY THAT THE SOFTWARE WILL BE ERROR-FREE OR FREE FROM
INTERRUPTIONS OR OTHER FAILURES OR THAT THE SOFTWARE WILL MEET
YOUR REQUIREMENTS. SOME STATES AND JURISDICTIONS DO NOT ALLOW
LIMITATIONS ON IMPLIED WARRANTIES, SO THE ABOVE LIMITATION MAY NOT
APPLY TO YOU. The foregoing provisions shall be enforceable to the maximum extent
permitted by applicable law.
iv Internet Guard Dog
7. Limitation of Liability. UNDER NO CIRCUMSTANCES AND UNDER NO LEGAL THEORY,
WHETHER IN TORT, CONTRACT, OR OTHERWISE, SHALL MCAFEE OR ITS SUPPLIERS
BE LIABLE TO YOU OR TO ANY OTHER PERSON FOR ANY INDIRECT, SPECIAL,
INCIDENTAL, OR CONSEQUENTIAL DAMAGES OF ANY CHARACTER INCLUDING,
WITHOUT LIMITATION, DAMAGES FOR LOSS OF GOODWILL, WORK STOPPAGE,
COMPUTER FAILURE OR MALFUNCTION, OR FOR ANY AND ALL OTHER DAMAGES
OR LOSSES. IN NO EVENT WILL MCAFEE BE LIABLE FOR ANY DAMAGES IN EXCESS
OF THE LIST PRICE MCAFEE CHARGES FOR A LICENSE TO THE SOFTWARE, EVEN IF
MCAFEE SHALL HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
THIS LIMITATION OF LIABILITY SHALL NOT APPLY TO LIABILITY FOR DEATH OR
PERSONAL INJURY TO THE EXTENT THAT APPLICABLE LAW PROHIBITS SUCH
LIMITATION. FURTHERMORE, SOME STATES AND JURISDICTIONS DO NOT ALLOW
THE EXCLUSION OR LIMITATION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES,
SO THIS LIMITATION AND EXCLUSION MAY NOT APPLY TO YOU. The foregoing
provisions shall be enforceable to the maximum extent permitted by applicable law.
8. United States Government. The Software and accompanying Documentation are deemed to be
"commercial computer software" and "commercial computer software documentation,"
respectively, pursuant to DFAR Section 227.7202 and FAR Section 12.212, as applicable. Any
use, modification, reproduction, release, performance, display or disclosure of the Software and
accompanying Documentation by the United States Government shall be governed solely by the
terms of this Agreement and shall be prohibited except to the extent expressly permitted by the
terms of this Agreement.
9. Export Controls. Neither the Software nor the Documentation and underlying information or
technology may be downloaded or otherwise exported or re-exported (i) into (or to a national or
resident of ) Cuba, Iran, Iraq, Libya, North Korea, Sudan, Syria or any other country to which the
United States has embargoed goods; or (ii) to anyone on the United States Treasury Department's
list of Specially Designated Nations or the United States Commerce Department's Table of Denial
Orders. By downloading or using the Software you are agreeing to the foregoing and you are
certifying that you are not located in, under the control of, or a national or resident of any such
country or on any such list.
IN ADDITION, YOU SHOULD BE AWARE OF THE FOLLOWING: EXPORT OF THE
SOFTWARE MAY BE SUBJECT TO COMPLIANCE WITH THE RULES AND
REGULATIONS PROMULGATED FROM TIME TO TIME BY THE BUREAU OF EXPORT
ADMINISTRATION, UNITED STATES DEPARTMENT OF COMMERCE, WHICH
RESTRICT THE EXPORT AND RE-EXPORT OF CERTAIN PRODUCTS AND TECHNICAL
DATA. IF THE EXPORT OF THE SOFTWARE IS CONTROLLED UNDER SUCH RULES
AND REGULATIONS, THEN THE SOFTWARE SHALL NOT BE EXPORTED OR
RE-EXPORTED, DIRECTLY OR INDIRECTLY, (A) WITHOUT ALL EXPORT OR
RE-EXPORT LICENSES AND UNITED STATES OR OTHER GOVERNMENTAL
APPROVALS REQUIRED BY ANY APPLICABLE LAWS, OR (B) IN VIOLATION OF ANY
APPLICABLE PROHIBITION AGAINST THE EXPORT OR RE-EXPORT OF ANY PART OF
THE SOFTWARE.
User’s Guide v
SOME COUNTRIES HAVE RESTRICTIONS ON THE USE OF ENCRYPTION WITHIN
THEIR BORDERS, OR THE IMPORT OR EXPORT OF ENCRYPTION EVEN IF FOR ONLY
TEMPORARY PERSONAL OR BUSINESS USE. YOU ACKNOWLEDGE THAT THE
IMPLEMENTATION AND ENFORCEMENT OF THESE LAWS IS NOT ALWAYS
CONSISTENT AS TO SPECIFIC COUNTRIES. ALTHOUGH THE FOLLOWING
COUNTRIES ARE NOT AN EXHAUSTIVE LIST THERE MAY EXIST RESTRICTIONS ON
THE EXPORTATION TO, OR IMPORTATION OF, ENCRYPTION BY: BELGIUM, CHINA
(INCLUDING HONG KONG), FRANCE, INDIA, INDONESIA, ISRAEL, RUSSIA, SAUDI
ARABIA, SINGAPORE, AND SOUTH KOREA. YOU ACKNOWLEDGE IT IS YOUR
ULTIMATE RESPONSIBILITY TO COMPLY WITH ANY AND ALL GOVERNMENT
EXPORT AND OTHER APPLICABLE LAWS AND THAT MCAFEE HAS NO FURTHER
RESPONSIBILITY AFTER THE INITIAL SALE TO YOU WITHIN THE ORIGINAL
COUNTRY OF SALE.
10.High Risk Activities. The Software is not fault-tolerant and is not designed or intended for use in
hazardous environments requiring fail-safe performance, including without limitation, in the
operation of nuclear facilities, aircraft navigation or communication systems, air traffic control,
weapons systems, direct life-support machines, or any other application in which the failure of the
Software could lead directly to death, personal injury, or severe physical or property damage
(collectively, "High Risk Activities"). McAfee expressly disclaims any express or implied
warranty of fitness for High Risk Activities.
11.Miscellaneous. This Agreement is governed by the laws of the United States and the State of
California, without reference to conflict of laws principles. The application of the United Nations
ConventionofContractsfortheInternational Sale of Goods is expressly excluded. This Agreement
sets forth all rights for the user of the Software and is the entire agreement between the parties. This
Agreement supersedes any other communications with respect to the Software and Documentation.
This Agreement may not be modified except by a written addendum issued by a duly authorized
representative of McAfee. No provision hereof shall be deemed waived unless such waiver shall
be in writing and signed by McAfee or a duly authorized representative of McAfee. If any
provision of this Agreement is held invalid, the remainder of this Agreement shall continue in full
force and effect. The parties confirm that it is their wish that this Agreement has been written in
the English language only.
12.McAfee Customer Contact. If you have any questions concerning these terms and conditions, or
if you would like to contact McAfee for any other reason, please call (408) 988-3832, fax (408)
970-9727, or write: McAfee Software, 3965 Freedom Circle, Santa Clara, California 95054.
http://www.mcafee.com.
Statements made to you in the course of this sale are subject to the Year 2000 Information and
Readiness Disclosure Act (Public Law 105-271). In the case of a dispute, this Act may reduce your
legal rights regarding the use of any statements regarding Year 2000 readiness, unless otherwise
specified in your contract or tariff.
vi Internet Guard Dog
User’s Guide vii
Table of Contents
Chapter1. WelcometoInternetGuardDog......................1
UsingInternetGuardDog ..........................................1
HowInternetGuardDogworks..................................2
UserSetup ..................................................2
VirusScan ...................................................2
Activity Logs . . . . ............................................2
SecurityCheck ...............................................3
InternetGuardDogandyouronlineconnection....................3
InternetGuardDogfeatures ....................................3
WhatsnewinInternetGuardDog ...................................5
Otherfeaturesandenhancements ...............................6
About Internet Guard Dog documentation . . . . . . . . . . . . . . ...............6
How this book is organized . . . . . ...............................7
UsingInternetGuardDoghelp .................................7
Chapter2. InstallingInternetGuardDog.......................11
Systemrequirements .............................................11
Installing Internet Guard Dog . . . . . . . . ..............................12
Troubleshooting installation problems ..............................12
Step1:Cleanupyourharddrive ...............................13
Step 2: Remove temporary files . . ..............................13
Step3:Closeothersoftware...................................14
Installing McAfee VirusScan from the Internet Guard Dog CD . . . . . . . . . . .14
Chapter 3. Quick Tour of Internet Guard Dog™ . . . . . . . . . . . . . . . . . . .15
UsingtheInternetGuardDogInterview ..............................15
What information does Internet Guard Dog ask me to enter? . . . . . . . .16
HowInternetGuardDogAdministratorworks ....................17
HowpasswordprotectionworksinGuardDog ...................18
UsingtheInternetGuardDogHomescreen ..........................18
HowUserSetupworks .......................................20
HowInternetFilteringworks ..................................21
Table of Contents
viii Internet Guard Dog
HowPrivacyandSecurityoptionswork .........................22
Options ....................................................23
UsingMcAfeeVirusScan......................................23
Viewing Activity Logs . . . . . . . . . . ..............................23
UpdatingInternetGuardDogandVirusScan .....................24
PerformingaSecurityCheck ..................................25
WhatInternetGuardDogdoeswhileyourPCisrunning................26
UsingtheInternetGuardDogshortcutmenu ....................26
Responding to Internet Guard Dog alert messages . ..............27
Using Browser Buddy to retrieve or store your Web site passwords .27
Usingfileencryption .........................................29
Chapter4. PrivacyFeatures ...................................31
WhatCookieBlockerdoes ........................................31
Responding to a Cookie Blocker alert message . . . . ..............32
Why should I change my Cookie Blocker settings? . ..............33
WhatIdentityProtectordoes ......................................33
Responding to an Identity Protector alert message . ..............34
Why should I change my Identity Protector settings? . . . . . . . . . . . . .35
WhatWebTrailCleanerdoes ......................................36
Responding to the Web Trail Cleaner alert message ..............36
Why should I change my Web Trail Cleaner settings? . . . . . . . . . . . . .37
WhatSearchFilterdoes ..........................................37
Chapter5. SecurityFeatures ..................................39
WhatGatekeeperdoes ...........................................39
Responding to Gatekeeper alert messages . . . . . . . . ..............39
Why should I change my Gatekeeper settings? . . . . . ..............42
WhatFileGuardiandoes ..........................................43
Responding to File Guardian alert messages . . . . . . ..............43
Why should I change my File Guardian settings? . . . ..............46
WhatPasswordManagerdoes .....................................47
Chapter6. McAfeeVirusScan..................................49
WhatisMcAfeeVirusScan?........................................49
StartingVirusScan...........................................49
User’s Guide ix
Table of Contents
VirusScanCentralwindow ....................................50
VirusScanClassicwindow ....................................50
ConfiguringVirusScan .......................................51
AppendixA. InternetSecurityandPrivacy .......................55
NetworksandtheInternet .........................................55
TCP/IPisthesubsystem ......................................55
Whypackets?...............................................56
TheInternetandtheWebwhatisthedifference? ................56
PrivacyandsecurityontheWeb ...............................57
WhydoesInternetprivacymattertome? ........................57
PrivacyontheWeb...............................................58
Whoissnooping? ...........................................58
Snoopingandsniffing ........................................58
Webserversandfirewalls.....................................58
WhatcanIdotokeepmystuffsafe?............................59
HowcanItellifaWebsiteissecure? ...........................59
Howdoesencryptionwork? ...................................60
SecurityontheWeb ..............................................61
Nastyapplets ...............................................62
CanIpreventprogramsfromaccessingtheInternet?..............62
Computer viruses and the Web . . . . . . . ..............................62
Arevirusesreallythatdangerous? .............................63
Typesofviruses.............................................63
HowcanmyPCbecomeinfectedwithavirus? ...................64
Frequently asked questions about Internet privacy . . . . . . ..............64
SourcesforInternetprivacyandsecurityinformation ..................66
Finding out about Internet hoaxes ..............................66
More information about computer viruses . . . . . . . . . ..............66
More information about security . ..............................67
More information about privacy . . ..............................67
Appendix B. Product Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .69
HowtoContactMcAfee ...........................................69
Customerservice............................................69
Table of Contents
x Internet Guard Dog
Technical support ...........................................70
McAfeetraining .............................................71
1
User’s Guide 1
1Welcome to Internet Guard Dog
Using Internet Guard Dog
In thelastfewyears theInternethas changedfrom acommunications network
that government entities and universities used almost exclusively, to an
information treasure house that people of all ages and occupations can now
access. With an Internet account, you can send electronic mail (e-mail) around
the w orld in seconds, do research without leaving h ome, meet new friends in
an online chat room, or shop without getting out of your bathrobe. However,
with all these conveniences come a certain element of risk. When you use the
Internet, information istransmitted from your compute r to other computers in
the Internet—information you may not want other people to have. And those
computers can also send files to your computer that may contain viruses.
While most of these files are harmless, some can invade your privacy or even
damage the data on your computer’s hard drive.
Figure 1-1. Internet Guard Dog Home screen
McAfee’s Internet Guard Dog addresses any of these potential risks with its
comprehensive features design ed to protect your privacy and security when
surfing the Internet.
Welcome to Internet Guard Dog™
2 Internet Guard Dog
With its new features, you can now also act as an Administrator and apply
customized protection settings not only for yourself, but for other users of
your computer and easily monitor potential risk they may encounter while
browsing the Internet.
How Internet Guard Dog works
Internet Guard Dog works via the following main features displayed in the
Home screen:
User Setup
As the Administrator, this feature allows you to setup protection settings for
other users of your computer. You can add, edit and delete a user’s
profile—then setup i ndividu al privacy, security and Internet filtering options
that Internet Guard Dog will apply whenever any of these users are browsing
the Web through your computer.
See the following for more information:
“Customize User Setup Settings” on page 33.
Chapter 4, Privacy Features.”
Chapter 5, “Security Features.”
VirusScan
Internet Guard Dog now uses the McAfee VirusScan to address virus-related
problems you may encounter through the Internet. This feature allows you to
set how to perform a virus scan operation on you r compu ter; w hat to do if a
virus is found; a nd how it should alert you once the virus is detected. You can
also direct VirusScan to keep a record of actions performed on your computer.
With these main features of InternetGuardDog,youare in control at all times.
You decide what security and privacy features to use. If your concerns or
computing habits change, it is easy to change Internet Guard Dog protection
settings to meet your needs and those of others who use your computer
frequently. See “What is McAfee VirusScan?” on page 49.
Activity Logs
On the Internet Guard Dog Home screen, Activity Logs a llow you to view a
list of all the interactions that you and other profiled users of your computer
had with Internet Guard Dog, including the date and time of the action. You
can print, save or clear this list. See “Viewing Activity Logs” on page 23.
User’s Guide 3
Welcome to Internet Guard Dog™
Security Check
You can run a complete check of your computer for any privacy or security
problems via this feature. After Internet Guard Dog performs the check, it
displays any problem found, provides additional information about the
problem, and guides you through on how to solve the problem. See
“Performing a Security Check” on page 25.
Internet Guard Dog and your online connection
To use all Internet Guard Dog features, you must have an Internet connection
through a local network or a m odem. Some networks have an Internet
connection that you can use by connecting to the network-either directly or
through dial-up networking. If you don’t connect through a network, your
computer must have a modem installed.
You can establis h an Internet connection through an Internet Service Provider
(ISP) such as Earthlink. An ISP acts as a middleman between y ou and the
Internet. Your computer connects (using your modem) to the ISP’s equipment,
which in turn connects to the Internet. You may also be connected to the
Internet through an online service such as America Online or Compuserve.
In addition , you must also have a browser. A browser is software, such as
Netscape Navigator or Microsoft Internet Explorer (it must be a version
designed for Windows 95 or Windows 98), that allows you to view text and
graphics and download files from Web sites.
Internet Guard Dog features
This section briefly describes other features of Internet Guard Dog that protect
you from the most common Internet threats. If you want more background
information on Internet privacy, security, a nd virus issues, see “Internet
Security and Privacy” o n page 55.
NOTE: Only the designated Administrator or Self-Administrator can
have access to t hese features which allow them to customize protection
settings for themselves and in the case of the Administrator, protection
forotherprofiledusersofthesamecomputer.
Welcome to Internet Guard Dog™
4 Internet Guard Dog
Protection from privacy threats
Identity Protector monitors your Internet connection and warns you
before private information is sent to an u nsecure Internet site. It stops
programs and other people that use your computer (like your kids) from
sendingyour nameandcreditcardn umbersover theInternetwithoutyour
approval.
Cookie Blocker prevents Web sites from storing cookies on your hard
drive. Third-party Web sites use cookies to track your Web browsing
habits. You can choose your level of interaction with Cookie Blocker. (For
more information, see “What are cookies and how are they used?” on
page 65.)
Web Trail Cleaner cleans your We b browsing trails suchascachedfiles; list
ofURLs (Uniform Resource Locator, alsok nown asWebaddress) visited; and
history files—when you close your browser. This feature prevents other
users of you r compu ter to track your online movements by v iewing the
files and URL addresses left over from your Internet browsing.
Search Filter prevents search information that y ou request at one W eb site
from being passed along to the next site you visit. Without Search Filter,
your browser can transfer your search request information from one Web
site to another without your knowledge.
Protection from security threats
Gatekeeper allows you to control the programs that have access to your
Internet connection. Programs on your PC can be programmed to access to
the Internet without your consent.
File Guardian protects files that contain your sensitive data from being
opened, renamed, copied, moved, or deleted. Programs, such as ActiveX
and Java programs, can scan your PC for personal information or delete
files without your permission.
File Guardian also limits access to protected files either to programs you
specify or through file encryption. It can limit the programs that can access
your tax, on-line banking, or personal accounting data files.
Password Manager stores your Web site login names and passwords for
protected Web sites in one secure location. When you arevisiting a site that
requires this information, drag it from Browser Buddy to the form
displayed in your browser. No more storing y our login names and
passwords in an unsecure location, such as post-it notes on your monitor
or in a text file on your Windows desktop.
User’s Guide 5
Welcome to Internet Guard Dog™
Protection from virus threats
Using the McAfee VirusScan, the following features are available:
Scan to start the default virus scan task immediately, or configure a virus
scan task that suits your needs.
Scheduler to launch the McAfee VirusScan Scheduler. This uti lity enables
you to configure and run unattended virus scan operations.
Virus info to display virus inform ation via the McAfee Web site.
What’s new in Internet Guard Dog
Internet Guard Dog versi on 3.0 includes these new features.
Inclusion of McAfee VirusScan
McAfee VirusScan is now included in Internet Guard Dog. Select from
available options to customized how you want it to protect your computer.
Multi-user Logon and user settings
Internet Guard Dog now allows multiple users t o have different
protections settings. The main user can also act as an Administrator
customizing settings for other users of the same computer.
Internet Filtering options
After an Administrator has added profiles of other users of the computer,
Internet Filtering options can be used based on default URL sites, word list,
rating systems, and Internet access time. Admini strator can also enter
additional lists or sites if desired.
Activity Logs
An Administrator can view a list of activity, maintenance and violation
logs at the single click of a button. This list contains information such as
duration of computer use or any protection setting violation that a profiled
user may have committed (e.g., attempting to pass credit card number).
Administrator also has the option to clean, print or save this list.
Improved online Help interface
The online Help is now displayed via a tri-pane Expl orer View Help
window. While viewing a topic within the Help file, the user can now also
view the table of contents as well as access the index and full-text search
options simultaneously while the topic is displayed on the right-hand side
of the window.
Welcome to Internet Guard Dog™
6 Internet Guard Dog
Other features and enhancements
Internet Guard Dog password
Protects the information and settings in Internet Guard Dog from being
viewed or changed. It also prevents other users of your computer from
sending out information that you specify as private.
File Guardian enhancement
Protects individual files even when encrypted.
Improved coo kie management
Indicates whether cookies are direct or indirect a nd the domain where it is
coming from.
Personal identity protection
“Mark” personal identity information and sensitive files (such as financial
records and credit card n umbers) so they’ll never be sent over the Internet
without your OK.
Encry pt sensitive files
Add an extra layer of protection by encoding files to prevent them f rom
being read—until you decode them.
Brow ser Buddy enhancement
Store and manage your Web site passwords in one convenient, secure
location. User can now reset numbers.
Single Update button
At the single click of a button, user can update both Internet Guard Dog
and McAfee VirusScan via the Web.
About Internet Guard Dog documentation
This manual provides the basic information you need to install, set up, and use
Internet Guard Dog. More detailed information on Internet Guard Dog is
provided by the Help files which you can access while working within the
different windows.
User’s Guide 7
Welcome to Internet Guard Dog™
How this book is organized
This User’s G uide is designed to get you using Internet Guard Dog quickly.
Read chapters 1 and 2 to get Internet Guard Dog installed and ru nning. You
only need to read Chapters 3, 4, 5, and 6 if you want further information on
customizing Internet Guard Dog or using specific features. Read Chapter 7 for
furtherinformation onMcAfee VirusScan. If youare newtothe Internetorjust
want to find out more about Internet privacy and security issues, read
Appendix A.
Using Internet Guard Dog help
To launch Internet Guard Dog help
1. In the Internet Guard Dog Home screen, click Help; then select Help
Topics. The Help system is displayed via a tri-pane Explorer View
window.
Table 1-1.
To find out Read
What this version of Internet Guard Dog does
and how to find information about Internet
Guard Dog.
Chapter 1, Welcome to
Internet Guard Dog™.”
System requirements and how to install
Internet G uard Dog.
Chapter 2, Installing Internet
Guard Dog™.
HowtousethemainfeaturesofInternet
Guard Dog.
Chapter 3, Quick Tour of
Internet Guard Dog™.”
What the Cookie Blocker, Identity Protector,
Web Trail Cleaner, and Search F ilter fea tures
are and how to work with them.
Chapter 4, Privacy Features.”
What the Gatekeeper, File Guardian, and
Password Manager features are and how to
work with them.
Chapter 5, Security Features.”
What the VirusScan features are and how to
work with them.
Chapter 6, McAfee
VirusScan.”
What privacy, security, and virus issues exist
on the Internet.
Appendix A, “Internet Security
and Privacy”
How to contact McAfee Software sales,
customer service and support departments.
Appendix B, “Product Support”
Welcome to Internet Guard Dog™
8 Internet Guard Dog
2. You can search for a help topic via the Contents, Index or Find tabs.
•Contentstab
1. Double-click a book icon to display its table of contents of
related topics.
2. Locate the topic you want; then point and double-click to open
the Help topic.
•Indextab
1. In the text box, ty pe the first few letters of the word or phrase
you are looking for.
2. Locate what you are looking for; then double-click the topic or
click the Display button.
NOTE: To go to the next page of help, click the next >>browse button
(if act ivated). To return to the previous page, click the previous <<
browse button (if activated) or click the Back button.
•Findtab.
Clicking the Find tab enables you to launch a full text search. When
you search for topics via the Find tab for the first time, a Find Setup
Wizard is displayed. Follow the instructions on screen to setup the
full text search option. After setup is complete:
1. In the text box, ty pe the first few letters of the word or phrase
you are looking for. You can also select m atching words to
narrow your search.
2. Once you have located what you are looking for in the display
topic box, click the topic.
To display help for a screen
1. In the Internet Guard Dog Home screen, click Help.
2. Click Help for this screen to disp lay a help topic that explains what you
can do in or what you may need to know about the current Internet
Guard Dog screen.
User’s Guide 9
Welcome to Internet Guard Dog™
To get help for settings in a dialog box
Whenever you see the button in the upper-right corner of a dialog
box, click the button, then click on the setting for which you want
information.
Welcome to Internet Guard Dog™
10 Internet Guard Dog
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23
  • Page 24 24
  • Page 25 25
  • Page 26 26
  • Page 27 27
  • Page 28 28
  • Page 29 29
  • Page 30 30
  • Page 31 31
  • Page 32 32
  • Page 33 33
  • Page 34 34
  • Page 35 35
  • Page 36 36
  • Page 37 37
  • Page 38 38
  • Page 39 39
  • Page 40 40
  • Page 41 41
  • Page 42 42
  • Page 43 43
  • Page 44 44
  • Page 45 45
  • Page 46 46
  • Page 47 47
  • Page 48 48
  • Page 49 49
  • Page 50 50
  • Page 51 51
  • Page 52 52
  • Page 53 53
  • Page 54 54
  • Page 55 55
  • Page 56 56
  • Page 57 57
  • Page 58 58
  • Page 59 59
  • Page 60 60
  • Page 61 61
  • Page 62 62
  • Page 63 63
  • Page 64 64
  • Page 65 65
  • Page 66 66
  • Page 67 67
  • Page 68 68
  • Page 69 69
  • Page 70 70
  • Page 71 71
  • Page 72 72
  • Page 73 73
  • Page 74 74
  • Page 75 75
  • Page 76 76
  • Page 77 77
  • Page 78 78
  • Page 79 79
  • Page 80 80
  • Page 81 81
  • Page 82 82
  • Page 83 83
  • Page 84 84
  • Page 85 85
  • Page 86 86
  • Page 87 87
  • Page 88 88

McAfee INTERNET GUARD DOG 3.0 User manual

Category
Software manuals
Type
User manual
This manual is also suitable for

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI