McAfee Total Protection Service Installation guide

Category
Software licenses/upgrades
Type
Installation guide

This manual is also suitable for

McAfee Total Protection Service
Installation Guide
COPYRIGHT
Copyright © 2009 McAfee, Inc. All Rights Reserved.
No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form
or by any means without the written permission of McAfee, Inc., or its suppliers or affiliate companies.
TRADEMARK ATTRIBUTIONS
AVERT, EPO, EPOLICY ORCHESTRATOR, FOUNDSTONE, GROUPSHIELD, INTRUSHIELD, LINUXSHIELD, MAX (MCAFEE SECURITYALLIANCE
EXCHANGE), MCAFEE, NETSHIELD, PORTALSHIELD, PREVENTSYS, SECURITYALLIANCE, SITEADVISOR, TOTAL PROTECTION, VIRUSSCAN,
WEBSHIELD are registered trademarks or trademarks of McAfee, Inc. and/or its affiliates in the US and/or other countries. McAfee Red in
connection with security is distinctive of McAfee brand products. All other registered and unregistered trademarks herein are the sole property
of their respective owners.
LICENSE INFORMATION
License Agreement
NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED,
WHICH SETS FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH
TYPE OF LICENSE YOU HAVE ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTS
THAT ACCOMPANY YOUR SOFTWARE PACKAGING OR THAT YOU HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET,
A FILE ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEBSITE FROM WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF YOU
DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN
THE PRODUCT TO MCAFEE OR THE PLACE OF PURCHASE FOR A FULL REFUND.
License Attributions
Refer to the product Release Notes.
McAfee Total Protection Service Installation Guide2
Contents
Introduction to Total Protection Service. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
After you place your order. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Merging multiple orders or accounts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Installation environment. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Supported operating systems. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
RAM requirements. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Requirements for email protection. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Requirements for the email server security application. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Advanced network environments. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Decide whether to set up relay servers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
How firewall protection interacts with the Windows firewall. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Support for corporate firewalls or proxy servers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Terminal server support. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Preparing to Install the Client Software. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Uninstalling active virus protection software. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Uninstalling active firewall software. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Configuring your browser. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Installing the standalone installation agent. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Installing Total Protection Service. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Summary of installation methods. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
The standard installation process. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Requirements for standard installation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Sending an installation URL to users. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Installing with a URL. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
The silent installation process. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Requirements for silent installation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Installing with silent installation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Designating a relay server with VSSETUP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
VSSETUP parameters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
The push installation process. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Considerations for scheduling push installations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
3McAfee Total Protection Service Installation Guide
Requirements for push installation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Preparing the administrative computer. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Installing with push installation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Removing the Push Install utility. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Processes for pre-installed and CD versions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
About pre-installed trial and full subscriptions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
When you first turn on the computer. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Activating the copy of Total Protection Service. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Purchasing or renewing a full subscription. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Viewing or creating an account enrollment key. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Activating your license key after installation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Completing the installation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Testing virus protection. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Scanning the client computer. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Scanning the email Inbox. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Troubleshooting and support. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Frequently asked questions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Questions about installation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Questions about pre-installed or CD versions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Error messages. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Error messages for installation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Error messages for pre-installed and CD versions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
Contacting product support. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
McAfee Total Protection Service Installation Guide4
Contents
Introduction to Total Protection Service
This guide contains the information required to prepare for and install the McAfee
®
Total
Protection Service software on client computers.
NOTE: Some types of protection managed by Total Protection Service do not reside as software
on client computers. Therefore, they are not included in this guide. If your purchase included
email protection, the email server security application, or vulnerability scanning, refer to emails
and materials from McAfee for instructions on installing them.
Contents
After you place your order
Installation environment
Advanced network environments
After you place your order
When you place an order for Total Protection Service, you supply an email address, and your
account is associated with that email address. After you submit your order:
1 McAfee processes your order.
2 You receive three emails.
Contains...This email...
The download URL and instructions for installing the client software, activating
and setting up the protection you purchased, accessing documentation, and
contacting customer support.
Welcome
Instructions for logging on to the McAfee SecurityCenter administrative website
and changing your password. You must use Microsoft Internet Explorer
Logon credentials
(version 6.0 or later) or Mozilla Firefox (version 2.0 or later) to access the
SecurityCenter.
The grant number for the order, which is required for customer support.Grant letter
NOTE: If you purchase Total Protection Service from a McAfee partner who manages security
for you, the partner usually receives these emails. If you have questions about which emails
you should receive, contact the partner.
Merging multiple orders or accounts
If you placed more than one order using different email addresses, you have more than one
Total Protection Service account.
Use this task to merge separate accounts so that all your security information and emails are
sent to a single email address.
5McAfee Total Protection Service Installation Guide
Task
For option definitions, click ? in the interface.
1 From your web browser, log on to the SecurityCenter. Login credentials were sent to you
in a Welcome email when you purchased Total Protection Service.
NOTE: You must use Internet Explorer (version 6.0 or later) or Firefox (version 2.0 or later)
to log on to the SecurityCenter.
2 On the My Account page, click the Accounts & Keys tab.
3 In the Manage Accounts section, select Merge another account.
4 Enter the email address and password for the account you want to merge into your main
account, then click Next. The main account is the one that uses the email address where
you want to receive status emails and messages regarding all your subscriptions.
5 Verify that the licenses and computers listed for the account are the ones you want to
merge.
6 Click Merge Account.
Installation environment
Total Protection Service is designed for Microsoft Windows operating systems running on a PC
platform. The client software installs and runs on computers equipped with:
An Intel Pentium processor or compatible architecture.
Microsoft Internet Explorer 6.0 or later.
Check these topics for additional requirements and support guidelines:
Supported operating systems
RAM requirements
Requirements for email protection
Requirements for the email server security application
Supported operating systems
Use this table to verify that client computers are running supported operating systems. This
table includes only the types of protection that require installation of a client component.
ProtectionOperating system
Content filteringBrowserVirus and spyware,
firewall
Client computers
XWindows 2000 Professional
with Service Pack 3 or later
XXXWindows XP Home
Windows XP Professional
with Service Pack 2 or later
(32-bit and 64-bit)
Introduction to Total Protection Service
Installation environment
McAfee Total Protection Service Installation Guide6
ProtectionOperating system
Content filteringBrowserVirus and spyware,
firewall
XXXWindows Vista
(32-bit and 64-bit)
XXXWindows 7
(32-bit and 64-bit)
Servers
XWindows 2000 Server
Advanced Server
Small Business Server
with Service Pack 3 or later
XXXWindows 2003 Standard Server
Enterprise Server
Small Business Server
(32-bit and 64-bit)
XXXWindows Server 2008
Standard Server
Enterprise Server
Small Business Server
Essential Business Server
(32-bit and 64-bit)
When upgrading the operating system
If you upgrade the operating system on a client computer (for example, from Windows 2000
to Windows XP) and you want to leave your existing files and programs intact during the
upgrade, you must first uninstall Total Protection Service. You can reinstall it after the upgrade
is complete.
Support for Windows Home Server
A different version of the Total Protection Service client software is being developed for
computers running Microsoft Windows Home Server. Administrators running Windows Home
Server software will have access to the SecurityCenter to download this version, which will allow
the Total Protection Service client software to interact with the Windows Home Server console.
Please note these differences between the two versions of Total Protection Service:
Installing on computers running Windows Home Server requires a different installation
program than the one described in this guide in order to interact with the Windows Home
Server console.
Download the installation program from the Utilities page of the SecurityCenter (when the
program becomes available).
The client software for Windows Home Server supports only virus and spyware protection.
A separate product guide that describes the installation process and features unique to the
Windows Home Server product will be available from the Help page of the SecurityCenter.
Introduction to Total Protection Service
Installation environment
7McAfee Total Protection Service Installation Guide
Installation methods described in this guide are not supported installation methods of the
client software on a computer running Windows Home Server.
Operating system support ending
Support for the Windows 2000 operating system is scheduled to end.
Computers running Total Protection Service will still be protected from existing threats, but they
will no longer receive product updates and DAT files updated with protection for the latest
threats.
For more information about support for Windows 2000, visit:
http://www.mcafee.com/us/small/support/customer_service/end_life.html
Notifying users when support ends
By default, Total Protection Service displays notifications on client computers to remind users
that support is ending for their operating system. Notifications appear:
When upgrades to product components, such as the scanning engine, are scheduled to end
on a specific date or will end within 30 days.
When updates to detection definition (DAT) files have ended or will end within 30 days.
A policy option determines whether support notifications are displayed. However, notifications
are not displayed for computers running versions of Windows for which support has already
ended.
Use this task to enable or disable automatic notifications.
Task
For option definitions, click ? in the interface.
1 From your web browser, log on to the SecurityCenter. Login credentials were sent to you
in a Welcome email when you purchased Total Protection Service.
2 On the Policies page, click Add Policy to create a new policy, or click Edit to modify an
existing policy.
3 On the Client Settings tab, select or deselect Display support notifications on client
computers.
4 Click Save.
RAM requirements
Before installing Total Protection Service, use this table to verify that sufficient RAM is installed
on client computers.
RecommendedMinimum for multiple
types of protection
Minimum for single
type of protection
Operating system
1 GB1 GB512 MBWindows 2000
1 GB1 GB512 MBWindows XP
2 GB1 GB512 MBWindows 2003
2 GB1 GB1 GBWindows Vista
2 GB1 GB1 GBWindows 7
Introduction to Total Protection Service
Installation environment
McAfee Total Protection Service Installation Guide8
RecommendedMinimum for multiple
types of protection
Minimum for single
type of protection
Operating system
2 GB1 GB512 MBWindows Server 2008
2 GB1 GB512 MBOther Servers
NOTE: When calculating the total RAM required, consider the memory requirements of other
software applications running on client computers.
Requirements for email protection
If your subscription includes email protection, be sure your network meets these requirements
to set up and run email protection:
A dedicated email server, either in-house or hosted by an ISP.
A company email domain, such as yourdomain.com, with a static IP address.
Instructions for setting up email protection are provided in an email from McAfee and in the
product guide, available on the Help page of the SecurityCenter.
Requirements for the email server security application
If your subscription includes the email server security application, check these lists to verify
that your email server meets or exceeds minimum requirements. Instructions for installing the
email server security application are provided in emails and materials from McAfee.
McAfee GroupShield for Microsoft Exchange Server
Minimum requirements for Microsoft Exchange Server 2007:
x64 architecture-based processor with EM64T or AMD64 support.
2 GB of RAM.
740 MB free disk space.
Microsoft Exchange 2007.
Internet Explorer 6.0 or later.
One of these operating systems:
Microsoft Windows 2003 Server with Service Pack 1 (64-bit).
Microsoft Windows 2003 R2, Standard or Enterprise Edition (64-bit).
Minimum requirements for Microsoft Exchange Server 2003:
Intel Pentium or compatible 133MHz processor.
256 MB of RAM (512 MB recommended).
740 MB free disk space.
Microsoft Exchange 2003 with Service Pack 1 or later.
Internet Explorer 5.5 or later.
One of these operating systems:
Microsoft Windows 2000 Server with Service Pack 4.
Microsoft Windows 2000 Advanced Server with Service Pack 4.
Microsoft Windows Server 2003 Standard Edition (32-bit).
Introduction to Total Protection Service
Installation environment
9McAfee Total Protection Service Installation Guide
Microsoft Windows Server 2003 Enterprise Edition (32-bit).
Minimum requirements for Microsoft Exchange Server 2000 with Service Pack 3:
Intel Pentium or compatible 133MHz processor.
128 MB of RAM (256 MB recommended).
740 MB of free disk space.
Microsoft Exchange 2000 with Service Pack 3.
Microsoft Windows 2000 Server with Service Pack 4.
Internet Explorer 5.5 or later.
McAfee GroupShield for Lotus Domino, Windows edition
Minimum requirement:
Intel Pentium or compatible 133MHz processor.
512 MB of RAM (1 GB recommended).
Internet Explorer 6.0 or later set as the default browser.
One of these operating systems:
Microsoft Windows 2000 or 2003 Server.
Microsoft Windows 2000 Advanced Server with Service Pack 4 or later.
Microsoft Windows Server 2003 Enterprise Server with Service Pack 2 or later.
Advanced network environments
A few features might be appropriate to consider before installing Total Protection Service on
networks with certain characteristics.
Check this topicIf your network includes...
Decide whether to set up relay servers
One or more computers without an Internet connection
How firewall protection interacts with the Windows firewall
Computers running the Windows firewall
Support for corporate firewalls or proxy servers
A corporate firewall or proxy server
Terminal server support
Terminal servers or shared computers where the fast user
switching feature is used
Decide whether to set up relay servers
Before installing Total Protection Service, decide whether you want to set up relay servers and
which computers should be relay servers. This affects which installation methods you can use
for these computers.
When to set up relay servers
It is not necessary to set up relay servers. However, you might want to consider designating
one or more computers as relay servers if any computers on your network do not have a direct
connection to the Internet.
Introduction to Total Protection Service
Advanced network environments
McAfee Total Protection Service Installation Guide10
What is a relay server?
The Internet Independent Updating (IIU) feature allows computers without an Internet
connection to receive software updates through another local computer that has been designated
as a relay server. Any computer with an Internet connection can be set up as a relay server at
the time the client software is installed or at a later time. A relay server acts as a proxy for
other computers by allowing them to use its connection to check for updates.
How to set up relay servers
Specify relay servers using these methods:
Silent installation Designate a relay server during installation, or run VSSETUP at any time
to reconfigure a client computer as a relay server.
Push installation — Perform a separate push operation to push files to computers that will
serve as relay servers and computers that will not serve as relay servers.
How firewall protection interacts with the Windows firewall
If client computers on your network have been running the Windows firewall, and you plan to
install firewall protection with Total Protection Service, you should be aware of the way in which
the two firewalls interact.
To ensure complete protection on computers running Windows XP, Windows Vista, or Windows
7, firewall protection automatically disables the Windows firewall and configures itself as the
default firewall. This enables it to monitor communications for Internet applications and track
events for reporting purposes.
We recommend that you do not re-enable the Windows firewall while the Total Protection
Service firewall is enabled.
CAUTION: If both firewalls are enabled, the Total Protection Service firewall lists only a subset
of the blocked IP addresses in its report, Inbound Events Blocked by the Firewall. The Windows
firewall blocks some of these addresses; however, it does not report them because event logging
is disabled in the Windows firewall by default. If both firewalls are enabled, you must enable
Windows firewall logging to view a list of all blocked IP addresses. The default Windows firewall
log is C:\Windows\pfirewall.log. Enabling both firewalls also results in duplicate status and alert
messaging.
Support for corporate firewalls or proxy servers
Total Protection Service downloads components directly from McAfee servers to client computers.
If you are behind a corporate firewall, or are connected to the Internet by a proxy server, you
might need to provide additional information for your service to work properly.
Authentication support is limited to anonymous authentication or Windows domain
challenge/response authentication. Basic authentication is not supported.
Silent installation, push installation, and automatic updating do not support a CHAP or NTLM
proxy.
Contact product support if you have proxy questions while installing or updating Total Protection
Service.
Introduction to Total Protection Service
Advanced network environments
11McAfee Total Protection Service Installation Guide
Terminal server support
Total Protection Service supports terminal servers and the Windows fast user switching feature
in most scenarios, with these limitations:
Total Protection Service must be installed on the server by someone with local administrator
rights.
When an installation or update occurs on a terminal server, one session is designated as
the primary update session for restrictions that apply to automatic updates.
For all user sessions, the Total Protection Service icon is removed from the system tray
during the installation or update. The icon is restarted only for the user logged on to the
primary update session. All user sessions are protected, and other users can manually
redisplay their icons. (See the product guide or the client online help for instructions on
displaying the icon.)
Detection notifications are not displayed on the desktop of all computer users if the fast user
switching feature is enabled.
Introduction to Total Protection Service
Advanced network environments
McAfee Total Protection Service Installation Guide12
Preparing to Install the Client Software
The chapter explains how to prepare computers on your network before installing the client
software.
Contents
Uninstalling active virus protection software
Uninstalling active firewall software
Configuring your browser
Installing the standalone installation agent
Uninstalling active virus protection software
Other virus protection software might conflict with the advanced features of McAfee virus
protection. When multiple virus scanning engines try to access the same files on your computer,
they interfere with each other. Use this task to uninstall existing virus protection software before
installing the Total Protection Service virus and spyware protection. (There is no need to uninstall
an existing installation of Total Protection Service.)
Total Protection Service automatically detects some virus protection software during installation.
It can uninstall some of these products during installation, and it prompts you to uninstall other
products manually. If you are notified of existing virus protection software on a computer during
installation, you must uninstall it before installing Total Protection Service.
For a list of software that is detected and/or uninstalled during installation, visit
http://www.mcafeeasap.com/downloads/uninstallinfo/detected_software_list.html.
Task
1 In the Windows Control Panel, open Add/Remove Programs.
2 From the list of programs, locate any virus protection software.
3 Click Remove.
Uninstalling active firewall software
Before installing firewall protection, we recommend that you uninstall any other firewall programs
on your computer. (There is no need to uninstall an existing installation of Total Protection
Service.) Follow your firewall program’s instructions for uninstalling or use the Windows Control
Panel.
Use this task to uninstall existing firewall software from the Windows Control Panel.
13McAfee Total Protection Service Installation Guide
Task
1 In the Windows Control Panel, open Add/Remove Programs.
2 From the list of programs, locate any firewall software.
3 Click Remove.
NOTE: On computers running the Windows firewall, it is disabled automatically during
installation of Total Protection Service.
Configuring your browser
The computer used to install Total Protection Service must have Microsoft Internet Explorer 6.0
or later installed. Total Protection Service works with the default security settings in Internet
Explorer. Use this task to verify and configure your settings if you are unsure of them.
NOTE: If on your administrative or client computers you typically use a non-Microsoft browser,
such as Mozilla Firefox or Opera, you must install Internet Explorer before installing Total
Protection Service. After the software is installed, you can continue to use your default Internet
browser. You can access the SecurityCenter with Internet Explorer (version 6.0 or later) or
Firefox (version 2.0 or later).
Task
1 From the Windows Control Panel, open Internet Options.
2 On the Security tab, verify and change your security setting as needed, depending on your
version of Internet Explorer:
Internet Explorer 7.x — Select Medium-high.
Internet Explorer 6.x — Select Custom Level, then from the Reset to menu, select
Medium and click Reset.
3 Click OK.
Installing the standalone installation agent
To allow users without administrator rights to install Total Protection Service on client computers
by using the URL method, you must first load a standalone installation agent on their client
computers.
NOTE: This task is not required unless you want users without administrator rights to install
the client software.
Use this task to install the installation agent with a deployment tool, such as Microsoft Systems
Management Server (SMS) installer, Windows NT login scripts, or Tivoli IT Director, or by
downloading it directly onto client computers. You must have administrator rights on the client
computer to install this file. After the standalone installation agent is installed on a client
computer, any user can install Total Protection Service client software on that computer.
Task
1 From the SecurityCenter website, click the Help tab, select Utilities, then click installation
agent to download the executable installation file for the agent.
Preparing to Install the Client Software
Configuring your browser
McAfee Total Protection Service Installation Guide14
2 Copy the installation file to a portable medium, such as a thumb drive, or email it to client
computer users (optional).
3 Install the agent with one of these methods, depending on your location:
From the administrative computer — Deploy and execute the file on client computers
using your customary deployment tools.
From the client computer — Double-click the file to begin the installation process.
Preparing to Install the Client Software
Installing the standalone installation agent
15McAfee Total Protection Service Installation Guide
Installing Total Protection Service
This chapter explains how to install the client software on computers.
Contents
Summary of installation methods
The standard installation process
The silent installation process
The push installation process
Processes for pre-installed and CD versions
Completing the installation
Summary of installation methods
There are three methods for installing Total Protection Service client software, one standard
and two advanced methods.
Standard installation
Use a URL to install Total Protection Service on each client computer.
Use the URL you received in your Welcome email message to install the client software on
your computer and access the SecurityCenter website. This URL is specific to your account
and will install all the protection you have subscribed to in the default language for your
account.
Optionally, create a custom URL on the SecurityCenter with the Install Protection wizard.
Use the custom URL to specify specific types of protection to install, a language for the client
software, and a group to place the client computer in.
Send either the URL you received in your Welcome email or the custom URL to users with
instructions for installation, or visit each client computer and use the URL to install the software.
Advanced installation options
From an administrative computer, visit the SecurityCenter website and select an advanced
installation method to install the software without user interaction.
Silent installation — Download a program called VSSETUP.EXE, deploy it to client
computers, then open a DOS window on each client computer and run VSSETUP.EXE from
the command line. This method requires a third-party deployment tool, a login script, or a
link to an executable file in an email message.
Push installation — Obtain the Push Install utility, then deploy the software directly from
your service provider’s website to one or more client computers remotely.
This table summarizes the differences in the advanced installation methods.
McAfee Total Protection Service Installation Guide16
Advanced installation methodThe administrator...
PushSilent
Administrative computerClient computerPerforms the installation from
Push Install utilityVSSETUP.EXEObtains this file from the SecurityCenter
One or more computersOne computerInstalls the client software on
YesNoInstalls remotely
Yes (requires a separate installation for
client computers and relay servers)
YesCan designate relay servers (optional)
The standard installation process
URL installation is the most common installation method. Client software is installed on each
computer individually. Users install the client software by downloading it to their computers
from a company-specific URL.
How standard installation works
1 Obtain your download URL from your Welcome email message, or create a customized
URL from the SecurityCenter.
2 Send the URL to users in an email message with instructions (optional).
3 From the client computer, enter the URL into a browser window.
Requirements for standard installation
To install Total Protection Service on a client computer by using a download URL:
The client computer must have an Internet connection.
The client computer's user must have local administrator rights.
NOTE: Administrator rights are not the default setting. Change the default Windows
configuration or deploy a standalone installation agent on the client computer (see
Installing
the standalone installation agent
).
Sending an installation URL to users
As the administrator, you can obtain the company-specific installation URL in two ways:
After signing up for Total Protection Service, you receive an email message containing the
installation URL that has been set up for your company. This URL installs all the protection
software you have subscribed to, and places it in your account’s default group in the default
language of your account. You can copy this URL into an email message and send it to users.
At any time, you can log on to your SecurityCenter and create a customized URL for users.
This enables them to install selected protection software in a designated group and language.
Use this task to create a customized installation URL and send it to users.
Task
For option definitions, click ? in the interface.
Installing Total Protection Service
The standard installation process
17McAfee Total Protection Service Installation Guide
1 In your web browser, log on to your SecurityCenter website.
2 From the Computers page, click Add Computer.
3 Select the group where you want to place the client computers, and select the types of
protection to install, and a language for the software, then click Next. A customized URL
is displayed, along with simple instructions for users.
4 Click Select Text and Copy to Clipboard.
5 In your local email application, open a new message and paste the text you have copied.
6 Revise the instructions as needed, then send the email to the users who need to install the
software.
Installing with a URL
Use this task to install Total Protection Service on a client computer with a download URL.
Task
For option definitions, click ? in the interface.
1 Email the URL you received in your Welcome email to users, or log on to the SecurityCenter,
click Install Protection on the Dashboard page, and follow the steps in the wizard to
create a custom URL and email it to users.
2 Open the email message on the client computer and click the installation URL.
3 If prompted, select the types of protection to install, type your email address in the Email
or identifier field, and click Continue.
NOTE: The information entered here identifies the computer where the installation is taking
place. The SecurityCenter uses it to identify that computer in reports. If reports indicate a
problem with a computer, you can use the email address to notify the user. If the user
does not enter an email address, it is important to know how to contact the user when
security issues arise.
4 When prompted, click Install.
5 In the File Download dialog box, click Run.
For installation, Total Protection Service uses a cookie that is created at this time and
expires after 24 hours. If you save the installation file and try to install it after 24 hours
have passed, or delete the cookie, you are prompted to begin the installation process again.
6 If the User Account Control dialog box appears, click Continue.
7 If you are installing firewall support, select Restart when prompted.
The silent installation process
The silent installation method uses the executable file VSSETUP to install Total Protection Service
on a client computer, with no user interaction. This installation method is not network-specific
and installs the software on any Windows operating system.
How silent installation works
1 Download VSSETUP from the SecurityCenter.
2 Deploy to each computer where you want to install the client software.
Installing Total Protection Service
The silent installation process
McAfee Total Protection Service Installation Guide18
3 On the computer, open a DOS window and run the VSSETUP command using the appropriate
parameters.
Requirements for silent installation
To install Total Protection Service on a client computer using the silent installation method:
You should run this program using an account with sufficient rights to install the product.
Typically local administrator rights are required, and some methods require remote execution
rights.
You must know your company key. To find it, check these locations:
In the installation URL, the series of characters following
CK=
On the SecurityCenter, the Accounts & Keys tab of the My Account page.
To deploy VSSETUP.EXE, you must have a method for installing executable files on your
network computers. For example:
A third-party deployment tool, such as Novell NAL, ZenWorks, Microsoft Systems
Management Server (SMS) installer, or Tivoli IT Director.
A login script.
A link to an executable file in an email message.
A portable medium, such as a CD or thumb drive.
Installing with silent installation
Use this task to install Total Protection Service with the silent installation method.
Task
For option definitions, click ? in the interface.
1 From your web browser, log on to your SecurityCenter.
2 On the Dashboard page, click Install Protection.
3 Select the group where you want to place the client computers, the types of protection to
install, and a language for the software, then click Next.
Installing Total Protection Service
The silent installation process
19McAfee Total Protection Service Installation Guide
4 Under Additional Installation Options, select Display advanced installation methods.
5 Under method 1, click VSSETUP to save the VSSETUP.EXE file to your hard drive.
6 Deploy the program to each client computer using your customary deployment tool, such
as those listed under
Requirements for silent installation
.
7 On each client computer, open a DOS window and run the following command.
VSSETUP.EXE /CK=<your company key> /<parameters>
As shown in this example, you must include your company key (CK) as a parameter. See
VSSETUP parameters
for a list of optional parameters you can add to your command line.
NOTE: Your company key is included in the URL that you received when you subscribed
to Total Protection Service. It is the hexadecimal value that follows the characters
CK=
at the end of the URL. Your company key is also listed on the SecurityCenter, on the
Accounts & Keys tab of the My Account page.
8 If you are installing firewall protection, reboot the client computer.
Designating a relay server with VSSETUP
Use this task to specify whether a computer should function as a relay server.
Task
Use a VSSETUP parameter to specify a computer as a relay server or change a relay server
specification.
Use this parameterTo do this...
VSSETUP /RelayServer=1
NOTE: If you do not specify this parameter, the default
is 0 and the computer is not a relay server.
During installation, specify a computer is a relay server.
VSSETUP /SetRelayServerEnable=1
Modify an existing installation to specify a computer is
a relay server.
VSSETUP /SetRelayServerEnable=0
Modify an existing installation to specify a computer is
not a relay server.
VSSETUP parameters
For a silent installation, use this command line and any of the following parameters (which are
not case-sensitive):
VSSETUP.EXE /CK=<your company key> /<parameters>
DescriptionParameter
Required. Launches Setup using the company key.
Your company key is listed on the SecurityCenter, on the Accounts &
Keys tab of the My Account page.
/CK=XYZ
Installing Total Protection Service
The silent installation process
McAfee Total Protection Service Installation Guide20
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23
  • Page 24 24
  • Page 25 25
  • Page 26 26
  • Page 27 27
  • Page 28 28
  • Page 29 29
  • Page 30 30
  • Page 31 31
  • Page 32 32
  • Page 33 33
  • Page 34 34
  • Page 35 35
  • Page 36 36
  • Page 37 37
  • Page 38 38
  • Page 39 39
  • Page 40 40

McAfee Total Protection Service Installation guide

Category
Software licenses/upgrades
Type
Installation guide
This manual is also suitable for

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI