McAfee MTP08EMB3RUA - Total Protection - PC User manual

Type
User manual

This manual is also suitable for

Product Guide
McAfee Total Protection Service 5.1.5
COPYRIGHT
Copyright © 2010 McAfee, Inc. All Rights Reserved.
No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by
any means without the written permission of McAfee, Inc., or its suppliers or affiliate companies.
TRADEMARK ATTRIBUTIONS
AVERT, EPO, EPOLICY ORCHESTRATOR, FOUNDSTONE, GROUPSHIELD, INTRUSHIELD, LINUXSHIELD, MAX (MCAFEE SECURITYALLIANCE EXCHANGE),
MCAFEE, NETSHIELD, PORTALSHIELD, PREVENTSYS, SECURITYALLIANCE, SITEADVISOR, TOTAL PROTECTION, VIRUSSCAN, WEBSHIELD are registered
trademarks or trademarks of McAfee, Inc. and/or its affiliates in the US and/or other countries. McAfee Red in connection with security is distinctive of
McAfee brand products. All other registered and unregistered trademarks herein are the sole property of their respective owners.
LICENSE INFORMATION
License Agreement
NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, WHICH SETS
FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU
HAVE ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT ACCOMPANY YOUR
SOFTWARE PACKAGING OR THAT YOU HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET, A FILE ON THE PRODUCT CD, OR A
FILE AVAILABLE ON THE WEBSITE FROM WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF THE TERMS SET
FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO MCAFEE OR THE PLACE OF
PURCHASE FOR A FULL REFUND.
2
McAfee Total Protection Service 5.1.5 Product Guide
Contents
Preface 9
About this guide ..................................9
Audience ..................................9
Conventions .................................9
Finding product documentation ............................10
1 Introducing Total Protection Service 11
How Total Protection Service works .......................... 12
Types of protection .................................13
Additional features with specific versions ........................13
Core product strengths ...............................14
New features for this release .............................15
The role of the client software ............................ 17
Updates to the client software ............................ 17
Overview of update methods ..........................17
Simple updates through direct connections ....................18
Updates using Rumor technology ........................19
Updates through relay servers .........................19
Management with the SecurityCenter ......................... 19
Create user groups ..............................21
Customize policies ..............................22
Check reports ................................24
2 Using the Client Software 25
How to access the client software ...........................25
About the icon ................................26
About the console .............................. 27
Types of client software updates ............................28
Terminal server support ............................29
Specifying when computers check for updates ...................29
Updating client computers manually .......................30
Disabling updates for non-logged on users .................... 30
Performing setup and maintenance tasks ........................31
Testing virus protection ............................31
Changing the language for the software ..................... 31
Logging on as a site administrator ........................31
Configuring notifications ............................32
Configuring what users see ...........................32
Uninstalling the client software .........................33
Frequently asked questions ..............................34
Error messages ..................................34
3 Using the SecurityCenter 37
The SecurityCenter .................................37
Logging on to the SecurityCenter ........................38
McAfee Total Protection Service 5.1.5 Product Guide
3
Accessing data on SecurityCenter pages ..................... 39
Protection status at a glance .............................40
Viewing protection at a glance .........................42
Working with widgets .............................42
Management of client computers ........................... 43
Working with computers ............................45
Working with an individual computer .......................46
Management of computer groups ...........................47
Working with groups .............................48
Management of group administrators ..........................48
Working with group administrators ........................50
Management of security policies ............................51
McAfee Default policy .............................52
Working with policies .............................55
Generation of security reports ............................ 56
Scheduling reports ..............................58
Adding your logo to reports .......................... 58
Computer Profiles report ............................59
Duplicate Computers report .......................... 60
Managing your account ...............................61
Configuring your account profile .........................61
Signing up for email notifications ........................61
Viewing and updating subscription information ...................62
Buying and renewing subscriptions and licenses ..................62
Locating or creating keys for your account .................... 63
Merging accounts .............................. 64
Downloading tools and utilities ............................64
Getting assistance .................................65
Frequently asked questions about the SecurityCenter ...................66
Questions about reporting ...........................66
Questions about adding, renewing, and moving licenses ...............67
4 Using Virus and Spyware Protection 69
How detections are handled ............................. 70
Spyware protection mode and detections ........................70
Use learn mode to discover programs ...................... 71
Types of scans ...................................71
On-access (automatic) scans ..........................72
On-demand scans ..............................72
Email scans .................................73
Spyware scans ................................73
Scanning on client computers .............................74
Scanning on demand from the console ......................74
Scanning on demand from Windows Explorer ................... 75
Scanning email on client computers .......................75
Viewing the progress of scheduled scans .....................75
Enabling and disabling on-access scanning .................... 76
Configuring scanning policy options ..........................76
Scheduling a scan ..............................76
Enabling optional types of virus scans ......................76
Excluding files and folders from virus scans ....................77
Selecting spyware scanning options .......................78
Approving and unapproving programs in a policy ..................78
Managing detections ................................79
Viewing scan results on client computers .....................79
Managing potentially unwanted programs on client computers ............ 80
Contents
4
McAfee Total Protection Service 5.1.5 Product Guide
Viewing quarantined files on client computers ...................81
Viewing user-approved programs and applications .................81
Viewing threats detected on the account .....................82
Viewing unrecognized programs detected on the account ...............83
Reports for virus and spyware protection ........................83
Detections report ...............................83
Unrecognized Programs report .........................84
Detection History report ............................85
Best practices (virus and spyware protection) ......................85
Frequently asked questions ..............................87
Error messages ..................................87
5 Using Firewall Protection 89
Connection type and detections of incoming communications ................90
Custom connections ............................. 91
Firewall protection mode and detections of unknown applications ..............92
Use learn mode to discover Internet applications ..................93
The role of IP addresses ...............................93
The role of system service ports ............................94
Standard assignments for system service ports .................. 94
Firewall configuration ................................95
Interaction between user and administrator policy settings ..............97
Configuring policy options ..............................97
Selecting general firewall settings ........................97
Configuring options for Internet applications ....................98
Tracking blocked communications ........................98
Configuring custom connections ............................99
Configuring system services and port assignments .................99
Configuring IP addresses ...........................100
Installing and enabling firewall protection at the policy level ................101
Installing firewall protection during policy updates .................101
Enabling and disabling firewall protection ....................102
Managing detections ................................102
Viewing unrecognized programs detected on the account ..............102
Viewing user-approved programs and applications .................103
Viewing blocked communications ........................103
Reports for firewall protection ............................104
Unrecognized Programs report .........................104
Inbound Events Blocked by Firewall report ....................105
Best practices (firewall protection) ..........................105
Frequently asked questions .............................106
Questions about policies ...........................107
Questions about general firewall protection ....................107
6 Using Browser Protection and Web Filtering 109
Browser protection features .............................109
How safety ratings are compiled ...........................110
Safety icons and balloons protect during searches ....................111
Using site safety balloons ...........................111
Testing communication problems ........................111
SiteAdvisor menu protects while browsing .......................112
Using the SiteAdvisor menu ..........................113
Safety reports provide details ............................113
Viewing safety reports ............................115
Information that browser protection sends to McAfee ...................115
Installing browser protection during policy updates ...................116
Contents
McAfee Total Protection Service 5.1.5 Product Guide
5
Web filtering features ...............................116
Enabling and disabling browser protection via policy ...................117
Enabling and disabling browser protection at the client computer ..............117
Block and warn sites by safety ratings .........................118
Blocking or warning site access based on safety ratings ..............119
Blocking or warning file downloads based on safety ratings .............119
Blocking phishing pages ...........................120
Block and warn sites by content ...........................120
Blocking or warning site access based on content .................121
Authorize and prohibit sites by URL or domain .....................121
How site patterns work ............................122
Adding authorized and prohibited sites .....................123
Customizing messages for users ...........................123
Viewing browsing activity ..............................124
Web Filtering report ................................125
Best practices (browser protection) ..........................126
Frequently asked questions .............................127
7 Using SaaS Email Protection 129
Core SaaS email protection features .........................129
Additional SaaS email protection services .......................130
The SaaS email protection widget and portal ......................131
Account activation and setup ............................132
Activating and setting up your account .....................133
Accessing the SaaS email protection portal ....................133
Configuring policy settings for SaaS email protection ................134
Checking quarantined messages ........................134
Reports and statistics for email protection .......................135
Viewing email activity for the week .......................135
Viewing reports ...............................135
Getting more information ..............................135
8 Using Email Server Protection 137
Email server protection features ...........................137
The installation and setup process ..........................139
Installing email server protection ........................139
The email server protection widget and management console ...............140
Management of email server protection ........................141
Checking notifications and action items .....................141
Viewing detection and status information ....................142
Accessing the management console on the server .................143
Where to find more information ...........................144
9 Using Vulnerability Scanning 145
Vulnerability scanning features ............................145
The vulnerability scanning widget and portal ......................146
Accessing the vulnerability scanning portal ....................147
Overview of scanning process ............................148
Types of devices to scan ..............................148
Types of scans ..................................149
Managing scan devices ...............................150
Discovering IP addresses in a domain ......................150
Discovering IP addresses in a network ......................150
Adding devices to scan ............................151
Configuring devices to accept scans .......................152
Creating device groups ............................153
Contents
6
McAfee Total Protection Service 5.1.5 Product Guide
Changing device groups ...........................153
Deleting devices ..............................154
Performing scans .................................154
Starting a scan ...............................154
Scheduling scans for devices .........................155
How detections are reported .............................156
Viewing scan results ................................156
Viewing results for audit scans .........................157
Viewing results for DNS discovery on domains ..................157
Viewing results for network discovery scans ...................158
Frequently asked questions .............................158
Error messages ..................................160
Index 161
Contents
McAfee Total Protection Service 5.1.5 Product Guide
7
Contents
8
McAfee Total Protection Service 5.1.5 Product Guide
Preface
This guide provides the information you need to configure, use, and maintain your McAfee product.
About this guide
This information describes the guide's target audience, the typographical conventions and icons used
in this guide, and how the guide is organized.
Audience
McAfee documentation is carefully researched and written for the target audience.
The information in this guide is intended primarily for:
• Administrators — People who implement and enforce the company's security program.
Conventions
This guide uses the following typographical conventions and icons.
Book title or Emphasis Title of a book, chapter, or topic; introduction of a new term; emphasis.
Bold Text that is strongly emphasized.
User input or Path Commands and other text that the user types; the path of a folder or program.
Code
A code sample.
User interface
Words in the user interface including options, menus, buttons, and dialog
boxes.
Hypertext blue A live link to a topic or to a website.
Note: Additional information, like an alternate method of accessing an option.
Tip: Suggestions and recommendations.
Important/Caution: Valuable advice to protect your computer system,
software installation, network, business, or data.
Warning: Critical advice to prevent bodily harm when using a hardware
product.
McAfee Total Protection Service 5.1.5 Product Guide
9
Finding product documentation
McAfee provides the information you need during each phase of product implementation, from
installation to daily use and troubleshooting. After a product is released, information about the product
is entered into the McAfee online KnowledgeBase.
Task
1
Go to the McAfee Technical Support ServicePortal at http://mysupport.mcafee.com.
2
Under Self Service, access the type of information you need:
To access... Do this...
User documentation
1
Click Product Documentation.
2
Select a Product, then select a Version.
3
Select a product document.
KnowledgeBase
• Click Search the KnowledgeBase for answers to your product
questions.
• Click Browse the KnowledgeBase for articles listed by product and
version.
Preface
Finding product documentation
10
McAfee Total Protection Service 5.1.5 Product Guide
1
Introducing Total Protection Service
Total Protection Service provides a "hands-off" solution to safeguard the computers on your network
automatically by keeping itself up-to-date and checking for threats contained in files and programs, in
email messages, in communications from inside and outside the network, and on websites.
When you purchase a subscription to Total Protection Service, an account is created for you, and you
become the account administrator (referred to as the site administrator). When you install the Total
Protection Service client software on computers, they are added to your account. A weekly email
alerts you to any problems detected for computers on your account.
In some organizations, another person, such as a purchasing
department representative, purchases the subscription and then
designates you to be the site administrator.
For a more "hands-on" approach, use the SecurityCenter to view and manage computers and
detections on your network. Your service provider sends you a unique URL and login credentials for
your account, which you can use to access the SecurityCenter. This is a pre-configured website that
provides a simple-to-use management console for monitoring the protection status of computers on
your account. Use the SecurityCenter to view reports on detections and activities and to configure
security settings that address the specific needs of your account.
This section provides an overview of the product and its features.
Contents
How Total Protection Service works
Types of protection
Additional features with specific versions
Core product strengths
New features for this release
The role of the client software
Updates to the client software
Management with the SecurityCenter
1
McAfee Total Protection Service 5.1.5 Product Guide
11
How Total Protection Service works
Total Protection Service delivers comprehensive security as a service for all the computers on your
account.
It automatically checks for threats, intercepts them, takes the appropriate action to keep your data
and your network safe, and tracks detections and security status for reports.
1 Client software runs on each computer where it is installed.
2 The client software updates itself — automatically and silently — by downloading the latest
detection definition (DAT) files from your account’s administrative website, the McAfee
®
SecurityCenter. DAT files define the threats that the client software detects.
3 The client software uploads security information about each computer to the SecurityCenter
for use in administrative reports.
4 As your account’s administrator, you can use a web browser to visit the SecurityCenter,
where you can access reports that detail the status of client computers and use tools for
customizing and managing security.
1
Introducing Total Protection Service
How Total Protection Service works
12
McAfee Total Protection Service 5.1.5 Product Guide
Types of protection
The core features in Total Protection Service safeguard against a broad range of threats.
Feature Description
Virus and spyware
protection
Checks for viruses, spyware, unwanted programs, and other potential threats
borne on removable media or brought in from your network, including via
email. Every time a file on your computer is accessed, virus and spyware
protection scans the file to make sure it is free of viruses and spyware.
Firewall protection Establishes a barrier between each computer and the Internet or other
computers on your local network. It silently monitors communications traffic
for suspicious activity and takes appropriate action, such as blocking.
Browser protection Displays information to safeguard client computer users against web-based
threats. Users can view website safety ratings and safety reports as they
browse or search with Microsoft Internet Explorer or Mozilla Firefox.
SecurityCenter Provides centralized, web-based access to status information and management
tasks for your account.
Additional features with specific versions
Some versions of Total Protection Service include additional protection features.
Feature Description
Hosted on
client
computers
Web filtering Works within browser protection to expand the policy and reporting options
available. Enables administrators to control access to websites based on their
safety rating or category of content. Based on SiteAdvisor
®
Enterprise Plus.
Web-based
Vulnerability
scanning
Analyzes your domains and IP addresses, then reports vulnerability detections and
recommends steps for correcting them. Based on SECURE
â„¢
.
Introducing Total Protection Service
Types of protection
1
McAfee Total Protection Service 5.1.5 Product Guide
13
Feature Description
SaaS email
protection
(NEW)
Protects against email threats by scanning messages before they reach your
network. Blocks or quarantines detections of directory harvest attacks, spam,
phishing scams, viruses, and other email-borne threats in messages and
attachments. Based on SaaS Email Protection and can be enhanced with these
additional services:
• SaaS Email Archiving — Stores email messages in a centralized, secure location.
• SaaS Email Continuity — Enables web-based email access during outages.
• SaaS Email Intelligent Routing — Routes filtered email to distributed email
systems.
If you have subscribed to email protection previously, your account will be migrated
to SaaS email protection. McAfee will notify you when this occurs and provide
instructions for setting up the new account.
Email server
protection
Provides comprehensive virus and spam protection for the email and other content
entering and leaving your environment. Proactive anti-virus scanning and an
automatic outbreak manager prevent malicious code from disrupting the system,
while advanced content filtering allows administrators to set up rules for
inappropriate content, sensitive information, and adding disclaimers to messages.
• Security Service for Exchange protects your Microsoft Exchange Server
2003/2007 environment and includes Anti-Spam for Mail Servers. Documentation
is bundled with the downloaded software.
• McAfee GroupShield
®
for Lotus Domino protects your Lotus Domino Windows
edition version 6.0.2/7.0.2/8.0 environment and includes Anti-Spam for Mail
Servers. Documentation is available on the CD or in the downloadable installer
accessible from the McAfee download center.
Core product strengths
Total Protection Service safeguards your computers with a robust set of core features.
• Continuous protection — From the time a client computer is turned on until it is turned off, Total
Protection Service silently monitors all file input and output, downloads, program executions,
inbound and outbound communications, and other system-related activities.
• Instant discovery for virus threats — When Total Protection Service detects a virus threat, it
attempts to clean the item containing the threat before further damage can occur. If an item
cannot be cleaned, a copy of it is placed in a quarantine folder and the original item is deleted.
• Customized threat response for program detections — By default, Total Protection Service
provides a high degree of protection against threats. You can also configure the response to
detections of potentially unwanted programs and suspicious activity to suit your needs: take
immediate action to clean, quarantine, or block the detection; prompt users for a response; or only
log the detection for administrative reports.
• Preemptive safety notifications for web-based threats — Threats reported on websites are
communicated to users through color-coded icons and safety reports, enabling them to minimize
exposure to dangerous websites.
1
Introducing Total Protection Service
Core product strengths
14
McAfee Total Protection Service 5.1.5 Product Guide
• Automatic updates — Total Protection Service checks for product updates at regular intervals
throughout the day, comparing security components against the latest releases. When a computer
needs a newer version, the client software retrieves it automatically.
• Early Warning system and outbreak response — Total Protection Service uses the latest
information about threats and outbreaks as soon as they are discovered by McAfee
®
Labs, a
research division of McAfee. Whenever McAfee Labs releases an outbreak detection definition (DAT)
file, computers on your account receive it promptly.
New features for this release
This release of Total Protection Service includes these new features.
Core features
All versions of Total Protection Service include these new features to facilitate account management.
Now you can do this... Details
Customize the SecurityCenter
home page
Select the summary and activity reports (known as widgets)
that appear on the Dashboard page. Click and drag to
reposition and resize widgets.
Get real-time evaluation for
unrecognized threat detections
Artemis technology sends unrecognized detections to McAfee
Labs for evaluation.
Schedule reports Customize the data that appears in reports, then automatically
generate and email these reports at regular intervals.
Designate a default policy for your
account
Select a customized policy as the default assigned to computers
in your account.
Display computers by policy Organize the computer listing for your account by policy as well
as by groups.
Access more account data on the
SecurityCenter
Look up your company key, grant number, installation URL, and
group IDs more easily.
Introducing Total Protection Service
New features for this release
1
McAfee Total Protection Service 5.1.5 Product Guide
15
Additional types of protection
Some versions of Total Protection Service offer additional types of protection that extend coverage to
other network assets.
Now you can do this... Details
Use SaaS email
protection to add robust
security options and
failsafe access to
messages and
administrative features
Protects against email threats by scanning messages before they reach
your network. Blocks or quarantines detections of directory harvest attacks,
spam, phishing scams, viruses, and other email-borne threats in messages
and attachments. Based on SaaS Email Protection and can be enhanced
with these additional services:
• SaaS Email Archiving — Stores email messages in a centralized, secure
location.
• SaaS Email Continuity — Enables web-based email access during outages.
• SaaS Email Intelligent Routing — Routes filtered email to distributed
email systems.
If you have subscribed to email protection previously, your account will be
migrated to SaaS email protection. McAfee will notify you when this occurs
and provide instructions for setting up the new account.
Control access to
websites based on their
safety ratings and
content
Web filtering works within browser protection to add policy and reporting
options. You can block user access to websites and file downloads or warn
them about reported threats, customize messaging that displays for
blocked sites, create lists of authorized and prohibited websites based on
their domain or URL, or view a report of web browsing activity on your
network.
Scan websites for
vulnerabilities
Vulnerability scanning enables you to register IP addresses, then scan them
for vulnerabilities and report scan results to the SecurityCenter in alerts.
Access protection
portals without
separate login
credentials
The single sign-on feature lets you open the SaaS email protection or
vulnerability scanning portal directly from the SecurityCenter, without
entering additional login credentials.
Increase protection for
Microsoft Exchange mail
servers
Security Service for Exchange uses advanced heuristics to protect your
Microsoft Exchange server version 2003 or 2007 from viruses, unwanted
content, potentially unwanted programs, and banned file types and
messages. It also scans:
• Subject line and body of the email messages.
• Email attachments (based on file type, file name, and file size).
• Text within the email attachments.
Additionally, Security Service for Exchange includes the add-on component
Anti-Spam for Mail Servers, which protects your Exchange server from
spam and phishing emails.
1
Introducing Total Protection Service
New features for this release
16
McAfee Total Protection Service 5.1.5 Product Guide
The role of the client software
The Total Protection Service software installed on client computers implements a three-prong
approach to security
It does this by:
1
Silently monitoring all file input and output, downloads, program executions, inbound and outbound
communications, and other system-related activities on client computers. As a result of this
monitoring, the client software automatically:
• Deletes or quarantines detected viruses.
• Removes potentially unwanted programs, such as spyware or adware, unless you select a
different response.
• Blocks suspicious activity unless you specify a different response.
• Indicates unsafe websites with a color-coded button or icon in the browser window or search
results page. These indicators provide access to safety reports that detail site-specific threats.
2
Regularly updating detection definition (DAT) files and software components to ensure that you are
always protected against the latest threats.
3
Uploading security information for each client computer to the SecurityCenter, then using this
information to send emails and create reports that keep you informed about your account’s status.
Updates to the client software
Regular updates are the cornerstone of Total Protection Service.
The client software periodically checks a site on the Internet for newer versions of these software
components.
• Regular DAT files, which contain the latest definitions for viruses, potentially unwanted programs,
and cookies and registry keys that might indicate spyware. These are updated regularly to add
protection against new threats.
• Outbreak DAT files, which are high-priority detection definition files released in an emergency
situation in response to a specific new threat.
• Software components running on client computers.
• Policy settings configured for your account.
At the same time, the client software sends information about its detections and protection status, to
update the security data maintained on the SecurityCenter website and used in administrative reports.
Overview of update methods
The client software uses several methods to check for and retrieve updates.
Five minutes after a client computer connects to the network, and at regular intervals throughout the
day, the Total Protection Service client software checks for updates. If updates are available, the client
computer retrieves them.
In addition, users can check for updates manually at any time by clicking the Total Protection Service
icon in the system tray, then selecting Update Now.
Introducing Total Protection Service
The role of the client software
1
McAfee Total Protection Service 5.1.5 Product Guide
17
Updates can occur in three ways. You can implement one method or a combination of methods, which
enables you to control the impact updates have on network resources.
1
For simple updates, each client computer on your account has a direct connection to the Internet
and checks for new updates.
2
Rumor technology enables all computers in a workgroup to share downloaded files, which controls
Internet traffic and minimizes expensive downloads.
3
Internet Independent Updating (IIU) enables any computer on the network to get information from
the update site, even if that computer does not have an Internet connection, by communicating
with the update site through a network computer that is configured as a relay server.
Simple updates through direct connections
Each client computer that has a direct Internet connection can check for updates and download them
from the update site on the Internet. This is the simplest method of retrieving updates.
1
Introducing Total Protection Service
Updates to the client software
18
McAfee Total Protection Service 5.1.5 Product Guide
Updates using Rumor technology
When one computer shares updates with other computers on the local area network (LAN), rather
than requiring each computer to retrieve updates from the update website individually, the Internet
traffic load on the network is reduced. This process of sharing updates is called Rumor.
1
Each client computer checks the version of the most recent catalog file on the Internet site. This
catalog file contains information for every component in the Total Protection Service client
software, and is stored in a digitally signed, compressed .cab file format.
• If the version is the same as the catalog file on the client computer, the process stops here.
• If the version is different from the catalog file on the client computer, the client computer
attempts to retrieve the latest catalog file from its peers. It queries if other computers on the
LAN have already downloaded the new catalog file.
2
The client computer retrieves the required catalog file (directly from the Internet site or from one
of its peers) and uses it to determine if new components are available for Total Protection Service.
3
If new components are available, the client computer attempts to retrieve them from its peers. It
queries whether computers on the LAN have already downloaded the new components.
• If so, the client computer retrieves the update from a peer. (Digital signatures are checked to
verify that the computer is valid.)
• If not, the client computer retrieves the update directly from the update site.
4
On the client computer, the catalog file is extracted and new components are installed.
Updates through relay servers
Internet Independent Updating (IIU) enables computers to update Total Protection Service client
software when they are not connected to the Internet.
At least one computer on the subnet must have an Internet connection to be able to communicate
with the update site. That computer is configured to act as a relay server, and computers without an
Internet connection use this computer to connect with the Internet and retrieve updates directly from
the McAfee update site.
1
When a computer without Internet access fails to connect directly to the update site, it requests a
response from a relay server on the LAN and uses that computer to communicate with the update
site.
2
The computer without an Internet connection downloads updates directly from the update site
through the relay server.
You can specify which computers function as relay servers when you install the client software or at a
later time. See the installation guide for more information.
Management with the SecurityCenter
Your service provider sends you a unique URL and login credentials for your account, which you can
use to log on to the SecurityCenter, a pre-configured, web-based management console for your account.
From the SecurityCenter, you can access tools to monitor the status of computers on your account,
view reports on detections and activities, and configure security settings that address the specific
needs of your account.
Introducing Total Protection Service
Management with the SecurityCenter
1
McAfee Total Protection Service 5.1.5 Product Guide
19
The Dashboard page is the "home page" of the SecurityCenter. It shows summary information for your
account at-a-glance.
• Alerts and action items — Indicate whether any action is required to address security issues, and
links you to instructions for resolving them.
• Product coverage and activity summaries — Modular reports (known as widgets) illustrate the
current status of your account. These include reports on protection coverage (such as computers
where protection is installed and enabled) and activity (such as the number of detections, emails,
and website visits). The type, size, and placement of widgets can be customized.
• Subscription tracking — Widgets are available to show subscription and licensing information for
your account. Click a button to install protection, create a trial subscription, renew or purchase a
subscription, or buy additional licenses.
• Links to related portals — Some widgets contain a link to a portal used for managing
non-client-based protection, such as SaaS email protection and vulnerability scanning.
The SecurityCenter offers two powerful tools for protecting and monitoring displaying your computers
and fine-tuning their security settings.
1
Introducing Total Protection Service
Management with the SecurityCenter
20
McAfee Total Protection Service 5.1.5 Product Guide
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23
  • Page 24 24
  • Page 25 25
  • Page 26 26
  • Page 27 27
  • Page 28 28
  • Page 29 29
  • Page 30 30
  • Page 31 31
  • Page 32 32
  • Page 33 33
  • Page 34 34
  • Page 35 35
  • Page 36 36
  • Page 37 37
  • Page 38 38
  • Page 39 39
  • Page 40 40
  • Page 41 41
  • Page 42 42
  • Page 43 43
  • Page 44 44
  • Page 45 45
  • Page 46 46
  • Page 47 47
  • Page 48 48
  • Page 49 49
  • Page 50 50
  • Page 51 51
  • Page 52 52
  • Page 53 53
  • Page 54 54
  • Page 55 55
  • Page 56 56
  • Page 57 57
  • Page 58 58
  • Page 59 59
  • Page 60 60
  • Page 61 61
  • Page 62 62
  • Page 63 63
  • Page 64 64
  • Page 65 65
  • Page 66 66
  • Page 67 67
  • Page 68 68
  • Page 69 69
  • Page 70 70
  • Page 71 71
  • Page 72 72
  • Page 73 73
  • Page 74 74
  • Page 75 75
  • Page 76 76
  • Page 77 77
  • Page 78 78
  • Page 79 79
  • Page 80 80
  • Page 81 81
  • Page 82 82
  • Page 83 83
  • Page 84 84
  • Page 85 85
  • Page 86 86
  • Page 87 87
  • Page 88 88
  • Page 89 89
  • Page 90 90
  • Page 91 91
  • Page 92 92
  • Page 93 93
  • Page 94 94
  • Page 95 95
  • Page 96 96
  • Page 97 97
  • Page 98 98
  • Page 99 99
  • Page 100 100
  • Page 101 101
  • Page 102 102
  • Page 103 103
  • Page 104 104
  • Page 105 105
  • Page 106 106
  • Page 107 107
  • Page 108 108
  • Page 109 109
  • Page 110 110
  • Page 111 111
  • Page 112 112
  • Page 113 113
  • Page 114 114
  • Page 115 115
  • Page 116 116
  • Page 117 117
  • Page 118 118
  • Page 119 119
  • Page 120 120
  • Page 121 121
  • Page 122 122
  • Page 123 123
  • Page 124 124
  • Page 125 125
  • Page 126 126
  • Page 127 127
  • Page 128 128
  • Page 129 129
  • Page 130 130
  • Page 131 131
  • Page 132 132
  • Page 133 133
  • Page 134 134
  • Page 135 135
  • Page 136 136
  • Page 137 137
  • Page 138 138
  • Page 139 139
  • Page 140 140
  • Page 141 141
  • Page 142 142
  • Page 143 143
  • Page 144 144
  • Page 145 145
  • Page 146 146
  • Page 147 147
  • Page 148 148
  • Page 149 149
  • Page 150 150
  • Page 151 151
  • Page 152 152
  • Page 153 153
  • Page 154 154
  • Page 155 155
  • Page 156 156
  • Page 157 157
  • Page 158 158
  • Page 159 159
  • Page 160 160
  • Page 161 161
  • Page 162 162
  • Page 163 163
  • Page 164 164
  • Page 165 165
  • Page 166 166
  • Page 167 167
  • Page 168 168
  • Page 169 169
  • Page 170 170
  • Page 171 171
  • Page 172 172
  • Page 173 173
  • Page 174 174
  • Page 175 175

McAfee MTP08EMB3RUA - Total Protection - PC User manual

Type
User manual
This manual is also suitable for

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI