McAfee GUARD DOG 2 User manual

Category
Software
Type
User manual

This manual is also suitable for

PRODUCT GUIDE
McAfee Internet Security 5.0
VERSION 5.0
COPYRIGHT
© 2002 Networks Associates Technology, Inc. and its Affiliated Companies. All Rights Reserved. No
part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or
translated into any language in any form or by any means without the written permission of
Network Associates, Inc.
TRADEMARK ATTRIBUTIONS
ACTIVE SECURITY, ACTIVE SECURITY (IN KATAKANA), ACTIVEHELP, ACTIVESHIELD,
ANTIVIRUS ANYWARE AND DESIGN, BOMB SHELTER, CERTIFIED NETWORK EXPERT,
CLEAN-UP, CLEANUP WIZARD, CNX, CNX CERTIFICATION CERTIFIED NETWORK EXPERT
AND DESIGN, CYBERCOP, CYBERCOP (IN KATAKANA), CYBERMEDIA, CYBERMEDIA
UNINSTALLER, DESIGN (STYLIZED N), DISK MINDER, DISTRIBUTED SNIFFER SYSTEM,
DISTRIBUTED SNIFFER SYSTEM (IN KATAKANA), DR SOLOMON’S, DR SOLOMON’S LABEL,
ENTERPRISE SECURECAST, ENTERPRISE SECURECAST (IN KATAKANA), EZ SETUP, FIRST
AID, FORCEFIELD, GMT, GROUPSHIELD, GROUPSHIELD (IN KATAKANA), GUARD DOG,
HELPDESK, HOMEGUARD, HUNTER, ISDN TEL/SCOPE, LANGURU, LANGURU (IN
KATAKANA), M AND DESIGN, MAGIC SOLUTIONS, MAGIC SOLUTIONS (IN KATAKANA),
MAGIC UNIVERSITY, MAGICSPY, MAGICTREE, MCAFEE, MCAFEE (IN KATAKANA),
MCAFEE AND DESIGN, MULTIMEDIA CLOAKING, NET TOOLS, NET TOOLS (IN
KATAKANA), NETCRYPTO, NETOCTUPUS, NETSCAN, NETSHIELD, NETSTALKER,
NETWORK ASSOCIATES, NETXRAY, NOTESGUARD, NUTS & BOLTS, OIL CHANGE, PC
MEDIC, PC MEDIC 97, PCNOTARY, PGP, PGP (PRETTY GOOD PRIVACY), PRETTY GOOD
PRIVACY, PRIMESUPPORT, RECOVERKEY, RECOVERKEY - INTERNATIONAL, REGISTRY
WIZARD, REPORTMAGIC, RINGFENCE, ROUTER PM, SALESMAGIC, SECURECAST, SERVICE
LEVEL MANAGER, SERVICEMAGIC, SMARTDESK, SNIFFER, SNIFFER (IN HANGUL),
SNIFFMASTER, SNIFFMASTER (IN HANGUL), SNIFFMASTER (IN KATAKANA), SNIFFNET,
STALKER, SUPPORTMAGIC, TIS, TMEG, TNV, TVD, TNS, TOTAL NETWORK SECURITY,
TOTAL NETWORK VISIBILITY, TOTAL NETWORK VISIBILITY (IN KATAKANA), TOTAL
SERVICE DESK, TOTAL VIRUS DEFENSE, TRUSTED MAIL, UNINSTALLER, VIREX, VIRUS
FORUM, VIRUSCAN, VIRUSSCAN, WEBSCAN, WEBSHIELD, WEBSHIELD (IN KATAKANA),
WEBSNIFFER, WEBSTALKER, WEBWALL, WHO’S WATCHING YOUR NETWORK,
WINGAUGE, YOUR E-BUSINESS DEFENDER, ZAC 2000, ZIP MANAGER are registered
trademarks of Network Associates, Inc. and/or its affiliates in the US and/or other countries. All
other registered and unregistered trademarks in this document are the sole property of their
respective owners. © 2002 Networks Associates Technology, Inc. All Rights Reserved.
Issued August 2002 / Product Guide v5.0
Product Guide iii
McAfee Perpetual End User License Agreement – United States of America
NOTICE TO ALL USERS: CAREFULLY READ THE FOLLOWING LEGAL AGREEMENT
("AGREEMENT"), FOR THE LICENSE OF SPECIFIED SOFTWARE ("SOFTWARE") PRODUCED
BY NETWORK ASSOCIATES, INC. ("McAfee"). BY CLICKING THE ACCEPT BUTTON OR
INSTALLING THE SOFTWARE, YOU (EITHER AN INDIVIDUAL OR A SINGLE ENTITY)
CONSENT TO BE BOUND BY AND BECOME A PARTY TO THIS AGREEMENT. IF YOU DO NOT
AGREE TO ALL OF THE TERMS OF THIS AGREEMENT, CLICK THE BUTTON THAT
INDICATES THAT YOU DO NOT ACCEPT THE TERMS OF THIS AGREEMENT AND DO NOT
INSTALL THE SOFTWARE. (IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO THE
PLACE OF PURCHASE FOR A FULL REFUND.)
1. License Grant. Subject to the payment of the applicable license fees, and subject to the terms and conditions of
this Agreement, McAfee hereby grants to you a non-exclusive, non-transferable right to use one copy of the
specified version of the Software and the accompanying documentation (the "Documentation"). You may install
one copy of the Software on one computer, workstation, personal digital assistant, pager, "smart phone" or other
electronic device for which the Software was designed (each, a "Client Device"). If the Software is licensed as
a suite or bundle with more than one specified Software product, this license applies to all such specified
Software products, subject to any restrictions or usage terms specified on the applicable price list or product
packaging that apply to any of such Software products individually.
a. Use
. The Software is licensed as a single product; it may not be used on more than one Client Device
or by more than one user at a time, except as set forth in this Section 1. The Software is "in use" on a
Client Device when it is loaded into the temporary memory (i.e., random-access memory or RAM) or
installed into the permanent memory (e.g., hard disk, CD-ROM, or other storage device) of that Client
Device. This license authorizes you to make one copy of the Software solely for backup or archival
purposes, provided that the copy you make contains all of the Software's proprietary notices unaltered
and unobstructed.
b. Server-Mode Use
. You may use the Software on a Client Device as a server ("Server") within a
multi-user or networked environment ("Server-Mode") only if such use is permitted in the applicable
price list or product packaging for the Software. A separate license is required for each Client Device
or "seat" that may connect to the Server at any time, regardless of whether such licensed Client
Devices or seats are concurrently connected to, accessing or using the Software. Use of software or
hardware that reduces the number of Client Devices or seats directly accessing or utilizing the
Software (e.g., "multiplexing" or "pooling" software or hardware) does not reduce the number of
licenses required (i.e., the required number of licenses would equal the number of distinct inputs to
the multiplexing or pooling software or hardware "front end"). If the number of Client Devices or seats
that can connect to the Software can exceed the number of licenses you have obtained, then you must
have a reasonable mechanism in place to ensure that your use of the Software does not exceed the use
limits specified for the licenses you have obtained. This license authorizes you to make or download
one copy of the Documentation for each Client Device or seat that is licensed, provided that each such
copy contains all of the Documentation's proprietary notices unaltered and unobstructed.
c. Volume License Use
. If the Software is licensed with volume license terms specified in the applicable
product invoicing or product packaging for the Software, you may make, use and install as many
additional copies of the Software on the number of Client Devices as the volume license terms specify.
You must have a reasonable mechanism in place to ensure that the number of Client Devices on which
the Software has been installed does not exceed the number of licenses you have obtained. This
license authorizes you to make or download one copy of the Documentation for each additional copy
authorized by the volume license, provided that each such copy contains all of the Documentation's
proprietary notices unaltered and unobstructed.
iv McAfee Internet Security 5.0
2. Term. This Agreement is effective for an unlimited duration unless and until earlier terminated as set forth
herein. This Agreement will terminate automatically if you fail to comply with any of the limitations or other
requirements described herein. Upon any termination or expiration of this Agreement, you must cease use of the
Software and destroy all copies of the Software and the Documentation.
3. Updates. For the time period specified in the applicable product invoicing or product packaging for the
Software, you are entitled to download revisions or updates to the Software when and as McAfee publishes them
via its electronic bulletin board system, website or through other online services. For a period of ninety (90) days
from the date of the of original purchase of the Software, you are entitled to download one (1) revision or upgrade
to the Software when and as McAfee publishes it via its electronic bulletin board system, website or through
other online services. After the specified time period, you have no further rights to receive any revisions or
upgrades without purchase of a new license to the Software.
4. Ownership Rights. The Software is protected by United States copyright laws and international treaty
provisions. McAfee and its suppliers own and retain all right, title and interest in and to the Software, including
all copyrights, patents, trade secret rights, trademarks and other intellectual property rights therein. Your
possession, installation, or use of the Software does not transfer to you any title to the intellectual property in the
Software, and you will not acquire any rights to the Software except as expressly set forth in this Agreement. All
copies of the Software and Documentation made hereunder must contain the same proprietary notices that appear
on and in the Software and Documentation.
5. Restrictions. You may not sell, lease, license, rent, loan or otherwise transfer, with or without consideration, the
Software. McAfee updates its Software frequently and performance data for its Software change. Before
conducting benchmark tests regarding this Software, contact McAfee to verify that You possess the correct
Software for the test and the then current version and edition of the Software. You agree not to permit any third
party (other than third parties under contract with You which contains nondisclosure obligations no less
restrictive than those set forth herein) to use the Licensed Program in any form and shall use all reasonable efforts
to ensure that no improper or unauthorized use of the Licensed Program is made. You may not permit third
parties to benefit from the use or functionality of the Software via a timesharing, service bureau or other
arrangement, except to the extent such use is specified in the applicable list price or product packaging for the
Software. You may not transfer any of the rights granted to you under this Agreement. You may not reverse
engineer, decompile, or disassemble the Software, except to the extent the foregoing restriction is expressly
prohibited by applicable law. You may not modify, or create derivative works based upon, the Software in whole
or in part. You may not copy the Software or Documentation except as expressly permitted in Section 1 above.
You may not remove any proprietary notices or labels on the Software. All rights not expressly set forth
hereunder are reserved by McAfee.
6. Warranty and Disclaimer.
a. Limited Warranty
. McAfee warrants that for sixty (60) days from the date of original purchase the
media (e.g., diskettes) on which the Software is contained will be free from defects in materials and
workmanship.
b. Customer Remedies
. McAfee's and its suppliers' entire liability and your exclusive remedy for any
breach of the foregoing warranty shall be, at McAfee's option, either (i) return of the purchase price
paid for the license, if any, or (ii) replacement of the defective media in which the Software is
contained. You must return the defective media to McAfee at your expense with a copy of your
receipt. This limited warranty is void if the defect has resulted from accident, abuse, or misapplication.
Any replacement media will be warranted for the remainder of the original warranty period. Outside
the United States, this remedy is not available to the extent McAfee is subject to restrictions under
United States export control laws and regulations.
Product Guide v
c. Warranty Disclaimer. Except for the limited warranty set forth herein, THE SOFTWARE IS
PROVIDED "AS IS." TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW,
MCAFEE DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING
BUT NOT LIMITED TO IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A
PARTICULAR PURPOSE, AND NONINFRINGEMENT WITH RESPECT TO THE SOFTWARE
AND THE ACCOMPANYING DOCUMENTATION. YOU ASSUME RESPONSIBILITY FOR
SELECTING THE SOFTWARE TO ACHIEVE YOUR INTENDED RESULTS, AND FOR THE
INSTALLATION OF, USE OF, AND RESULTS OBTAINED FROM THE SOFTWARE.
WITHOUT LIMITING THE FOREGOING PROVISIONS, MCAFEE MAKES NO WARRANTY
THAT THE SOFTWARE WILL BE ERROR-FREE OR FREE FROM INTERRUPTIONS OR
OTHER FAILURES OR THAT THE SOFTWARE WILL MEET YOUR REQUIREMENTS. SOME
STATES AND JURISDICTIONS DO NOT ALLOW LIMITATIONS ON IMPLIED
WARRANTIES, SO THE ABOVE LIMITATION MAY NOT APPLY TO YOU. The foregoing
provisions shall be enforceable to the maximum extent permitted by applicable law.
7. Limitation of Liability. UNDER NO CIRCUMSTANCES AND UNDER NO LEGAL THEORY, WHETHER
IN TORT, CONTRACT, OR OTHERWISE, SHALL MCAFEE OR ITS SUPPLIERS BE LIABLE TO YOU
OR TO ANY OTHER PERSON FOR ANY INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL
DAMAGES OF ANY CHARACTER INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF
GOODWILL, WORK STOPPAGE, COMPUTER FAILURE OR MALFUNCTION, OR FOR ANY AND ALL
OTHER DAMAGES OR LOSSES. IN NO EVENT WILL MCAFEE BE LIABLE FOR ANY DAMAGES IN
EXCESS OF THE LIST PRICE MCAFEE CHARGES FOR A LICENSE TO THE SOFTWARE, EVEN IF
MCAFEE SHALL HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. THIS
LIMITATION OF LIABILITY SHALL NOT APPLY TO LIABILITY FOR DEATH OR PERSONAL
INJURY TO THE EXTENT THAT APPLICABLE LAW PROHIBITS SUCH LIMITATION.
FURTHERMORE, SOME STATES AND JURISDICTIONS DO NOT ALLOW THE EXCLUSION OR
LIMITATION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THIS LIMITATION AND
EXCLUSION MAY NOT APPLY TO YOU. The foregoing provisions shall be enforceable to the maximum
extent permitted by applicable law.
8. United States Government. The Software and accompanying Documentation are deemed to be "commercial
computer software" and "commercial computer software documentation," respectively, pursuant to DFAR
Section 227.7202 and FAR Section 12.212, as applicable. Any use, modification, reproduction, release,
performance, display or disclosure of the Software and accompanying Documentation by the United States
Government shall be governed solely by the terms of this Agreement and shall be prohibited except to the extent
expressly permitted by the terms of this Agreement.
9. Export Controls. You are advised that the Software is subject to the U.S. Export Administration Regulations.
You shall not export, import or transfer Software contrary to U.S. or other applicable laws, whether directly or
indirectly, and will not cause, approve or otherwise facilitate others such as agents or any third parties in doing
so. You represent and agrees that neither the United States Bureau of Export Administration nor any other
federal agency has suspended, revoked or denied your export privileges. You agree not to use or transfer the
Software for end use relating to any nuclear, chemical or biological weapons, or missile technology unless
authorized by the U.S. Government by regulation or specific license. Additionally, you acknowledge that the
Software is subject to export control regulations in the European Union and you hereby declare and agree that
the Software will not be used for any other purpose than civil (non-military) purposes. The parties agree to
cooperate with each other with respect to any application for any required licenses and approvals, however, you
acknowledge it is your ultimate responsibility to comply with any and all export and import laws and that
McAfee has no further responsibility after the initial sale to you within the original country of sale.
vi McAfee Internet Security 5.0
10. High Risk Activities. The Software is not fault-tolerant and is not designed or intended for use in hazardous
environments requiring fail-safe performance, including without limitation, in the operation of nuclear facilities,
aircraft navigation or communication systems, air traffic control, weapons systems, direct life-support machines,
or any other application in which the failure of the Software could lead directly to death, personal injury, or
severe physical or property damage (collectively, "High Risk Activities"). McAfee expressly disclaims any
express or implied warranty of fitness for High Risk Activities.
11. Miscellaneous. This Agreement is governed by the laws of the United States and the State of California,
without reference to conflict of laws principles. The application of the United Nations Convention of Contracts
for the International Sale of Goods is expressly excluded. This Agreement sets forth all rights for the user of the
Software and is the entire agreement between the parties. McAfee reserves the right to periodically audit you to
ensure that you are not using any Software in violation of this Agreement. During your standard business hours
and upon prior written notice, McAfee may visit you and you will make available to McAfee or its
representatives any records pertaining to the Software to McAfee. The cost of any requested audit will be solely
borne by McAfee, unless such audit discloses an underpayment or amount due to McAfee in excess of five
percent (5%) of the initial license fee for the Software or you are using the Software in an unauthorized manor,
in which case you shall pay the cost of the audit. This Agreement supersedes any other communications with
respect to the Software and Documentation. This Agreement may not be modified except by a written addendum
issued by a duly authorized representative of McAfee. No provision hereof shall be deemed waived unless such
waiver shall be in writing and signed by McAfee or a duly authorized representative of McAfee. If any provision
of this Agreement is held invalid, the remainder of this Agreement shall continue in full force and effect. The
parties confirm that it is their wish that this Agreement has been written in the English language only.
12. MCAFEE CUSTOMER CONTACT. If you have any questions concerning these terms and conditions, or if
you would like to contact McAfee for any other reason, please call (408) 988-3832, fax (408) 970-9727, or write:
Network Associates, Inc., McAfee Software Division, 3965 Freedom Circle, Santa Clara, California 95054.
http://www.nai.com.
Product Guide vii
McAfee Perpetual End User License Agreement – Canada
NOTICE TO ALL USERS: CAREFULLY READ THE FOLLOWING LEGAL AGREEMENT
("AGREEMENT"), FOR THE LICENSE OF SPECIFIED SOFTWARE ("SOFTWARE") BY NETWORK
ASSOCIATES INTERNATIONAL B.V. ("McAfee"). BY CLICKING THE ACCEPT BUTTON OR
INSTALLING THE SOFTWARE, YOU (EITHER AN INDIVIDUAL OR A SINGLE ENTITY)
CONSENT TO BE BOUND BY AND BECOME A PARTY TO THIS AGREEMENT. IF YOU DO NOT
AGREE TO ALL OF THE TERMS OF THIS AGREEMENT, CLICK THE BUTTON THAT
INDICATES THAT YOU DO NOT ACCEPT THE TERMS OF THIS AGREEMENT AND DO NOT
INSTALL THE SOFTWARE. (IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO THE
PLACE OF PURCHASE FOR A FULL REFUND.)
1. License Grant. Subject to the payment of the applicable license fees, and subject to the terms and conditions of
this Agreement, McAfee hereby grants to you a non-exclusive, non-transferable right to use one copy of the
specified version of the Software and the accompanying documentation (the "Documentation"). You may install
one copy of the Software on one computer, workstation, personal digital assistant, pager, "smart phone" or other
electronic device for which the Software was designed (each, a "Client Device"). If the Software is licensed as
a suite or bundle with more than one specified Software product, this license applies to all such specified
Software products, subject to any restrictions or usage terms specified on the applicable price list or product
packaging that apply to any of such Software products individually which you acknowledge you have received
and read.
a. Use
. The Software is licensed as a single product; it may not be used on more than one Client Device
or by more than one user at a time, except as set forth in this Section 1. The Software is "in use" on a
Client Device when it is loaded into the temporary memory (i.e., random-access memory or RAM) or
installed into the permanent memory (e.g., hard disk, CD-ROM, or other storage device) of that Client
Device. This license authorizes you to make one copy of the Software solely for backup or archival
purposes, provided that the copy you make contains all of the Software's proprietary notices unaltered
and unobstructed.
b. Server-Mode Use
. You may use the Software on a Client Device as a server ("Server") within a
multi-user or networked environment ("Server-Mode") only if such use is permitted in the applicable
price list or product packaging for the Software which you acknowledge you have received and read.
A separate license is required for each Client Device or "seat" that may connect to the Server at any
time, regardless of whether such licensed Client Devices or seats are concurrently connected to,
accessing or using the Software. Use of software or hardware that reduces the number of Client
Devices or seats directly accessing or utilizing the Software (e.g., "multiplexing" or "pooling"
software or hardware) does not reduce the number of licenses required (i.e., the required number of
licenses would equal the number of distinct inputs to the multiplexing or pooling software or hardware
"front end"). If the number of Client Devices or seats that can connect to the Software can exceed the
number of licenses you have obtained, then you must have a reasonable mechanism in place to ensure
that your use of the Software does not exceed the use limits specified for the licenses you have
obtained. This license authorizes you to make or download one copy of the Documentation for each
Client Device or seat that is licensed, provided that each such copy contains all of the Documentation's
proprietary notices unaltered and unobstructed.
viii McAfee Internet Security 5.0
c. Volume License Use. If the Software is licensed with volume license terms specified in the applicable
price list or product packaging for the Software, you may make, use and install as many additional
copies of the Software on the number of Client Devices as the volume license authorizes. You must
have a reasonable mechanism in place to ensure that the number of Client Devices on which the
Software has been installed does not exceed the number of licenses you have obtained. This license
authorizes you to make or download one copy of the Documentation for each additional copy
authorized by the volume license, provided that each such copy contains all of the Documentation's
proprietary notices unaltered and unobstructed.
2. Term. This Agreement is effective for an unlimited duration unless and until earlier terminated as set forth
herein. This Agreement will terminate automatically if you fail to comply with any of the limitations or other
requirements described herein. Upon any termination or expiration of this Agreement, you must cease use of the
Software and destroy all copies of the Software and the Documentation.
3. Updates. For the time period specified in the applicable price list or product packaging for the Software, you are
entitled to download revisions or updates to the Software when and as McAfee publishes them via its electronic
bulletin board system, website or through other online services. For a period of ninety (90) days from the date
of the of original purchase of the Software, you are entitled to download one (1) revision or upgrade to the
Software when and as McAfee publishes it via its electronic bulletin board system, website or through other
online services. After the specified time period, you have no further rights to receive any revisions or upgrades
without purchase of a new license to the Software.
4. Ownership Rights. The Software is protected by United States copyright laws and international treaty
provisions. McAfee and its suppliers own and retain all right, title and interest in and to the Software, including
all copyrights, patents, trade secret rights, trademarks and other intellectual property rights therein. Your
possession, installation, or use of the Software does not transfer to you any title to the intellectual property in the
Software, and you will not acquire any rights to the Software except as expressly set forth in this Agreement. All
copies of the Software and Documentation made hereunder must contain the same proprietary notices that appear
on and in the Software and Documentation.
5. Restrictions. You may not sell, lease, license, rent, loan or otherwise transfer, with or without consideration, the
Software. McAfee updates its Software frequently and performance data for its Software change. Before
conducting benchmark tests regarding this Software, contact McAfee to verify that You possess the correct
Software for the test and the then current version and edition of the Software. Benchmark tests of former,
outdated or inappropriate versions or editions of the Software may yield results that are not reflective of the
performance of the current version or edition of the Software. You agree not to permit any third party (other than
third parties under contract with you which contract contains nondisclosure obligations no less restrictive than
those set forth herein) to use the Software in any form and shall use all reasonable efforts to ensure that there is
no improper or unauthorized use of the Software. You may not permit third parties to benefit from the use or
functionality of the Software via a timesharing, service bureau or other arrangement, except to the extent such
use is specified in the applicable list price or product packaging for the Software. You may not transfer any of
the rights granted to you under this Agreement. You may not reverse engineer, decompile, or disassemble the
Software, except to the extent the foregoing restriction is expressly prohibited by applicable law. The interface
information necessary to achieve interoperability of the Software with independently created computer programs
will be supplied by McAfee on request and on payment of such reasonable costs and expenses of McAfee in
supplying that information. You may not modify, or create derivative works based upon, the Software in whole
or in part. You may not copy the Software or Documentation except as expressly permitted in Section 1 above.
You may not remove or alter any proprietary notices or labels on the Software or Documentation. All rights not
expressly set forth hereunder are reserved by McAfee.
6. Warranty and Disclaimer.
Product Guide ix
a. Limited Warranty. McAfee warrants that for sixty (60) days from the date of original purchase the
media (e.g., diskettes) on which the Software is contained will be free from defects in materials and
workmanship.
b. Customer Remedies
. McAfee's and its suppliers' entire liability and your exclusive remedy for any
breach of the foregoing warranty shall be, at McAfee's option, either (i) return of the purchase price
paid for the license, if any, or (ii) replacement of the defective media in which the Software is
contained. You must return the defective media to McAfee at your expense with a copy of your
receipt. This limited warranty is void if the defect has resulted from accident, abuse, or misapplication.
Any replacement media will be warranted for the remainder of the original warranty period. Outside
the United States, this remedy is not available to the extent McAfee is subject to restrictions under
United States export control laws and regulations.
c. Warranty Disclaimer
. Except for the limited warranty set forth herein, THE SOFTWARE IS
PROVIDED "AS IS." TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW,
MCAFEE DISCLAIMS ALL WARRANTIES, REPRESENATIONS AND CONDITIONS,
EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO IMPLIED
WARRANTIES OR CONDITIONS OF MERCHANTABILITY, FITNESS FOR A PARTICULAR
PURPOSE, AND NONINFRINGEMENT WITH RESPECT TO THE SOFTWARE AND THE
ACCOMPANYING DOCUMENTATION. YOU ASSUME RESPONSIBILITY FOR SELECTING
THE SOFTWARE TO ACHIEVE YOUR INTENDED RESULTS, AND FOR THE
INSTALLATION OF, USE OF, AND RESULTS OBTAINED FROM THE SOFTWARE.
WITHOUT LIMITING THE FOREGOING PROVISIONS, MCAFEE MAKES NO WARRANTY,
REPRESENTATION OR CONDITION THAT THE SOFTWARE WILL BE ERROR-FREE OR
FREE FROM INTERRUPTIONS OR OTHER FAILURES OR THAT THE SOFTWARE WILL
MEET YOUR REQUIREMENTS. SOME STATES AND JURISDICTIONS DO NOT ALLOW
LIMITATIONS ON IMPLIED WARRANTIES, SO THE ABOVE LIMITATION MAY NOT
APPLY TO YOU.
7. Limitation of Liability. UNDER NO CIRCUMSTANCES AND UNDER NO LEGAL THEORY, WHETHER
IN TORT, CONTRACT, OR OTHERWISE, SHALL MCAFEE OR ITS SUPPLIERS BE LIABLE TO YOU
OR TO ANY OTHER PERSON FOR ANY INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL
DAMAGES OF ANY CHARACTER INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF
GOODWILL, WORK STOPPAGE, COMPUTER FAILURE OR MALFUNCTION, OR FOR ANY AND ALL
OTHER DAMAGES OR LOSSES. IN NO EVENT WILL MCAFEE BE LIABLE FOR ANY DAMAGES IN
EXCESS OF THE LIST PRICE MCAFEE CHARGES FOR A LICENSE TO THE SOFTWARE, EVEN IF
MCAFEE SHALL HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. THIS
LIMITATION OF LIABILITY SHALL NOT APPLY TO LIABILITY FOR DEATH OR PERSONAL
INJURY TO THE EXTENT THAT APPLICABLE LAW PROHIBITS SUCH LIMITATION.
FURTHERMORE, SOME STATES AND JURISDICTIONS DO NOT ALLOW THE EXCLUSION OR
LIMITATION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THIS LIMITATION AND
EXCLUSION MAY NOT APPLY TO YOU. The foregoing provisions shall be enforceable to the maximum
extent permitted by applicable law.
8. United States Government. The Software and accompanying Documentation are deemed to be "commercial
computer software" and "commercial computer software documentation," respectively, pursuant to DFAR
Section 227.7202 and FAR Section 12.212, as applicable. Any use, modification, reproduction, release,
performance, display or disclosure of the Software and accompanying Documentation by the United States
Government shall be governed solely by the terms of this Agreement and shall be prohibited except to the extent
expressly permitted by the terms of this Agreement.
x McAfee Internet Security 5.0
9. Export Controls. You have been advised that the Software is subject to the U.S. Export Administration
Regulations and applicable local export control laws. You shall not export, import or transfer Products contrary
to U.S. or other applicable local laws, whether directly or indirectly, and will not cause, approve or otherwise
facilitate others such as agents or any third parties in doing so. If applicable to you, you represent and agree that
neither the United States Bureau of Export Administration nor any other federal agency has suspended, revoked
or denied your export privileges. You agree not to use or transfer the Software for end use relating to any nuclear,
chemical or biological weapons, or missile technology unless authorized by the U.S. Government and any other
applicable local authority by regulation or specific license. Additionally, you acknowledge that the Software is
subject to export control regulations in the European Union and you hereby declare and agree that the Software
will not be used for any other purpose than civil (non-military) purposes. The parties agree to cooperate with
each other with respect to any application for any required licenses and approvals, however, you acknowledge it
is your ultimate responsibility to comply with any and all export and import laws and that McAfee has no further
responsibility after the initial sale to you within the original country of sale.
10. High Risk Activities. The Software is not fault-tolerant and is not designed or intended for use in hazardous
environments requiring fail-safe performance, including without limitation, in the operation of nuclear facilities,
aircraft navigation or communication systems, air traffic control, weapons systems, direct life-support machines,
or any other application in which the failure of the Software could lead directly to death, personal injury, or
severe physical or property damage (collectively, "High Risk Activities"). McAfee expressly disclaims any
express or implied warranty or condition of fitness for High Risk Activities.
11. Miscellaneous. This Agreement is governed by the laws of the Netherlands. The application of the United
Nations Convention of Contracts for the International Sale of Goods is expressly excluded. Disputes with respect
to this Agreement, as well as with respect to its conclusion and execution, will be submitted exclusively to the
competent court in Amsterdam. This Agreement sets forth all rights for the user of the Software and is the entire
agreement between the parties. McAfee reserves the right to periodically audit you to ensure that you are not
using any Software in violation of this Agreement. During your standard business hours and upon prior written
notice, McAfee may visit you and you will make available to McAfee or its representatives any records
pertaining to the Software to McAfee. The cost of any requested audit will be solely borne by McAfee, unless
such audit discloses an underpayment or amount due to McAfee in excess of five percent (5%) of the initial
license fee for the Software or you are using the Software in an unauthorized manor, in which case you shall pay
the cost of the audit. This Agreement supersedes any other communications with respect to the Software and
Documentation. This Agreement may not be modified except by a written addendum issued by a duly authorized
representative of McAfee. No provision hereof shall be deemed waived unless such waiver shall be in writing
and signed by McAfee or a duly authorized representative of McAfee. If any provision of this Agreement is held
invalid, the remainder of this Agreement shall continue in full force and effect. The parties have required that
this Agreement and all documents relating thereto be drawn up in English. Les parties ont demandé que cette
convention ainsi que tous les documents que s'y attachent soient rédigés en anglais.
12. MCAFEE CUSTOMER CONTACT. If you have any questions concerning these terms and conditions, or if
you would like to contact McAfee for any other reason, please call +31 20 586 61 00 or write: McAfee,
Gatwickstraat 25, 1043 GL Amsterdam, Netherlands. You will find our Internet web-site at http://www.nai.com.
Product Guide xi
Contents
1
Welcome to McAfee Internet Security 5.0 . . . . . . . . . . . . . . . . . . 15
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
What’s included with McAfee Internet Security? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
What’s new in this release? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
About this manual . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
McAfee Internet Security and your online connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
McAfee Internet Security features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
2
Installing McAfee Internet Security . . . . . . . . . . . . . . . . . . . . . . . 21
Before you begin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
System requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Installation steps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Troubleshooting installation problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Removing or modifying your McAfee Internet Security installation . . . . . . . . . . . . . . . . . . 25
Important information about Windows XP migration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
3
Getting Started with McAfee Internet Security 5.0 . . . . . . . . . . . 27
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
The Title bar and Tool bar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Status information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
About Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
About the McAfee list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
How to use the McAfee Internet Security Configuration Assistant . . . . . . . . . . . . . . . . . . . 34
How the McAfee Internet Security Administrator Works . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Self-Administrating users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
The Administrator's password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
Forgotten passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
How User Setup Works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
Using McAfee VirusScan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Viewing Activity Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Contents
xii McAfee Internet Security 5.0
Keep your program up-to-date . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
What Mcafee Internet Security does while your computer is running . . . . . . . . . . . . . . . . . 39
Responding to McAfee Internet Security Alert Messages . . . . . . . . . . . . . . . . . . . . . 39
Using Browser Buddy to manage your web site passwords . . . . . . . . . . . . . . . . . . . 39
Using File Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Security Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
What Gatekeeper Does . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
What File Guardian Does . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
What Password Manager Does . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
Privacy Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
What Cookie Blocker Does . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
What Identity Protector Does . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
What Web Trail Cleaner Does . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
4
McAfee VirusScan Home Edition . . . . . . . . . . . . . . . . . . . . . . . . . 57
What’s new in this release? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
What comes with McAfee VirusScan? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Getting Started . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
The Title bar and Tool bar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
Status information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
The Task pane . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
Other McAfee VirusScan features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
About VShield Scanner . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
VShield automatic protection settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
How to Start and Stop VShield Scanner . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
Using Quarantine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
How to managing quarantined files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
Safe & Sound . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
Safe & Sound configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Emergency disk creation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
Using VirusScan With a Wireless Device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
How VirusScan protects your wireless device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
5
McAfee Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
What’s new in this release? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
How McAfee Firewall works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
Product Guide xiii
Contents
Frequently asked questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
Getting Started with McAfee Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
The Configuration Assistant . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
The McAfee Firewall Home page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
Other McAfee Firewall features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
McAfee Firewall Configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
Program configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
System configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
McAfee Firewalls Intrusion Detection System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
How to Configure the Intrusion Detection System . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
Common attacks recognized by IDS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
6
McAfee Internet Security’s Shared Features . . . . . . . . . . . . . . . . 97
QuickClean Lite . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
McAfee Shredder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
7
Updating McAfee Internet Security . . . . . . . . . . . . . . . . . . . . . . 101
About Instant Updater . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
Instant Updater features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
A
How to contact McAfee . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
www.McAfee-at-Home.com . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
Customer Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
Technical Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
Virus definition renewal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
B
Internet Security and Privacy . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
Networks and the Internet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
About Privacy and Security on the Web . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
Privacy on the Web . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
Security on the Web . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
Computer Viruses and the Web . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
Types of Viruses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
Frequently Asked Questions About Internet Privacy . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114
C
Your McAfee Internet Security To-do List . . . . . . . . . . . . . . . . . 117
Privacy & Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
Contents
xiv McAfee Internet Security 5.0
Virus Detection and Prevention Tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
Use a Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
Tips to maintaining your computer and its software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
Product Guide 15
1
Welcome to McAfee Internet
Security 5.0
The Internet provides a vast wealth of information and entertainment at your
fingertips. Yet, as soon as you connect, your computer is exposed to a
multitude of privacy and security threats. Protect your privacy and secure
your computer and your data with McAfee Internet Security. Incorporating
McAfee's award-winning technologies, McAfee Internet Security provides
one of the most comprehensive sets of privacy and security tools you can buy.
McAfee Internet Security destroys viruses, outwits hackers, secures your
personal information, privatizes your Web browsing, blocks ads and pop ups,
manages your cookies and passwords, locks down your files, folders and
drives, filters objectionable content, and puts you in control of the
communications in and out of your PC. McAfee Internet Security provides
powerful protection for today's Internet users.
Introduction
In the last few years the Internet has changed from a communications network
that government entities and universities used almost exclusively, to an
information treasure house that people of all ages and occupations can now
access. With an Internet account, you can send electronic mail (e-mail) around
the world in seconds, do research without leaving home, meet new friends in
an online chat room, or shop without getting out of your bathrobe. However,
with all these conveniences come a certain element of risk. When you use the
Internet, information is transmitted from your computer to other computers
on the Internet information you may not want other people to have. And
those computers can also send files to your computer that may contain viruses.
While most of these files are harmless, some can invade your privacy or even
damage the data on your computers hard drive.
McAfee Internet Security addresses any of these potential risks with its
comprehensive features designed to protect your privacy and security when
using the Internet.
With its new features, you can now also act as an Administrator and apply
customized protection settings not only for yourself, but for other users of
your computer and easily monitor potential risks they may encounter while
browsing the Internet.
Welcome to McAfee Internet Security 5.0
16 McAfee Internet Security 5.0
What’s included with McAfee Internet Security?
n The Administrator: As the Administrator, you are able to set up
protection settings for other users of your computer. You can add, edit
and delete a users profilethen setup individual privacy, security and
Internet filtering options that McAfee Internet Security will apply
whenever any of these users are browsing the Web through your
computer.
n Activity Logs: Activity Logs allow you to view a list of all the
interactions that you and other profiled users of your computer had with
McAfee Internet Security, including the date and time of the activity.
You can print, save or clear this list.
n Security Check: You can run an extensive check of your computer for
any privacy or security problems via this feature. After McAfee Internet
Security performs the check, it displays any problem found, provides
additional information about the problem, and guides you through on
how to solve the problem.
n VirusScan: McAfee Internet Security uses McAfee VirusScan to address
virus-related problems you may encounter through the Internet. This
feature allows you to set how to perform a virus scan operation on your
computer; what to do if a virus is found; and how it should alert you
once the virus is detected. You can also direct VirusScan to keep a record
of actions performed on your computer.
n Firewall: McAfee Internet Security incorporates McAfee Firewall to
protect your computer while it is connected to the Internet. McAfee
Firewall is a highly-flexible, easy-to-use program. Whether you are
connected to the Internet via DSL, cable modem or standard dial-up,
Internet communication in to and out of your PC is secure.
n QuickClean Lite: Remove unnecessary files using QuickClean Lite. The
QuickClean Lite wizard enables you to clean your computer of
unnecessary files and free valuable hard disk space.
n Shredder: For privacy and security reasons, you may want to be positive
that the information stored in files you delete is permanently erased
from your computer. Shredder does this for you by security wiping
deleted files so they cannot be restored or rebuilt using an undelete
type of utility.
Product Guide 17
Welcome to McAfee Internet Security 5.0
Whats new in this release?
This release of McAfee Internet Security includes the following new features
and functional enhancements.
n Includes VirusScan Home Edition 7 - Includes the latest version of the
award winning VirusScan anti-virus software to protect your system
from viruses, Trojans, Internet worms, harmful scripts, and other
malware. With automated updates and exclusive H.A.W.K. (Hostile
Activity Watch Kernel) protections, VirusScan keeps your computing
free of even the latest threats.
n Includes McAfee Firewall 4 - Includes the latest version of McAfee
Firewall. McAfee Firewall enables you to control the communications in
and out of your PC and helps keep hackers at bay. With powerful
Application Control, Intrusion Detection, and easy Home Networking
and Custom Rule Creation Wizards, McAfee Firewall provides essential
security for your Internet connection.
n Spyware/Adware Protection - Helps enhance your privacy by rooting
out snooper programs that attempt to track your Web surfing habits.
Now you can easily find and shut down these tracking programs that
often piggyback on popular freeware utilities and games.
n Extended Stealth Program Protection - Helps keep your PC free of
hidden key loggers that try to capture and steal your passwords and a
whole host of even more insidious programs that may be watching and
recording everything you do on your PC. Adds an essential layer of
protection against this growing threat to your privacy and security.
n Pop-Up Blocker - Puts an end to those pesky and annoying pop-up ads
so prevalent on the Internet. Now you'll be able to surf the Internet
without these and other ads getting in your way and slowing you down.
n Allow/Block Applications Per User - Lets you to control which
applications are available to different family members. Parents can
readily use installed programs while blocking access to younger family
members, protecting the family PC while restricting access to
questionable material.
n Filtering of Usenet Newsgroups - Usenet is said to exemplify the best
and worst of the Internet. Now you can take charge of which
newsgroups and content various family members might be exposed to
and filter out objectionable material while retaining access to the wealth
of information Usenet provides.
n MRU Cleaner - Deletes the telltale trail left behind the files you've
opened and viewed recently. Enhances your privacy by clearing MRU's
(Most Recently Used) of Windows based utilities and many other
popular programs.
Welcome to McAfee Internet Security 5.0
18 McAfee Internet Security 5.0
n Usability Enhancements - McAfee Internet Security 5.0 includes user
interface enhancements to make it easier than ever to protect your online
security and privacy.
About this manual
This manual provides the basic information you need to install, set up and get
started with McAfee Internet Security 5.0. More detailed information about
how to perform tasks within McAfee Internet Security is provided via online
Help. You can get Help while working with the different windows and dialog
boxes.
You can also view the Readme.txt file which contains other general
information, known issues, etc., about this product.
McAfee Internet Security and your online
connection
You must have an Internet connection through a local network or a modem to
use all McAfee Internet Security features. Some networks have an Internet
connection that you can use by connecting to the network either directly or
through dialup networking. Your computer must have a modem installed if
you dont connect through a network.
You can establish an Internet connection through an Internet Service Provider
(ISP) such as MSN, AOL, or Earthlink, etc. An ISP acts as a middleman
between you and the Internet. Your computer connects (using your modem)
to the ISPs equipment, which in turn connects your computer to the Internet.
In addition, you must also have a browser. A browser is software, such as
Microsoft Internet Explorer or Netscape Navigator, that allows you to view
text and graphics and download files from Web sites.
Product Guide 19
Welcome to McAfee Internet Security 5.0
McAfee Internet Security features
This section briefly describes other features of McAfee Internet Security that
protect you from the most common Internet threats.
Only the designated administrator or a user with administrative rights can
have access to these features which allow them to customize protection
settings for themselves and in the case of the Administrator, protection for
other profiled users of the same computer.
Protection from privacy threats
n Identity Protector monitors your Internet connection and warns you
before private information is sent to an nonsecure Internet site. It stops
programs and other people that use your computer (like your kids) from
sending your name and credit card numbers over the Internet without
your approval.
n Cookie Blocker prevents Web sites from storing cookies on your hard
drive. Third-party Web sites use cookies to track your Web browsing
habits. You can choose your level of interaction with Cookie Blocker.
n Web Trail Cleaner cleans your Web browsing trails such as cached files;
list of URLs (Uniform Resource Locator, also known as Web address)
visited; and history fileswhen you close your browser. This feature
prevents other users of your computer from tracking your online
movements by viewing the files and URL addresses left over from your
Internet browsing.
n Referer Filter prevents search information that you request at one Web
site from being passed along to the next site you visit. Without Referer
Filter, your browser may be allowing the transfer of your search request
information from one Web site to another.
Protection from security threats
n Gatekeeper allows you to control the programs that have access to your
Internet connection. Programs on your PC can be programmed to access
to the Internet without your consent.
n File Guardian protects files that contain your sensitive data from being
opened, renamed, copied, moved, or deleted. Programs, such as ActiveX
and Java programs, can scan your PC for personal information or delete
files without your permission.
File Guardian also limits access to protected files either to programs you
specify or through file encryption. It can limit the programs that can
access your tax, online banking, or personal accounting data files.
Welcome to McAfee Internet Security 5.0
20 McAfee Internet Security 5.0
n Password Manager stores your Web site login names and passwords for
protected Web sites in one secure location. When you are visiting a site
that requires this information, you can drag it from Browser Buddy to
the form displayed in your browser. No more storing your login names
and passwords in an nonsecure location, such as post-it notes on your
monitor or in a text file on your Windows desktop.
n Browser Buddy is convenient tool with a dual purpose. First, Browser
Buddy lets you view a summary of cookie activity. Just choose a Web site
that you have visited from the drop-down list. Second, Browser Buddy
gives you access to the passwords that you have stored in Password
Manager. When you log on a password-controlled Web Site, you can
drag and drop a user name and password from Browser Buddy to the
appropriate box in the login form. To access Browser Buddy, right-click
the McAfee Guardian icon in the Windows system tray and click
Browser Buddy in the pop-up menu.
Protection from virus threats
Using McAfee VirusScan, the following features are available:
n Scan to start the default virus scan task immediately, or configure a virus
scan task that suits your needs.
n Scheduler to launch the McAfee VirusScan Scheduler. This utility
enables you to configure and run unattended virus scan operations.
n Virus info to display virus information via the McAfee Web site.
Safeguard your computer against intrusions and attacks
Protect yourself while online with the advanced security of McAfee Firewall.
Easy-to-use, yet highly secure, McAfee Firewall safeguards your PC's
connection to the Internet whether you connect via DSL, cable modem, or
dial-up. McAfee Firewall gives you the powerful tools you need to control the
communications into and out of your PC.
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23
  • Page 24 24
  • Page 25 25
  • Page 26 26
  • Page 27 27
  • Page 28 28
  • Page 29 29
  • Page 30 30
  • Page 31 31
  • Page 32 32
  • Page 33 33
  • Page 34 34
  • Page 35 35
  • Page 36 36
  • Page 37 37
  • Page 38 38
  • Page 39 39
  • Page 40 40
  • Page 41 41
  • Page 42 42
  • Page 43 43
  • Page 44 44
  • Page 45 45
  • Page 46 46
  • Page 47 47
  • Page 48 48
  • Page 49 49
  • Page 50 50
  • Page 51 51
  • Page 52 52
  • Page 53 53
  • Page 54 54
  • Page 55 55
  • Page 56 56
  • Page 57 57
  • Page 58 58
  • Page 59 59
  • Page 60 60
  • Page 61 61
  • Page 62 62
  • Page 63 63
  • Page 64 64
  • Page 65 65
  • Page 66 66
  • Page 67 67
  • Page 68 68
  • Page 69 69
  • Page 70 70
  • Page 71 71
  • Page 72 72
  • Page 73 73
  • Page 74 74
  • Page 75 75
  • Page 76 76
  • Page 77 77
  • Page 78 78
  • Page 79 79
  • Page 80 80
  • Page 81 81
  • Page 82 82
  • Page 83 83
  • Page 84 84
  • Page 85 85
  • Page 86 86
  • Page 87 87
  • Page 88 88
  • Page 89 89
  • Page 90 90
  • Page 91 91
  • Page 92 92
  • Page 93 93
  • Page 94 94
  • Page 95 95
  • Page 96 96
  • Page 97 97
  • Page 98 98
  • Page 99 99
  • Page 100 100
  • Page 101 101
  • Page 102 102
  • Page 103 103
  • Page 104 104
  • Page 105 105
  • Page 106 106
  • Page 107 107
  • Page 108 108
  • Page 109 109
  • Page 110 110
  • Page 111 111
  • Page 112 112
  • Page 113 113
  • Page 114 114
  • Page 115 115
  • Page 116 116
  • Page 117 117
  • Page 118 118
  • Page 119 119
  • Page 120 120
  • Page 121 121
  • Page 122 122
  • Page 123 123
  • Page 124 124
  • Page 125 125
  • Page 126 126
  • Page 127 127
  • Page 128 128

McAfee GUARD DOG 2 User manual

Category
Software
Type
User manual
This manual is also suitable for

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI