McAfee OFFICE 3.1 User manual

Category
Software
Type
User manual
McAfee Office
Version 3.1
User’s Guide
COPYRIGHT
Copyright (c) 1999-2000 Networks Associates Technology, Inc. All Rights Reserv ed. No part of this
publication may be reprodu ced, transmitted, transcribed, stored in a retrieval system, o r translated into
any language in any form or by any means without the written permission of Networks Associates
Technology, Inc. , or its suppliers or aff iliate companies.
TRADEMARK ATTRIBUTIONS
* ActiveHelp, Bomb Shelter,Building a Worldof Trust, CipherLink, Clean-Up,Cloaking,CNX, * ActiveHelp, Bomb
Shelter, Building a World of Trust, CipherLink, Clean-Up, Cloaking, CNX, Compass 7, CyberCop, CyberMedia,
Data Security Letter, Discover, Distributed Sniffer System, Dr Solomon's, Enterprise Secure Cast, First Aid,
ForceField, Gauntlet, GMT, GroupShield, HelpDesk, Hunter, ISDN Tel/Scope, LM 1, LANGuru, LeadingHelp
Desk Technology, Magic Solutions, MagicSpy, MagicTree, Magic University, MagicWin, MagicWord, McAfee,
McAfee Associates, MoneyMagic, More Power To You, Multimedia Cloaking, NetCrypto, NetOctopus, NetRoom,
NetScan, Net Shield, NetShield, NetStalker, Net Tools, Network Associates, Network General, Network Uptime!,
NetXRay, Nuts & Bolts, PC Medic, PCNotary, PGP, PGP (Pretty Good Privacy), PocketScope, Pop-Up,
PowerTelnet, Pretty Good Privacy, PrimeSupport, RecoverKey, RecoverKey-International, ReportMagic,
RingFence, Router PM, Safe & Sound, SalesMagic, SecureCast, Service Level Manager,ServiceMagic, Site Meter,
Sniffer, SniffMaster, SniffNet, Stalker, Statistical Information Retrieval (SIR), SupportMagic, Switch PM,
TeleSniffer,TIS, TMach, TMeg, Total Network Security, Total Network Visibility, Total Service Desk,TotalVirus
Defense, T-POD, Trusted Mach,Trusted Mail, Uninstaller, Virex, Virex-PC, Virus Forum, ViruScan, VirusScan,
VShield, WebScan, WebShield, WebSniffer, WebStalker, WebWall, and ZAC 2000 are registered trademarks of
Network Associates and/or its affiliates in the US and/or other countries. All other registered and unregistered
trademarks in this document are the sole property of their respective owners.
LICENSE AGREEMENT
NOTICE TO ALL U SERS: CAREFULLY READ THE FOLLOWING LEGAL AGREEMENT
("AGREEMENT"), FOR TH E LICENSE OF SPECIFIED SOFTWARE ("SOFTWARE") BY NETWORK
ASSOCIATES, INC. ("McAfee"). BY C LICKING THE AC CEPT BUTTON OR INSTALLING THE
SOFTWARE, YOU ( EITHER AN INDIVIDUAL OR A SINGLE ENTITY) CONSENT TO BE BOUND BY
AND BECOME A PARTY TO THIS AGREEMENT. IF YO U DO NOT AGREE TO ALL OF THE TERMS
OF THIS AGREEMENT, CLICK THE BUTTON THAT INDICATES THAT YOU DO NOT ACCEPT THE
TERMS O F THIS AGREEMENT AND DO NOT INSTALL THE SOFTW ARE. (IF APP LICABLE, YOU
MAY RETURN THE PRODUCT TO THE PLACE OF PURCHASE FOR A FULL REFUND.)
1. License G rant. Subject to the payment o f the applicable lic en se fees, a nd subject to the terms an d
conditions of this Agreement, McAfee hereby grants to you a n on-exclusive, non-transferable right
to use one copy of the specified version of the Software and the accompanying documentation (the
"Documentation"). You may install one copy of the Software on one computer, workstation,
personal digital a ssistant, pager, "smart phone" or other electronic device for which the Software
was designed (each, a "Client Device"). If the S oftware is licensed as a suite or bundle with more
than one specified Software product, this license applies to a ll such sp ecified Software products,
subject to an y restrictio ns or usage terms specified o n the ap plicable p rice list orproduct
pac kaging
that apply to any of such Software prod ucts individually.
a. Us e. The Software is licensed as a single product; it ma y not be used on more than one Client
Device or by more than one user at a time, except as set forth in this Section 1. The Software is "in
use" on a C lient Device when it is loaded into the temporary memory (i.e., random-access
memory or RAM) or installed into the permanent memo ry (e.g., hard disk, CD-ROM , o r o ther
Issued August 2000 / McAfee Office v3.1
storage device) of that C lient Device. This license authorizes you to make one copy of
the Software solely for b ackup or archival purposes, provided that the copy you make
contains all of the Softw are's proprietary notic es.
b. Server-Mode. You may use the Software on a Client Device as a server ("Server") within a
multi-user or networked environment ("Server-Mode") only if su ch use is permitted in the
applicable price list or product packaging f or the Software. A separate license is required f or eac h
Client Device o r "seat" that ma y connect to the S erver at a ny time, regar dless of whether such
licensed Client Devices or seats are concurrently connected to, a ccessing o r using the Software.
Use of so ftware or hardware that reduces the number of Client Devices or sea ts directly accessing
or u tilizing the Software (e. g ., "multiplexing" or "p ooling" software or ha rdwa re) does no t redu c e
the number of licenses required (i.e., t he required number of licenses would equal the number of
distinct inputs to the multiplex in g or pooling software or hardwa re "front end"). I f the number
of Client Devices or seats that can connect to the Software can exceed the number of licenses you
have o btained, then you must have a reasonable mechanism in place to ensure that your use of
the Software does not ex ceed the use limits sp ecified for the licenses you have obtained. This
license authorizes you to make or download one copy of the Documentation for each Client
Device o r seat that is licensed, provided that each such copy contains all of the Documentation's
proprietary notices.(i.e., the requ ired nu mber o f licenses would equal the number of distinct
inputs to the multiplexing or pooling software or hardware "front end"). If the number of Client
Devices or seats that can connect to the Software can exceed the number of licenses you have
obtained, then you must have a reasonable mechanism in place to ensure that yo ur use of the
Software does not exceed t he u se limits specified f or the lic enses you ha ve obtained. Th is license
authorizes you to make or download one copy of the Documentation for each Client Device or
seatthat is licensed, prov ided that eachsuchcopycontainsall ofthe Documentation'sproprietary
notices.
c. VolumeLicenses. I f theSoftwareis licensedwith volumelicense termsspecifiedin the a pplicable
price list o r product packaging for the Software, yo u may make, u se and install as ma ny
additional copies of the So ftware on the number of Client Devices as the volume license
authorizes. You must have a reasonable mechanism in place to ensure that the number of C lient
Devices on which the Software has been installed does not ex ceed the number of licen ses you
have obtained. This license authorizes you to make or download one copy of the Documentation
for each additional copy authorized by the volume license, provided that each such copy contains
all of the Documentation's proprietary notices.
2. Term . This Agreement is effective for an unlimited duration unless and u ntil earlier t erminated as
set forth herein. This Agreement w ill terminate automatically if you fail to c omply w ith any o f the
limitations or other requirements described herein. Upon an y termination or expiration of this
Agreement,you mu st destroyallcopies of the Softwareand the Docu mentation. You may terminate
this Agreement at any point by destroying all copies of the Software and the Documentation.
3. Updates. F or the time period specified in the applicable price list or pro duct packaging for the
Software you are entitled to download revisions or updates to the Software when and as McAfee
publishes them via its electronic bulletin board sy stem, website or through other online services.
For a period of ninety (90) days from the date of the original p urchase o f the S oftware, you are
entitled to download one (1) revision or upgrade to the Software when and as McAfee publishes it
via its electronic bulletin board system, website or through other online services. After the specified
time period, you have no further rights to receiv e any revisions or upgrades withou t purchase o f a
new license or annual u pgrade plan to the Software.
4. Ownership Ri gh ts. The Software is protected by United States copyright laws and international
treaty provisions. McAfee and its s u ppliers o wn and retain all r igh t, title and interest in an d to the
Software, including all copyrights, patents, trade secret rights, trademarks and other intellectu al
property rights therein. Your possession, installation, or use of the Software does not transfer to you
any title to the intellectu al property in the Software, an d you will not acquire any rights to the
Software except as expressly set forth in this Agreement. A ll copies of the S oftware and
Documentation made hereunder must contain the same proprietary notices t hat appear o n and in
the Software and Documentation.
User’s Guide iii
5. Restrictions. You m ay not rent, lease, loan or resell the Software. You may not permit
third parties t o b enefit from the use or functio nality of th e S oft ware v ia a t imesharing,
service bureau or other ar rangement, except to the extent su ch use is specified in the
applicable list price or product packaging for the Software. You may not transfer any of
the rights gr anted t o y ou under this Agr eement. You may n ot r everse engineer,
decompile, or d isassemb le the Software, except to the extent the foregoing restriction is
expressly prohibited by applicable law. You may not modify, or create derivative works
based upon, the Software in whole or in part. You may not copy the Software or
Documentati on except as expressly per m itted in Sec tion 1 above. You m ay not r emove
any proprietary notices or labels on the Software. All rights not expressly set forth
hereunder a r e reserved by Mc Afee. McAfee reserves the right to per iodically conduct
audits upon advance written noti ce to verify compliance with the terms of this
Agreement.
6. Warranty an d Disclaimer
a. Limited War ranty . McAfee warrants that for sixty (60) days from the date of original
purchasethe media(e.g., diskettes)on whichthe Software is contained willbe free from
defects in ma terials and workmanship .
b. Customer Remedies. McAfee' s and it s supplie rs ' entire liabil ity and your exclusive
remedy for any breach of the fo regoing war ranty shall be, at McAfee's option, either (i)
return o f the purchase pr ice paid for the license, if a ny , or (ii) replacem ent of the
defective media in which the So ftware is contained. You must return the defect ive
media to McAfee at your expense with a copy of your receipt. This limited warranty is
void if the defect has resulted from acci dent, abuse, o r m isapplication.Any r eplacement
media will be warranted for the remainder of the original warranty pe riod. O utside the
United States, this remedy is not available to the extent M cAfee is subject to restrictions
under United States export control laws and regulations.
c. W arranty D isclaimer. Except for the li mited warranty set forth herein, THE
SOFTWARE IS PROVIDED "AS IS." TO THE MAXIMUM EXTENT PERMITTED BY
APPLICABLE LAW, MCAFEE DISCLAIM S ALL WARRANTIES, EITHER EXPRESS
OR IMPLIED, INCLUDING BUT NOT LIMITED TO IMPLIED WARRANTIES OF
MERCH ANTABIL ITY, FITNESS FOR A PARTICULAR PURPOSE, AND
NONINFRINGEMENT WITH RESPECT TO THE SOFTWARE AND THE
ACCOMPANYING DOCUMENTATION. YOU ASSUME RESPONSIBILITY FOR
SELECTINGTHE SOFTWARETO ACHIEV EYOURINTENDED RESULTS,AND FOR
TH E INSTALLATION OF, USE OF, AND RESULTS OBTAINED FROM THE
SOFTWARE. W ITHOUT LIMITING THE FOREGOING PROVISIONS, MCAFEE
MA KES N O WAR RA NT Y THAT THE SOFTW ARE WILL BE ERROR-FRE E OR FR EE
FROM INTERRUPTIONS OR OTHER FAILURES OR THAT THE SOFTWARE WILL
MEET YOUR REQUIREMENTS. SOME STATES AND JURISDICTIONS DO NOT
AL LOW LIMITATIONS ON IMPLIED WARRANTIES, S O THE ABOVE LIMITATION
MAY NOT APPLY TO YOU. The foregoing provisions s hall be enforceable to the
maximum extent perm itted by applicable law .
iv McAfee Office
7. Limitation of L iability. UNDER NO CIRCUMSTANCES AND UNDER NO LEGAL
THEORY, WHETHER IN TORT, CONTRACT, OR OTHERWISE, SHALL MCAFEE OR
IT S SUPPLIERS BE LIABLE TO YOU OR TO ANY OTHER PERSON FOR ANY
INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES OF ANY
CHARACTER INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF
GOODWILL, WORKSTOPPAGE,COMPUTER FAILUREOR MALFUNCTION, OR FOR
ANY AND ALL OTHER DAMAGES OR LOSSES. IN NO EVENT W ILL M CAFEE BE
LIABLE FOR A NY DAMAGES IN EXCESS OF THE LIST P RICE MCAFEE CHARGES
FOR A LICENSE TO THE SOFTWARE, EVEN IF MCAFEE SHALL HAVE BEEN
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. THIS L IMITATION OF
LIABILITY SHALL NOT APPLY TO LIABILITY FOR DEATH OR PERSONAL INJURY
TO THE EXTENT THAT APPLICABLE LAW PROHIBITS SUCH LIMITATION.
FU RTH ERMORE, SOME STAT ES AND JURISDICTIONS DO NOT ALLOW THE
EXCLUSION OR L IMITATION OF INCIDE NTAL OR CONS EQUENTIA L DAMAGES ,
SO THIS LIMITATION AND EXCLUSION M AY NOT APPLY TO YOU. The foregoing
provisi ons shall be en forceable to the maximum extent permitted by applicable law.
8. United StatesGovern ment.TheSoftware andaccompanyingD ocumentationare deemed
to be "commercial c omputer software" and "commercial computer software
documen tation," respectively, pursuant to DFAR Section 227.7202 and FAR Section
12.212, as appli cable. A ny us e, mo dificati on, reproduction, release, performance, d isplay
or disclosure of the Software and accompanying Documentation by the United States
Government shall be governed s olely by the terms of this Agreement and shall be
prohibited except to the extent exp ressly permitted by the t erms of this Agreement.
9. Export Controls. Neither t he Softw are nor the Documentation and under lying
inform at ion o r technology may be downloaded or otherwise exported or re-exported (i)
into (or to a national or resident of ) Cuba, Iran, Iraq, Libya, North Korea, Sudan, Syria or
any other country to which the U nited States has embargoed goods; or (ii) to anyone on
the U nited States Treasury Department's list of Special ly Designated N ations or th e
United States Commerce Department's Table of Denial O rders. By dow nloading or using
the Software you are agreeing to the foregoing and y ou are certifying th at you are not
located in, under the cont ro l of, or a na tional or r esident of any such country or on any
such list.
IN ADDITION, YOU SHOULD BE AWARE OF THE FOLLOWING: EXPORT OF THE
SOFTWARE MAY BE SUBJECT TO COMPLIANCE WITH THE RULES AND
REGULATIONS PROMULGATED FROM TIME TO TIME BY THE BUREAU OF
EXPORT ADMINISTRATION, UNITED STATES DEPARTMENT OF COMMERCE,
WHIC H RESTRICT THE EXPORT AND RE-EXPORT OF CERTA IN PRODUCTS A ND
TECHNICAL DATA. IF THE EXPORT OF THE SOFTWARE IS CONTROLLED UNDER
SUCH RULES AND REGULATIONS, THEN THE SOFTWARE SHALL NOT BE
EXPORTED OR RE-E XPORT ED, DIRECTLY O R INDIRECTLY, (A) W ITH OUT A LL
EXPORT OR RE-EXPORT LICENSES AND UNITED STATES OR OTHER
GOVERNMENTAL APPROVALS REQUIRED BY ANY APPLICABLE LAWS, OR (B) IN
VIO LATION OF ANY APPLIC ABLE PROHIBITION AGAINST THE EXPORT O R
RE-EXPORT OF ANY PART OF THE SOFTW ARE.
User’s Guide v
SOME COUNTRIES HAVE RESTRICTIONS ON THE USE OF ENCRYPTION WITHIN
THEIR BORD ERS, OR THE IMPORT OR EXPORT OF ENCRYPTION EVEN IF FOR
ONLY TEMPORARY PERSONAL OR BUSINESS USE. YOU ACKNOWLEDGE THAT
THE IMPLEMENTATION AND ENFORCEMENT OF THESE LAWS IS NOT ALWAYS
CONSISTENT A S TO SPECIFIC COUNTRIES. ALTHOUGH THE FOLLOWING
COUNTRIES ARE N OT AN EXHAUSTIVE L IST T HERE MAY EXIST RESTRICTION S
ON THE EXPORTATION TO, OR IMPORTATION OF, ENCRYPTION BY: BELGIUM,
CHINA (INCLU DING HONG KONG), FRANCE , INDIA, IN DONE SIA, ISRAEL,
RUS SIA, SAUD I ARABIA, SIN GAPORE, AND SOUTH KO REA. YOU
ACKNOW LEDG E IT IS YOUR ULT IMATE RESPONSIBIL ITY TO COM PLY WITH ANY
AND ALL GOVERNMENT EXPORT AND OTHER APPLICABLE LAWS AND THAT
MC AFEE HAS NO FURTHER RESPONSIBILITY AFTER THE INITIAL SALE TO YOU
WITHIN THE ORIGINAL COUNTRY OF SALE.
10.High Ris k Ac tivities. T he S oft ware is not fault-to le ra nt and is no t designed or intended
for use in hazardous environments requiring fail -safe performance, including without
limitation, in the operation of nuclear faci lities , air craft navigation or c ommunication
systems, air t raffic c o ntrol, weapons systems, d irect life-support machines, or an y other
application in w hich the failure of the Software cou ld lead dir ectly to death, personal
injury, or severe physical or pr ope rt y d amage (collectively, "H igh Risk Activities").
McAf ee e xpressly disclaims any expres s or implied wa rranty of fi tness for High Risk
Activities.
11.Miscellaneous. This Agreement is governed by the laws of the United States and the State
of California, without reference to conflict of laws principles. The ap plication of the
United Nations Convention of C ontracts for the International Sale of Goods is expressly
excluded. T his Agreement sets forth all rights for the user of the Software and is the en tire
agreement between the parties. This A greement supersedes any other comm unications
with respect to the Software and Documentation. This Agreement may not be modified
except by a written ad dendum issued by a duly authorized represent ative o f McAfee. N o
provision hereof s hall be deemed waived unless such waiver shall be in writing and
signed by McAfee or a duly authorized representative of McAfee. If any provision of this
Agreem e nt is hel d invalid , the r e mainde r of this Agreement shall continue in full f orce
and effect. The parties confirm that it is their w ish that this Ag reement has been w ritten
in the En glish langua ge only.
12.McAfee Customer Con tact. If you have any questions concerning these terms and
cond ition s, or if you w ould like to contact McAfee for any other reason, please call (408)
988-3832, fax (408)970-9727, or write: McAfee Software,3965 Freedom Circle, SantaC lara,
California 95054. http://www.mcafee.com.
Statements made to you in the course of this sale are subject to the Year 2000 Information
and R eadiness Disclosure Act (Public Law 105-271). In th e case of a dispute, this Act may
reduce your legal r ights regarding the use of any s tatements r egardi ng Year 2000
readiness, unless otherwise specified in your contract or tariff.
vi McAfee Office
User’s Guide vii
Table of Contents
Chapter1. WelcometoMcAfeeOffice...........................15
Programsandfeatures............................................15
Centralinterface.............................................15
McAfeeVirusScan ...........................................16
McAfeeUtilities..............................................16
McAfeeUnInstaller...........................................17
McAfeeInternetGuardDog....................................18
McAfeeFirewall .............................................19
McAfeePGPPersonalPrivacy .................................19
Otherfeatures ...................................................20
McAfeeVirtualOffice .........................................20
McAfeeontheWeb ..........................................20
McAfeeWebView............................................20
Improvements ...................................................21
Wheretogoformoreinformation...................................21
Chapter2. InstallatingMcAfeeOffice ...........................23
Systemrequirements .............................................23
Individualproductrequirements ...............................23
Installation......................................................24
Chapter3. McAfeeVirusScan..................................27
HowdoesVirusScansoftwarework?................................27
WhatcomeswithVirusScansoftware? ..............................27
WhatsnewwithVirusScan? .......................................31
StartingtheVirusScanapplication ..................................33
DisplayingtheVirusScanapplicationmainwindow................33
Ifyoususpectyouhaveavirus... ...................................37
WhatdoestheVShieldscannerdo?.................................40
WhyusetheVShieldscanner?.................................41
Browserande-mailclientsupport ..............................42
EnablingorstartingtheVShieldscanner.............................42
Table of Contents
viii McAfee Office
UsingtheVShieldconfigurationwizard ..............................47
UsingtheVShieldshortcutmenu ...................................51
Chapter 4. McAfee Utilities . . . .................................53
McAfeeUtilitiescentralwindow ....................................53
McAfeeUtilitiesProperties ........................................54
CommonDialogstab .........................................54
IconAnimationtab...........................................54
WindowPatternstab .........................................55
DiskToolstab...............................................55
StartMenutab ..............................................56
TrashGuardtab .............................................56
FileShreddertab ............................................57
QuickCopytab..............................................57
ZipFileManagertab..........................................58
RepairandRecover ..............................................58
DiskMinder.................................................58
UsingDiskMinder .......................................58
CustomizingDiskMinderProperties........................60
CreatingandrevertingtoanUndofile ......................61
UsingDiskMinderinDOS ................................61
McAfeeImage...............................................62
CreatinganImageofyourdisks ...........................62
SettingImageProperties .................................63
RestoringdrivesfromanImagefile.........................63
RescueDisk ................................................65
UsingaRescueDisk .....................................66
DiskMinderinDOS ......................................66
FirstAid....................................................66
Using CheckUp .........................................66
UsingUniversalUndo ....................................68
UsingAskAdvisor.......................................70
CreatingaRescueDisk...................................70
DiscoverPro ................................................71
DiscoverProwindow ....................................71
User’s Guide ix
Table of Contents
Workingwithadvancedinformation ........................72
SpecifyingDiscoverProsettings...........................74
Usingthemulti-windowviews .............................74
Undelete ...................................................75
CleanandOptimize...............................................76
CleanupWizard .............................................76
DiskTune ..................................................76
UsingDiskTunetodefragmentorconsolidateadisk..........77
Theharddiskmap.......................................78
Settingadvancedoptions.................................78
Specifyingfilecategories .................................80
RegistryWizard .............................................82
Backing up & Restoring the Registry .......................83
CleaningtheRegistry ....................................84
RepairingtheRegistry ...................................84
TuninguptheRegistry ...................................85
RegistryPro ................................................86
FindingaRegistryentry ..................................86
Findingorphans.........................................87
EditingaRegistryentry ..................................87
ImportingaRegistryfile ..................................87
ExportingaRegistryfile ..................................87
RefreshingtheRegistrydatabase ..........................87
LaunchRocket ..............................................88
QuickCopy .................................................88
ShortcutWizard .............................................89
Prevent and Protect . . . ...........................................89
CrashProtector .............................................89
RecoveringfromanApplicationError.......................89
Recovering a crashed, locked-up, or hung application .........90
SelectingCrashProtectorProperties .......................91
Deactivating Crash Protector ..............................92
WinGauge ..................................................93
Themostimportantgauges ...............................93
Workingwithgauges.....................................94
Table of Contents
x McAfee Office
ManipulatingtheWinGaugewindow ........................95
ChangingWinGaugeproperties............................97
Savingandloadinggaugesettings ........................101
VirusScan .................................................102
TrashGuard ...............................................102
SpecifyingTrashGuardProperties ........................102
Safe&Sound ..............................................103
RegularbackupswithSafe&Sound .......................103
Creatingautomaticbackups..............................104
Definingyourbackupstrategy............................104
Creating a backup set ...................................105
Restoringfilesfromabackupset .........................108
Modifyingordeletingbackupsets.........................109
Repairingandrebuildingabackupset .....................110
SecureandManage .............................................111
EZSetup ..................................................111
Systemtab ............................................111
Explorertab ...........................................113
Run/Add/Removetab ...................................115
SendTotab ...........................................116
ContextMenutab.......................................116
LaunchPad................................................117
StartingLaunchPad ....................................118
Adding,updating,andremovingicons.....................118
ManipulatingtheLaunchPadwindow......................118
PGP ..........................................................119
UsingPGP.................................................120
Tocreateakeypair.....................................120
Encryptingemailsandfiles ..............................121
Decryptingemailsandfiles ..............................122
PGPdisk...................................................122
CreatinganewPGPdiskvolume ..........................123
Add/RemovePublicKeys ................................124
McAfeeShredder ...........................................125
Shreddingselectedfiles .................................125
User’s Guide xi
Table of Contents
Shreddingnon-filedata..................................127
McAfeeZipManager ........................................127
ZipFiles ..............................................128
UsingZipManWizard ...................................128
SelectingMcAfeeZipManagerproperties ..................129
Extracting,archiving,oraddingfiles.......................131
Buildingself-extractingarchives..........................131
SwitchingbetweentheWizardandMcAfeeZipManager ......131
UsingAdvancedMcAfeeZipManager......................131
McAfeeOilChange..........................................133
Chapter5. McAfeeFirewall...................................135
AboutMcAfeeFirewall ...........................................135
HowMcAfeeFirewallworks.......................................135
AboutWinsock2................................................136
ConfiguringMcAfeeFirewall ......................................136
Applications ...............................................137
Controlapplications ....................................137
Defaultsettingsforapplications ..........................137
Systems...................................................138
Control system .........................................138
DefaultsettingsforSystemactivity........................138
Password Protection ....................................139
InstructionsforAdministrators....................................139
ConfiguringNetwork,DisplayandLoggingControls..............139
NetworkControl........................................139
DisplayControl ........................................140
LoggingControl........................................140
ConfiguringApplications ....................................140
ConfiguringSystemSettings .................................141
ConfigurationafterAdding/RemovingNetworkDevices ...........142
Using Password Protection ...................................142
Chapter6. McAfeeUnInstaller ................................145
UsingMcAfeeUnInstaller.........................................145
Table of Contents
xii McAfee Office
CreatingtheSmartLinksdatabase .............................145
CustomizationInterview .....................................146
UnInstallerwizards..........................................146
AboutPowerClean ..........................................148
AboutMcAfeeGuardian .....................................148
UsingQuickClean ...............................................150
HowdoIsetupQuickCleantorunautomatically?................150
HowdoIscheduleQuickCleantorunataspecifictime? ..........151
Using SpaceMaker ..............................................151
UsingRemove..................................................152
UsingTransport ................................................153
How do I rebuild a transported application on another computer? . .153
UsingArchive ..................................................154
UsingMove ....................................................155
UsingBackTrack................................................156
How do I set BackTrack Monitor to run in the background? ........156
HowdoImonitorinstallationofasingleapplication?.............157
HowdoIundoanapplicationinstallationthatImonitored?........157
UsingRestore ..................................................158
HowdoIrestoredeletedfiles?................................159
UsingPowerClean ..............................................160
WhydoesthePowerCleanfeatureopeninread-onlymode? .......161
PowerCleanmenus .........................................165
Usingthetabpanes?........................................166
Whatdothecolorcodesmean? ..........................166
ChangingthedefaultsforthePowerCleanfeature................167
ViewingchangesdoneusingthePowerCleanfeature ........168
AboutReportsdialogbox ........................................168
Chapter7. McAfeeInternetGuardDog .........................171
HowInternetGuardDogworks ....................................171
UserSetup ................................................171
VirusScan .................................................171
ActivityLogs ..............................................172
SecurityCheck .............................................172
User’s Guide xiii
Table of Contents
InternetGuardDogandyouronlineconnection ......................172
InternetGuardDogfeatures ......................................172
Protection from privacy threats . . .............................173
Protection from security threats . .............................173
Protectionfromvirusthreats .................................174
UsingtheInternetGuardDogInterview .............................174
HowInternetGuardDogAdministratorworks........................175
Self-Administrator ..........................................176
How password protection works in Guard Dog ......................176
UsingtheInternetGuardDogHomescreen .........................176
HowUserSetupworks ......................................177
UserProfile............................................178
HowInternetFilteringworks .................................178
Internetfiltering ........................................178
ViewingActivityLogs .......................................179
PerformingaSecurityCheck .................................180
Responding to Product Name alert messages . . .................180
Using Browser Buddy to retrieve or store your Web site passwords 181
Privacy features ................................................183
What Cookie Blocker does ...................................183
WhatIdentityProtectordoes .................................184
WhatWebTrailCleanerdoes .................................185
WhatSearchFilterdoes .....................................185
Securityfeatures................................................185
What Gatekeeper does . . ....................................185
WhatFileGuardiandoes .....................................186
WhatPasswordManagerdoes ...............................187
Chapter 8. PGP Personal Privacy . . . ...........................189
Using PGP Personal Privacy . . ....................................189
BasicstepsforusingPGPPersonalPrivacy ....................190
Running PGP Personal Privacy ....................................191
FromtheSystemtray........................................192
PerformingPGPfunctionsfromtheclipboard ...............192
OpeningthePGPkeyswindow............................192
Table of Contents
xiv McAfee Office
SettingPGPPreferences ................................192
GettingHelp ...........................................193
QuittingPGP ..........................................193
Fromsupportedemailapplications ............................193
UsingPGP/MIME .......................................194
FromtheWindowsExplorer ..................................194
Selectingrecipients.....................................194
Takingshortcuts .......................................195
FromthePGPtoolsapplication................................195
PGPdisk .......................................................195
CreatinganewPGPdiskvolume ..............................196
Changing a passphrase . . ....................................197
Add/RemovePublicKeys ....................................198
AppendixA. ProductSupport.................................199
Customerservice ...........................................199
Technicalsupport ..........................................200
Supportviatheweb.....................................200
Telephonesupportnumbers .............................200
Index......................................................201
1
User’s Guide 15
1Welcome to McAfee Office
Thankyou fo r purchasi ngM cAfee O ffice—a suite o f pow erful and easy-t o-use
W indow s software utilities that he lps keep your PC working at optimu m
efficien cy and speed, as well as diagnosing, repairing, and protecting your PC
and its valuable data.
McAfe e Office contains a suite o f ut ility p ro grams that provid e yo u with
diagnostic, preventive, and security tools to help maintain your PC’s health
and well- b eing. Use McAfe e Office ut ilities together, or indiv idually, to
protect your PC from viru ses, ensure privacy of your PC’s data files, and
improve overall per formance of yo ur computer.
Programs and features
Central interface
Through a centr al interface, McAfe e Office improv s integration w ith the
individual components of the product suite. For example, instead of launching
a separate Mc Af e e Util ities m ain menu, a user can access all functio ns of
McAf ee Utilities directly from t he McAfee Off ice Central interface.
Figure 1-1. McAfee Office main window
Welcome to McAfee Office
16 McAfee Office
McAfee VirusScan
McAfee Vi rusScan provides complete desktop protection with an array of
scanning features that keep your system c lean, mean, and v irus-free. Using
onlythe latest t echnolog y,VirusScan detects 100% of viruses including floppy
disks, Internet downloads, email attachments, Intranets, shared files,
CD-ROM , and online services (even inside t he mos t popular c ompressed file
types).
Hunter, VirusScan’s award-winning scann ing engine, includes
ground-breaking variant detection and heuristic technology that detects
even new unknow n ma cr o viruses before the y have a chance to infli ct
damage.
SecureCast ensures that your virus signature files are always the latest.
New updates are pushed d irectly to your desktop the moment t hey are
released.
AVERT (Anti-Virus Emergency Research T eam) staffs more than 85
experiencedv irusr esearchersaroundthew orld,providingc ustomerswith
unparalleled follow-the-sun support. AVERT even makes hourly beta
virus signat u re files available to all custom e rs 24 hours a day.
McAfee Utilities
McAfe e Util ities helps you keep your PC working at op timum effic ie ncy and
speed. Y ou can diagnose and r epair your s ystem and application software;
create a recovery di sk and image snapshots of critical sec tors of your h ard
drives; a void lost data during application crashes; create backup sets
automatically or interactively; back up to a protected volume file, which
makes your data recoverable when it otherwise would not be.
From t he moment you install M cAfe e Utilities, it begins protecting your PC.
First, by helping create a recovery disk that you can u se if problems arise.
Second , by activating Bomb Shelter, which immediately protects you against
losing unsavedinformation in the event that an application crashes. Next,y ou
can create a backup set of your v aluable data w ith Safe & Sound.
After repairing and protecting your system, you’re ready to u se other Mc Afee
Utilit ies to clean and optimize, prevent a nd protec t, a nd secure and ma nage
information.
McAfee U tilities c an diagnose, repair, and protect your system in the
followin g ways :
D isc ove r shows a weal th of information about you r h ardware and
software.Italsoletsyourundiagnosticsandbenchmarktests.
User’s Guide 17
Welcome to McAfee Office
Disk Minder safely, e asily, and quickly diagnoses and repairs existing or
potential disk problems.
McAfee Image saves a copy of critical disk information in a file a nd
restores the image later if your disk is corrupted.
Re gistry Wi zard allows you to e asily m aintain, troubleshoot, or repair the
Registry d atabase.
Rescue Disk creates a custom rescue disk that you can use to boot up your
PC and begin recovery if you can’t start from the sy stem hard d rive.
•FirstAidquickly examines areas of you r computer for any problems that
can b e a utomatically fixed a t the click of a button.
Safe & Sound l ets you create automatic or interactive backups of selected
drives, directories, files, or file types. You can b ack u p to a protected
volume file (a separate area on the drive).
NOTE:A p rotected vol u me file conta ins inf or matio n about each file
in every sector to ensure that files can be recovered ev en if the har d
drive’s directories and data are severely damaged or lost. You can
also create mirror backups that instantly backup data asyousave it,
make backups after a time delay w hen the PC is id le, or create
manual backups.
Trash Guard pr otects all the files you d elete, by send ing them to t he
Recycle Bin.
Undelete lets you recover files that you have d el eted.
McAfee UnInstaller
If yo u think y ou’re run ning out of roo m on yo ur PC and need t o buy a new
hard dr ive—think again! Did you kno w every time you v isit a w ebsite, useless
files a re left on your computer? R emnants of old files are sca tte red all over
your PC. It’s crammed with bits and pieces of old software and junk files that
can slow it down and cause problems—and that’s exactly the debris that
McAfee UnInst aller gets rid of.
Safe: UnInstaller safely d eletes Windows applications but never removes
critical system files, so you can clear you r PC with c omplete peace of mind.
Fast scanning speed: Scans your PC fo r u nwanted file s with thorough link
determina tio n cap ability.
One-click QuickClean: When time is of the ess ence, t his feature opens up
disk space immediately.
Welcome to McAfee Office
18 McAfee Office
Scheduled cleaning : S chedule UnInstaller t o automatica lly delete useless
filesatanytime,dayornight.
BackTrack: Restores and reconstructs your original setup after poor
program installations.
Customization interview: Notify U nInstaller what files are most
important to you, and it w ill never to uch them.
M ove s and archive s programs: Moves and archives applications to
anothe r fo lde r, drive, or co mputer—with all links intact.
Full anti-virus and p rivacy protection: Now UnInstaller includes
anti-virus software that can even eradicate hostile cookies, A ctiveX
contro ls, and Java applets.
McAfee Internet Guard Dog
McAfee Internet Guard Dog is d esigned to ensure that you can use a ll aspects
of the Internet without worr ying that your priv acy and computer secu rity w ill
be compromised.
Internet Guard D og provides security by:
Ch e cking yo u r comp u ter for p otential sec urit y risk and pr ivacy issues
allowing you t o fix these problems before data is d amaged or your pr ivacy
compromised. It checks:
ProgramsthathaveaccessedtotheInternet.
Sensitive data such as financial files and the programs that access
these files.
V iruses that can d amage th e data on your computer or even go so
farastoreformatyourharddisk.
A ctiveX control an d Jav a applets that may or may not perform
da nge rous a ctions on your computer.
Alerting you of potential harmful events that will threaten your privacy
andsecurity.SomeoftheeventsthattriggersGuardDogtoalertyou
include :
U nwarranted intrusion from other so urces on the Internet.
Programs on y our computer th at p ass sensitive data to other sites.
W eb sites that send cookies t o your computer as you use the
Internet.
User’s Guide 19
Welcome to McAfee Office
McAfee Firewall
McAfee F irewall is a personal firewall that lets you monitor, control and log
your PC 's netw ork activity. It protects you from Inter net hackers and keeps
your PC private.
McAfeeFirewallfilterstrafficatthedevicesthatyoursystemuses-network
cards and mode ms. T his means that it can reject inbound traffic before that
traffic can reach vital fun ctions in your PC and before it c an w aste valuable
system resources.
It monitor s applications that ar e either trusted or not truste d. Whe n truste d
applications need to access a netw ork, it m anages everything in the c omputer
to allow that app lica tio n's t ra ffic. When it detects non-tr usted applications
trying to access a network, it blocks all traffic to and from that application.
McAfee PGP Personal Privacy
McAf e e PGP Perso nal Privacy protects the privacy of your email messages
and files via encryption so that only the intended recipients can read them.
You can also digitally signed messages an d files ensuring its authen ticity and
verifying that information has not been tampered in any way.
Features of the McAfee PGP Personal Privacy include:
P hotographic User ID. You can add yourphotographto your public k ey.
When you r Photo ID is signed, it provides additional information when
verifying your key.
PGPdisk Functionality. This encrypti on application enables you to set
as ide an area of disk space for s toring your sensitive or p e rsonal data.
S ignature Verification. When signat u res colle cte d on keys are
automatically verified when added to y our ring, this feature allows you
to reverify signatures for added security.
U nknown Recipient or Signer Server Lookup. When decrypting o r
verify ing a message, you can automatically perform a server lookup via
this feature. PGP sc ans all the k eys which the m essage is encrypted to or
sign ed by to determine the identity of the reci pient or signer.
Welcome to McAfee Office
20 McAfee Office
Other features
McAfee Virtual Office
McAfe e o f f e rs full featur e d web sites with unequale d ease of use. N o HTML
or design experien ce is required to create your multi-page site. Select the
McAfee Ultra W eb Site, which has both business and personal templates, as
wellasreal-timecommunication features suchaschatandfil eexchange, or the
free McAfee B asic Web Site.
Your fr ee McAfee Basic Web Site includes five pages—Home, Con tact In fo,
Pictur e s, Links and My Stu ff—to p ro vide information to your friends,
colleagues,family.And yo ur site co mes with web-based em ailso you can keep
in touch from anywhere on the web.
McAfee on the Web
McAfee.com unveiled a new web site with a host of new services and online
app lications de dicated to up da ting, upgrading, and managing P Cs ov e r the
web. McAfee.com provides personalized PC management.
The site delivers Internet-based software services for both the novice and
expert us er - to defend, diagnose, and repair their PCs.
McAfee.com provides e-software to seamlessly blend the power of the onli ne
computer, the u biquity of the Internet, and the rich ness of the Web to furn ish
visually appealing, b rowser-based, versionless software applications that can
be accessed at anytime from anywhere via the In ternet. This new w ave of
Internet tech nology is focused on targeted, personalized customer services.
By design, McAfee.com protects the security and respects the privacy of its
online community. Users are assured that McAfee.com records their
reg istration information only. As a subsidiary of N etwork Associates, the
world leader in network security, McAfee.com understands its customers'
pri vacy concerns and has taken extreme precauti ons to ensure the integrity of
the services provided.
McAfee Web View
This brow ser, powered by Neoplanet, enables yo u to control how you
experience t he Web, makin g navigation faster and more intuitive. With
McAfee W eb View: you can create your o wn visual and a udio backgroun ds;
accesssiteswithouttypingentire U RLaddress; anddownloadfaster,graphics
and files using the Modem Speed B ooster. You can also sign up t o get FRE E
email.
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23
  • Page 24 24
  • Page 25 25
  • Page 26 26
  • Page 27 27
  • Page 28 28
  • Page 29 29
  • Page 30 30
  • Page 31 31
  • Page 32 32
  • Page 33 33
  • Page 34 34
  • Page 35 35
  • Page 36 36
  • Page 37 37
  • Page 38 38
  • Page 39 39
  • Page 40 40
  • Page 41 41
  • Page 42 42
  • Page 43 43
  • Page 44 44
  • Page 45 45
  • Page 46 46
  • Page 47 47
  • Page 48 48
  • Page 49 49
  • Page 50 50
  • Page 51 51
  • Page 52 52
  • Page 53 53
  • Page 54 54
  • Page 55 55
  • Page 56 56
  • Page 57 57
  • Page 58 58
  • Page 59 59
  • Page 60 60
  • Page 61 61
  • Page 62 62
  • Page 63 63
  • Page 64 64
  • Page 65 65
  • Page 66 66
  • Page 67 67
  • Page 68 68
  • Page 69 69
  • Page 70 70
  • Page 71 71
  • Page 72 72
  • Page 73 73
  • Page 74 74
  • Page 75 75
  • Page 76 76
  • Page 77 77
  • Page 78 78
  • Page 79 79
  • Page 80 80
  • Page 81 81
  • Page 82 82
  • Page 83 83
  • Page 84 84
  • Page 85 85
  • Page 86 86
  • Page 87 87
  • Page 88 88
  • Page 89 89
  • Page 90 90
  • Page 91 91
  • Page 92 92
  • Page 93 93
  • Page 94 94
  • Page 95 95
  • Page 96 96
  • Page 97 97
  • Page 98 98
  • Page 99 99
  • Page 100 100
  • Page 101 101
  • Page 102 102
  • Page 103 103
  • Page 104 104
  • Page 105 105
  • Page 106 106
  • Page 107 107
  • Page 108 108
  • Page 109 109
  • Page 110 110
  • Page 111 111
  • Page 112 112
  • Page 113 113
  • Page 114 114
  • Page 115 115
  • Page 116 116
  • Page 117 117
  • Page 118 118
  • Page 119 119
  • Page 120 120
  • Page 121 121
  • Page 122 122
  • Page 123 123
  • Page 124 124
  • Page 125 125
  • Page 126 126
  • Page 127 127
  • Page 128 128
  • Page 129 129
  • Page 130 130
  • Page 131 131
  • Page 132 132
  • Page 133 133
  • Page 134 134
  • Page 135 135
  • Page 136 136
  • Page 137 137
  • Page 138 138
  • Page 139 139
  • Page 140 140
  • Page 141 141
  • Page 142 142
  • Page 143 143
  • Page 144 144
  • Page 145 145
  • Page 146 146
  • Page 147 147
  • Page 148 148
  • Page 149 149
  • Page 150 150
  • Page 151 151
  • Page 152 152
  • Page 153 153
  • Page 154 154
  • Page 155 155
  • Page 156 156
  • Page 157 157
  • Page 158 158
  • Page 159 159
  • Page 160 160
  • Page 161 161
  • Page 162 162
  • Page 163 163
  • Page 164 164
  • Page 165 165
  • Page 166 166
  • Page 167 167
  • Page 168 168
  • Page 169 169
  • Page 170 170
  • Page 171 171
  • Page 172 172
  • Page 173 173
  • Page 174 174
  • Page 175 175
  • Page 176 176
  • Page 177 177
  • Page 178 178
  • Page 179 179
  • Page 180 180
  • Page 181 181
  • Page 182 182
  • Page 183 183
  • Page 184 184
  • Page 185 185
  • Page 186 186
  • Page 187 187
  • Page 188 188
  • Page 189 189
  • Page 190 190
  • Page 191 191
  • Page 192 192
  • Page 193 193
  • Page 194 194
  • Page 195 195
  • Page 196 196
  • Page 197 197
  • Page 198 198
  • Page 199 199
  • Page 200 200
  • Page 201 201
  • Page 202 202
  • Page 203 203
  • Page 204 204
  • Page 205 205
  • Page 206 206
  • Page 207 207
  • Page 208 208
  • Page 209 209
  • Page 210 210

McAfee OFFICE 3.1 User manual

Category
Software
Type
User manual

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI