McAfee MIS08EMB3RUA User Guide

McAfee MIS08EMB3RUA - Internet Security Suite 2008 Manual

McAfee MIS08EMB3RUA manual content summary:

  • McAfee MIS08EMB3RUA | User Guide - Page 1
    User Guide
  • McAfee MIS08EMB3RUA | User Guide - Page 2
  • McAfee MIS08EMB3RUA | User Guide - Page 3
    McAfee Internet Security 3 McAfee SecurityCenter...5 SecurityCenter features 6 Using SecurityCenter 7 Updating SecurityCenter 13 Fixing or ignoring protection problems 17 Working with alerts 21 Viewing events...27 McAfee VirusScan ...29 VirusScan features 30 Starting real-time virus
  • McAfee MIS08EMB3RUA | User Guide - Page 4
    up a managed network 201 Managing the network remotely 209 McAfee EasyNetwork...215 EasyNetwork features 216 Setting up EasyNetwork 217 Sharing 233 About McAfee 247 Copyright ...247 License ...248 Customer and Technical Support 249 Using McAfee Virtual Technician 250 Support and Downloads
  • McAfee MIS08EMB3RUA | User Guide - Page 5
    5 McAfee VirusScan 29 McAfee Personal Firewall 61 McAfee Anti-Spam 117 McAfee Privacy Service 145 McAfee Data Backup 167 McAfee QuickClean 181 McAfee Shredder 193 McAfee Network Manager 197 McAfee EasyNetwork 215 Reference 232 About McAfee 247 Customer and Technical Support 249
  • McAfee MIS08EMB3RUA | User Guide - Page 6
  • McAfee MIS08EMB3RUA | User Guide - Page 7
    review SecurityCenter events, such as virus scanning configuration changes, in an event log. Note: SecurityCenter reports critical and non-critical protection problems as soon as it detects them. If you need help diagnosing your protection problems, you can run McAfee Virtual Technician. In this
  • McAfee MIS08EMB3RUA | User Guide - Page 8
    . When a new version of a registered McAfee program is available, you get it at no charge while your subscription is valid, ensuring that you always have up-to-date protection. Real-time alerting Security alerts notify you of emergency virus outbreaks and security threats, and provide options to
  • McAfee MIS08EMB3RUA | User Guide - Page 9
    in this image, see Understanding protection status (page 8) and Understanding protection categories (page 9). Then, you can review your McAfee account information and verifying the validity of your subscription. In this chapter Understanding protection status 8 Understanding protection categories
  • McAfee MIS08EMB3RUA | User Guide - Page 10
    protection status area on the SecurityCenter Home pane is green and states that you are protected. SecurityCenter does not report any critical or non-critical security problems. Each protection category lists the services that are protecting your computer.
  • McAfee MIS08EMB3RUA | User Guide - Page 11
    Parental Controls. These categories help you to browse and configure the security services protecting your computer. You click a category name to configure its protection services and view any security problems detected for those services. If your computer's protection status is red or yellow, one
  • McAfee MIS08EMB3RUA | User Guide - Page 12
    McAfee Internet Security Understanding protection services Protection services are the core SecurityCenter components that you configure to protect your computer. Protection services directly correspond to McAfee programs. For example, when you install VirusScan, the following protection services
  • McAfee MIS08EMB3RUA | User Guide - Page 13
    Chapter 3 McAfee Internet Security 11 Managing your McAfee account Manage your McAfee account from within SecurityCenter by easily accessing and reviewing your account information and verifying your current subscription status. Note: If you installed your McAfee programs from a CD, you must register
  • McAfee MIS08EMB3RUA | User Guide - Page 14
  • McAfee MIS08EMB3RUA | User Guide - Page 15
    SecurityCenter SecurityCenter ensures that your registered McAfee programs are current by checking for and installing online updates every four hours. Depending on the programs you have installed and registered, online updates may include the latest virus definitions and hacker, spam, spyware, or
  • McAfee MIS08EMB3RUA | User Guide - Page 16
    McAfee Internet Security buttons: ƒ Install the updates automatically and notify me when my services are updated (recommended) ƒ Download the updates automatically and notify will not have the latest security protection. For information about checking for updates manually, see Check for updates (
  • McAfee MIS08EMB3RUA | User Guide - Page 17
    Chapter 4 McAfee Internet Security 15 1. Under Common Tasks, click Home. 2. On the right pane, under SecurityCenter Information, click Configure. 2 automatic updates by clicking the On button or by clearing Disable automatic updating and let me manually check for updates on the Update Options pane.
  • McAfee MIS08EMB3RUA | User Guide - Page 18
  • McAfee MIS08EMB3RUA | User Guide - Page 19
    status, you must fix all critical problems and either fix or ignore all non-critical problems. If you need help diagnosing your protection problems, you can run McAfee Virtual Technician. For more information about McAfee Virtual Technician, see the McAfee Virtual Technician help. In this chapter
  • McAfee MIS08EMB3RUA | User Guide - Page 20
    18 McAfee Internet Security Fixing protection problems Most security problems can be fixed automatically; however, some problems may require might take when fixing protection problems manually: Problem Action A full scan of your computer has Scan your computer manually. For not been performed
  • McAfee MIS08EMB3RUA | User Guide - Page 21
    Chapter 5 McAfee Internet Security 19 Ignoring protection problems If SecurityCenter detects a non-critical problem, you can either fix or ignore it. Other non-critical problems (for example, if Anti-Spam or Privacy Service are not installed) are automatically ignored. Ignored problems are not shown
  • McAfee MIS08EMB3RUA | User Guide - Page 22
  • McAfee MIS08EMB3RUA | User Guide - Page 23
    well as recommendations and options for resolving problems that may be associated with the event. Some alerts also contain links to additional information about the event. These links let you launch McAfee's global Web site or send information to McAfee for troubleshooting. There are three types of
  • McAfee MIS08EMB3RUA | User Guide - Page 24
    22 McAfee Internet Security Showing and hiding informational alerts Informational alerts notify you when events occur that do not pose threats to your computer's security. For example, if you have set up Firewall Protection, an informational alert appears by default whenever a program on your
  • McAfee MIS08EMB3RUA | User Guide - Page 25
    Chapter 6 McAfee Internet Security 23 Show or hide informational alerts when gaming You can hide informational alerts when you are playing a game in full-screen mode on your computer.
  • McAfee MIS08EMB3RUA | User Guide - Page 26
    starts. You can also hide alerts that notify you about virus outbreaks and other security threats in the online community. Play a sound with alerts check box. Hide the splash screen at startup By default, the McAfee splash screen appears briefly when Windows starts, notifying you that SecurityCenter
  • McAfee MIS08EMB3RUA | User Guide - Page 27
    Chapter 6 McAfee Internet Security 25 Hide virus outbreak alerts You can hide alerts that notify you about virus outbreaks and other security threats in the online community. 1 Open the Alert Options pane. How? 1. Under Common Tasks, click Home. 2. On the right pane, under SecurityCenter Information
  • McAfee MIS08EMB3RUA | User Guide - Page 28
  • McAfee MIS08EMB3RUA | User Guide - Page 29
    record different types of events. For example, SecurityCenter records an event if a protection service is enabled or disabled; Virus Protection records an event each time a virus is detected and removed; and Firewall Protection records an event each time an Internet connection attempt is blocked
  • McAfee MIS08EMB3RUA | User Guide - Page 30
  • McAfee MIS08EMB3RUA | User Guide - Page 31
    as it detects them. If you need help diagnosing your protection problems, you can run McAfee Virtual Technician. In this chapter VirusScan features 30 Starting real-time virus protection 31 Starting additional protection 33 Setting up virus protection 37 Scanning your computer 53 Working with
  • McAfee MIS08EMB3RUA | User Guide - Page 32
    30 McAfee Internet Security VirusScan features VirusScan provides the following features. Comprehensive virus protection VirusScan's advanced detection and protection services defend you and your computer from the latest security threats, including viruses, Trojans, tracking cookies, spyware,
  • McAfee MIS08EMB3RUA | User Guide - Page 33
    Chapter 8 McAfee Internet Security 31 Starting real-time virus protection VirusScan provides two types of virus protection: real-time and manual. Real-time virus protection constantly monitors your computer for virus activity, scanning files each time you or your computer access them. Manual virus
  • McAfee MIS08EMB3RUA | User Guide - Page 34
    32 McAfee Internet Security 1. On the left pane, click Advanced Menu. 2. Click Configure. 3. On the Configure pane, click Computer & Files. 2 Under Virus protection, click Off. 3 In the dialog box, select when to resume real-time scanning. 4 Click OK.
  • McAfee MIS08EMB3RUA | User Guide - Page 35
    virus protection, VirusScan provides advanced protection against scripts, spyware, and potentially harmful e-mail and instant message attachments. By default, script scanning messaging protection Instant messaging protection detects potential security threats from instant message attachments that you
  • McAfee MIS08EMB3RUA | User Guide - Page 36
    34 McAfee Internet Security Start script scanning protection Turn on script scanning protection to detect potentially harmful scripts and prevent them from running on your computer. Script scanning protection alerts you when a script tries to create, copy, or delete files on your computer, or make
  • McAfee MIS08EMB3RUA | User Guide - Page 37
    Chapter 9 McAfee Internet Security 35 1. On the left pane, click Advanced Menu. 2. Click Configure. 3. to e-mail threats. Start instant messaging protection Turn on instant messaging protection to detect security threats that can be included in inbound instant message attachments. 1 Open the E-mail
  • McAfee MIS08EMB3RUA | User Guide - Page 38
  • McAfee MIS08EMB3RUA | User Guide - Page 39
    37 CHAPTER 10 Setting up virus protection VirusScan provides two types of virus protection: real-time and manual. Real-time virus protection scans files each time you or your computer access them. Manual virus protection lets you scan files on demand. You can set different options for each type of
  • McAfee MIS08EMB3RUA | User Guide - Page 40
    38 McAfee Internet Security Setting real-time scan options When you start real-time virus protection, VirusScan uses a default set of options to scan files; however, you can change the default options to suit your needs. To change real-time scanning options, you must make decisions about what
  • McAfee MIS08EMB3RUA | User Guide - Page 41
    Chapter 10 McAfee Internet Security 39 To... Detect cookies Do this... Select the Scan and remove tracking cookies check box. Detect viruses and other potential threats on drives that are connected to your network Select the Scan network drives check box. Protect your computer from Select the
  • McAfee MIS08EMB3RUA | User Guide - Page 42
    40 McAfee Internet Security Setting manual scan options Manual virus protection lets you scan files on demand. When you start a manual scan, VirusScan checks your computer for viruses and other potentially harmful items using a more comprehensive set of scanning options. To change manual scanning
  • McAfee MIS08EMB3RUA | User Guide - Page 43
    Security 41 1. Under Common Tasks, click Home. 2. On the SecurityCenter Home pane, click Computer & Files. 3. In the Computer & Files information area, click Configure. 4. On the Computer & Files Configuration pane, ensure that virus protection is enabled, and click Advanced. 5. Click Manual Scan
  • McAfee MIS08EMB3RUA | User Guide - Page 44
    Security 1. Under Common Tasks, click Home. 2. On the SecurityCenter Home pane, click Computer & Files. 3. In the Computer & Files information area, click Configure. 4. On the Computer & Files Configuration pane, ensure that virus protection is enabled, and click Advanced. 5. Click Manual Scan
  • McAfee MIS08EMB3RUA | User Guide - Page 45
    Chapter 10 McAfee Internet Security 43 1. Under Common Tasks, click Home. 2. On the SecurityCenter Home pane, click Computer & Files. 3. In the Computer & Files information area, click Configure. 4. On the Computer & Files Configuration pane, ensure that virus protection is enabled, and click
  • McAfee MIS08EMB3RUA | User Guide - Page 46
    McAfee Internet Security Using SystemGuards options SystemGuards monitor, log, report, and manage potentially unauthorized changes made to the Windows registry or critical system files on your computer. Unauthorized registry and file changes can harm your computer, compromise its security service
  • McAfee MIS08EMB3RUA | User Guide - Page 47
    Chapter 10 McAfee Internet Security 45 Like Program and Windows SystemGuards, Browser SystemGuards detect and Internet Explorer. Unauthorized registry and file changes can harm your computer, compromise its security, and damage valuable system files. 1 Open the SystemGuards pane. 1. Under Common
  • McAfee MIS08EMB3RUA | User Guide - Page 48
    46 McAfee Internet Security ƒ Browser SystemGuards 3 Under I want to, do one of the following: ƒ To unwanted programs that can install Windows shell execute hooks to prevent security programs from running properly. Shell Service Object Delay Load Spyware, adware, and other potentially unwanted
  • McAfee MIS08EMB3RUA | User Guide - Page 49
    Chapter 10 McAfee Internet Security 47 Windows SystemGuards technology helps prevent your computer from Spyware, adware, and other potentially Layered Service unwanted programs that can install registry Providers changes to Winsock Layered Service Providers (LSPs) to intercept and change
  • McAfee MIS08EMB3RUA | User Guide - Page 50
    48 McAfee Internet Security SystemGuard Detects... Windows Messenger Service Spyware, adware, and other potentially unwanted programs that can make registry changes to the Windows messenger service, allowing unsolicited ads and remotely run programs on your computer. Windows Win.ini File
  • McAfee MIS08EMB3RUA | User Guide - Page 51
    Chapter 10 McAfee Internet Security 49 SystemGuard Detects... Internet Explorer Restrictions Spyware, adware, and other potentially unwanted programs that can make registry changes to Internet Explorer restrictions, affecting browser settings and options. Internet Explorer Security Zones
  • McAfee MIS08EMB3RUA | User Guide - Page 52
    50 McAfee Internet Security Using trusted lists If VirusScan detects a file or registry change ( On the Computer & Files Configuration pane, ensure that virus protection is enabled, and click Advanced. 5. Click Trusted Lists in the Virus Protection pane. 2 Select one of the following trusted
  • McAfee MIS08EMB3RUA | User Guide - Page 53
    Chapter 10 McAfee Internet Security 51 4 you have chosen to allow from an alert of from the Scan results pane. There are five types of trusted list types that service object delay load activity. These types of unauthorized registry and file changes can harm your computer, compromise its security
  • McAfee MIS08EMB3RUA | User Guide - Page 54
    52 McAfee Internet Security Option Description Browser Browser SystemGuards on the Trusted Lists pane SystemGuards represent previously unauthorized registry and file changes that VirusScan has detected, but that you have chosen to allow from an alert or from the Scan Results pane. Browser
  • McAfee MIS08EMB3RUA | User Guide - Page 55
    computer stays protected against the latest security threats, leave real-time virus protection on and set up a schedule for regular, more comprehensive manual scans. For more information about setting real-time and manual scan options, see Setting up virus protection (page 37). VirusScan provides
  • McAfee MIS08EMB3RUA | User Guide - Page 56
    54 McAfee Internet Security Scan your computer You can run a manual scan from either the Advanced or Basic menu in SecurityCenter. If you run a scan from the Advanced menu, you can confirm your manual scan options before scanning. If you run a scan from the Basic menu, VirusScan starts scanning
  • McAfee MIS08EMB3RUA | User Guide - Page 57
    Chapter 11 McAfee Internet Security 55 To... View scan and detection statistics View details about detected items, infection status, and type. Do this... Double-click the Scan completed icon in the notification area on your taskbar. Double-click the Scan completed icon in the notification area on
  • McAfee MIS08EMB3RUA | User Guide - Page 58
  • McAfee MIS08EMB3RUA | User Guide - Page 59
    57 CHAPTER 12 Working with scan results If VirusScan detects a security threat while running a real-time or manual scan, it tries to handle the threat automatically according to the threat type. For example, If VirusScan detects a virus, Trojan, or tracking cookie on your computer, it tries to clean
  • McAfee MIS08EMB3RUA | User Guide - Page 60
    58 McAfee Internet Security 1. Double-click the Scan completed icon in the notification area at the far right of your taskbar. 2. On the Scan Progress: Manual Scan pane, click View Results. 2 In the scan results list, click Viruses and Trojans. Note: To work with the files that VirusScan has
  • McAfee MIS08EMB3RUA | User Guide - Page 61
    Chapter 12 McAfee Internet Security 59 ƒ To remove the infected file from your computer, click Remove. 4 Click Yes to confirm your selected option. Tip: You can restore or remove multiple
  • McAfee MIS08EMB3RUA | User Guide - Page 62
  • McAfee MIS08EMB3RUA | User Guide - Page 63
    your protection problems, you can run McAfee Virtual Technician. In this chapter Personal Firewall features 62 Starting Firewall 65 Working with alerts 67 Managing informational alerts 69 Configuring Firewall protection 71 Managing programs and permissions 83 Managing system services 91
  • McAfee MIS08EMB3RUA | User Guide - Page 64
    service ports required by some programs. Manage computer connections Allow and block remote connections between other computers and your computer. HackerWatch information integration Track global hacking and intrusion patterns through HackerWatch's Web site, which also provides current security
  • McAfee MIS08EMB3RUA | User Guide - Page 65
    Chapter 13 McAfee Internet Security 63 Event logging Track recent inbound, outbound, and intrusion events. Monitor Protect your privacy from possible Internet threats. Using heuristic-like functionality, McAfee provides a tertiary layer of protection by blocking items that display symptoms
  • McAfee MIS08EMB3RUA | User Guide - Page 66
  • McAfee MIS08EMB3RUA | User Guide - Page 67
    access for known and unknown programs. Smart Recommendations and Trusting security level (with the option selected to allow programs outbound-only as well as manage inbound and outbound Internet connections. 1 On the McAfee SecurityCenter pane, click Internet & Network, and then click Configure. 2
  • McAfee MIS08EMB3RUA | User Guide - Page 68
    66 McAfee Internet Security Stop firewall protection You can disable Firewall if you do not want to protect your computer from intrusion and unwanted network traffic. When Firewall is disabled, you cannot manage inbound or outbound Internet connections. 1 On the McAfee SecurityCenter pane, click
  • McAfee MIS08EMB3RUA | User Guide - Page 69
    67 CHAPTER 15 Working with alerts Firewall employs an array of alerts to help you manage your security. These alerts can be grouped into three basic types: ƒ Red alert ƒ Yellow alert ƒ Green alert Alerts can also contain information to help you decide how
  • McAfee MIS08EMB3RUA | User Guide - Page 70
    detects, then blocks, a Trojan on your computer, and recommends that you scan for additional threats. A Trojan appears to be a legitimate program, but can manage your computer's security, which includes the following: ƒ Learn more about this program: Launch McAfee's global security Web site to get
  • McAfee MIS08EMB3RUA | User Guide - Page 71
    You can prevent Firewall informational alerts from being displayed when it detects intrusion attempts or suspicious activity. 1 On the McAfee SecurityCenter pane, click Advanced Menu. 2 Click Configure. 3 On the SecurityCenter Configuration pane, under Alerts, click Advanced. 4 On the SecurityCenter
  • McAfee MIS08EMB3RUA | User Guide - Page 72
  • McAfee MIS08EMB3RUA | User Guide - Page 73
    Firewall protection Firewall offers a number of methods to manage your security and to tailor the way you want to respond to security events and alerts. After you install Firewall for the first time, your computer's protection security level is set to Trusting and your programs are allowed outbound
  • McAfee MIS08EMB3RUA | User Guide - Page 74
    72 McAfee Internet Security Managing Firewall security levels Firewall's security levels control the degree to which you want to manage and respond to alerts. These alerts appear when it detects unwanted network traffic and inbound and outbound Internet connections. By default, Firewall's security
  • McAfee MIS08EMB3RUA | User Guide - Page 75
    -only access) from the Restore Firewall Protection Defaults pane. Set security level to Lockdown You can set Firewall's security level to Lockdown to block all inbound and outbound network connections. 1 On the McAfee SecurityCenter pane, click Internet & Network, then click Configure. 2 On the
  • McAfee MIS08EMB3RUA | User Guide - Page 76
    so that Standard displays as the current level. 4 Click OK. Set security level to Trusting You can set Firewall's security level to Trusting to allow either full access or outbound-only network access. 1 On the McAfee SecurityCenter pane, click Internet & Network, then click Configure. 2 On the
  • McAfee MIS08EMB3RUA | User Guide - Page 77
    Click OK. Note: The Allow Outbound-Only Access is the default option. Set security level to Open You can set Firewall's security level to Open to allow all inbound and outbound network connections. 1 On the McAfee SecurityCenter pane, click Internet & Network, then click Configure. 2 On the Internet
  • McAfee MIS08EMB3RUA | User Guide - Page 78
    76 McAfee Internet Security Configuring Smart Recommendations for alerts You can configure Firewall to include helps you decide how to handle alerts. When Smart Recommendations is enabled (and the security level is set to Trusting with outbound-only access enabled), Firewall automatically allows or
  • McAfee MIS08EMB3RUA | User Guide - Page 79
    Chapter 17 McAfee Internet Security 77 Disable Smart Recommendations You can disable Smart Network Configuration pane, under Firewall protection is enabled, click Advanced. 3 On the Security Level pane, under Smart Recommendations, select Disable Smart Recommendations. 4 Click OK. Display
  • McAfee MIS08EMB3RUA | User Guide - Page 80
    of Service attacks or exploits. Using the standard installation settings ensures that you are protected against these attacks and scans; however or block. To use this option, your security level must not be set to Open or Lockdown. 1 On the McAfee SecurityCenter pane, click Internet & Network, then
  • McAfee MIS08EMB3RUA | User Guide - Page 81
    automatic detection for the most common intrusion attempts, such as Denial of Service attacks or exploits; however, you can disable automatic detection for one or more attacks or scans. 1 On the McAfee SecurityCenter pane, click Internet & Network, then click Configure. 2 On the Internet & Network
  • McAfee MIS08EMB3RUA | User Guide - Page 82
    80 McAfee Internet Security ƒ Firewall is set to Open security level. ƒ Firewall service is not running. ƒ Firewall Protection is not installed on your computer. ƒ Your Windows Firewall is disabled. ƒ Outbound firewall is not installed on your computer. 4 Click OK.
  • McAfee MIS08EMB3RUA | User Guide - Page 83
    Chapter 17 McAfee Internet Security 81 Locking and restoring Firewall Lockdown instantly blocks all inbound and outbound network traffic to help you isolate and troubleshoot a problem on your computer. Lock Firewall instantly You can lock Firewall to instantly block all network traffic between your
  • McAfee MIS08EMB3RUA | User Guide - Page 84
    McAfee Internet Security Restore Firewall settings You can quickly restore Firewall to its original protection settings. This restore resets your security addresses, and restores system services, event log settings, and intrusion detection. 1 On the McAfee SecurityCenter pane, click Restore
  • McAfee MIS08EMB3RUA | User Guide - Page 85
    83 CHAPTER 18 Managing programs and permissions Firewall allows you to manage and create access permissions for existing and new programs that require inbound and outbound Internet access. Firewall lets you control full or outbound-only access for programs. You can also block access for programs. In
  • McAfee MIS08EMB3RUA | User Guide - Page 86
    84 McAfee Internet Security Allowing Internet access for programs Some programs, like Internet new program on your computer to have full inbound and outbound Internet access. 1 On the McAfee SecurityCenter pane, click Internet & Network, then click Configure. 2 On the Internet & Network
  • McAfee MIS08EMB3RUA | User Guide - Page 87
    Chapter 18 McAfee Internet Security 85 Allow full access from the Recent Events log You can allow an existing blocked program that appears in the Recent Events log to have full inbound and outbound Internet access. 1 On the McAfee SecurityCenter pane, click Advanced Menu. 2 Click Reports & Logs. 3
  • McAfee MIS08EMB3RUA | User Guide - Page 88
    86 McAfee Internet Security Allowing outbound-only access for programs Some programs on your program that appears in the Recent Events log to have outbound-only Internet access. 1 On the McAfee SecurityCenter pane, click Advanced Menu. 2 Click Reports & Logs. 3 Under Recent Events, select the
  • McAfee MIS08EMB3RUA | User Guide - Page 89
    Chapter 18 McAfee Internet Security 87 Blocking Internet access for programs Firewall allows you to block program You can block a program from having inbound and outbound Internet access. 1 On the McAfee SecurityCenter pane, click Internet & Network, then click Configure. 2 On the Internet & Network
  • McAfee MIS08EMB3RUA | User Guide - Page 90
    88 McAfee Internet Security Block access from the Recent Events log You can block a program that appears in the Recent Events log from having inbound and outbound Internet access. 1 On the McAfee SecurityCenter pane, click Advanced Menu. 2 Click Reports & Logs. 3 Under Recent Events, select the
  • McAfee MIS08EMB3RUA | User Guide - Page 91
    Chapter 18 McAfee Internet Security 89 Removing access permissions for programs Before removing a program permission, can remove a program from having any inbound or outbound Internet access. 1 On the McAfee SecurityCenter pane, click Internet & Network, then click Configure. 2 On the Internet &
  • McAfee MIS08EMB3RUA | User Guide - Page 92
    's HackerWatch Web site, which provides up-to-date information about programs, Internet access requirements, and security threats. 1 On the McAfee SecurityCenter pane, click Internet & Network, then click Configure. 2 On the Internet & Network Configuration pane, under Firewall protection is enabled
  • McAfee MIS08EMB3RUA | User Guide - Page 93
    Web servers and file-sharing server programs) must accept unsolicited connections from other computers through designated system service ports. Typically, Firewall closes these system service ports because they represent the most likely source of insecurities in your system. To accept connections
  • McAfee MIS08EMB3RUA | User Guide - Page 94
    92 McAfee Internet Security Configuring system service ports System service ports can be configured to allow or block remote network access to a service on your computer. The list below shows the common system services and their associated ports: ƒ File Transfer Protocol (FTP) Ports 20-21 ƒ Mail
  • McAfee MIS08EMB3RUA | User Guide - Page 95
    existing port to allow remote access to a network service on your computer. Note: An open system service port can make your computer vulnerable to Internet security threats; therefore, only open a port if necessary. 1 On the McAfee SecurityCenter pane, click Internet & Network, then click Configure
  • McAfee MIS08EMB3RUA | User Guide - Page 96
    94 McAfee Internet Security ƒ Outbound TCP/IP ports ƒ Inbound UDP ports ƒ Outbound UDP ports network access information about an existing system service port. Note: If port information is entered incorrectly, the system service fails. 1 On the McAfee SecurityCenter pane, click Internet & Network,
  • McAfee MIS08EMB3RUA | User Guide - Page 97
    Chapter 19 McAfee Internet Security 95 6 If you want to send this port's activity information to your computer. After removal, remote computers can no longer access the network service on your computer. 1 On the McAfee SecurityCenter pane, click Internet & Network, then click Configure. 2 On the
  • McAfee MIS08EMB3RUA | User Guide - Page 98
  • McAfee MIS08EMB3RUA | User Guide - Page 99
    to infection. In addition, McAfee recommends that the computer(s) you trust are protected by a firewall and an up-to-date antivirus program also. Firewall does DNS or DHCP server, or other ISP-related servers. Depending on your security settings, Firewall can alert you when it detects an event from a
  • McAfee MIS08EMB3RUA | User Guide - Page 100
    98 McAfee Internet Security Trusting computer connections You can add, edit, and remove trusted can be vulnerable to infection. In addition, McAfee recommends that the computer(s) you trust are protected by a firewall and an up-to-date antivirus program also. Add a trusted computer connection You
  • McAfee MIS08EMB3RUA | User Guide - Page 101
    Chapter 20 McAfee Internet Security 99 6 If a system service uses Internet Connection Sharing (ICS), you can add the : For more information about Internet Connection Sharing (ICS), see Configure a new system service. Add a trusted computer from the Inbound Events log You can add a trusted computer
  • McAfee MIS08EMB3RUA | User Guide - Page 102
    100 McAfee Internet Security 7 Optionally, check Rule expires in, and enter the number of days to enforce the rule. You can remove a trusted computer connection and its associated IP address. 1 On the McAfee SecurityCenter pane, click Internet & Network, then click Configure. 2 On the Internet &
  • McAfee MIS08EMB3RUA | User Guide - Page 103
    Chapter 20 McAfee Internet Security 101 Banning computer connections You can add, edit, and remove IP addresses, such as your DNS or DHCP server, or other ISP-related servers. Depending on your security settings, Firewall can alert you when it detects an event from a banned computer. Add a banned
  • McAfee MIS08EMB3RUA | User Guide - Page 104
    102 McAfee Internet Security Edit a banned computer connection You can edit a banned computer connection and its associated IP address. 1 On the McAfee SecurityCenter pane, click Internet & Network, then click Configure. 2 On the Internet & Network Configuration pane, under Firewall protection is
  • McAfee MIS08EMB3RUA | User Guide - Page 105
    Chapter 20 McAfee Internet Security 103 Ban a computer from the Inbound Events log You can an IP address that you suspect is the source of suspicious or undesirable Internet activity. 1 On the McAfee SecurityCenter pane, under Common Tasks, click Advanced Menu. 2 Click Reports & Logs. 3 Under Recent
  • McAfee MIS08EMB3RUA | User Guide - Page 106
  • McAfee MIS08EMB3RUA | User Guide - Page 107
    105 CHAPTER 21 Logging, monitoring, and analysis Firewall provides extensive and easy-to-read logging, monitoring, and analysis for Internet events and traffic. Understanding Internet traffic and events helps you manage your Internet connections. In this chapter Event Logging 106 Working with
  • McAfee MIS08EMB3RUA | User Guide - Page 108
    106 McAfee Internet Security Event Logging Firewall allows you to enable or disable the following: ƒ Blocked Programs ƒ ICMP Pings ƒ Traffic from Banned IP Addresses ƒ Events on System Service Ports ƒ Events on Unknown Ports ƒ Intrusion Detection (IDS) events 5 To prevent logging on specific ports
  • McAfee MIS08EMB3RUA | User Guide - Page 109
    Chapter 21 McAfee Internet Security 107 View inbound events If logging is enabled, you can view inbound events. Inbound Events include the date and time, source IP address, host name,
  • McAfee MIS08EMB3RUA | User Guide - Page 110
    108 McAfee Internet Security Working with Statistics Firewall leverages McAfee's HackerWatch security Web site to provide you with statistics about global Internet security events and port activity. View global security event statistics HackerWatch tracks worldwide Internet security events, which
  • McAfee MIS08EMB3RUA | User Guide - Page 111
    Chapter 21 McAfee Internet Security 109 Tracing Internet traffic Firewall offers a number of options for tracing Internet traffic. These options let you geographically trace a network computer, obtain domain and network
  • McAfee MIS08EMB3RUA | User Guide - Page 112
    110 McAfee Internet Security Trace a computer from the Inbound Events log From the Inbound Events pane, you can trace an IP address that appears in the Inbound Events log. 1
  • McAfee MIS08EMB3RUA | User Guide - Page 113
    Chapter 21 McAfee Internet Security 111 Trace a monitored IP address You can trace a monitored IP address to obtain a geographical view which shows the most probable route of data taken from
  • McAfee MIS08EMB3RUA | User Guide - Page 114
    112 McAfee Internet Security Monitoring Internet traffic Firewall provides a number of methods to monitor your Internet traffic, including the following: ƒ Traffic Analysis graph: Displays recent inbound and outbound Internet
  • McAfee MIS08EMB3RUA | User Guide - Page 115
    Chapter 21 McAfee Internet Security 113 Analyze inbound and outbound traffic The Traffic Analysis graph is a numerical and graphical representation of inbound and a Listening item under the program name. ƒ Computer connection: Select an IP address under the program name, system process, or service.
  • McAfee MIS08EMB3RUA | User Guide - Page 116
    114 McAfee Internet Security Note: To view the most up-to-date statistics, click Refresh under Active Programs.
  • McAfee MIS08EMB3RUA | User Guide - Page 117
    115 CHAPTER 22 Learning about Internet security Firewall leverages McAfee's security Web site, HackerWatch, to provide up-to-date information about programs and global Internet activity. HackerWatch also provides an HTML tutorial about Firewall. In this chapter Launch the HackerWatch tutorial 116
  • McAfee MIS08EMB3RUA | User Guide - Page 118
    116 McAfee Internet Security Launch the HackerWatch tutorial To learn about Firewall, you can access the HackerWatch tutorial from SecurityCenter. 1 Ensure that the Advanced Menu is enabled, and then
  • McAfee MIS08EMB3RUA | User Guide - Page 119
    to add them to Anti-Spam. Note: SecurityCenter reports critical and non-critical protection problems as soon as it detects them. If you need help diagnosing your protection problems, you can run McAfee Virtual Technician. In this chapter Anti-Spam features 118 Setting up your Webmail accounts 119
  • McAfee MIS08EMB3RUA | User Guide - Page 120
    118 McAfee Internet Security Anti-Spam features Anti-Spam provides the following features. Spam filtering simply click the appropriate column name). Additional support Anti-Spam supports Mozilla® Thunderbird™ 1.5 and 2.0, and provides Windows Vista™ 64-bit support for Windows Mail. In addition, the
  • McAfee MIS08EMB3RUA | User Guide - Page 121
    accounts are Web-based. Filtering POP3 Webmail accounts is similar to filtering POP3 accounts. MAPI is a system designed by Microsoft that supports many types of messaging, including Internet e-mail, fax, and Exchange Server messaging. Currently, only Microsoft Outlook can work directly with MAPI
  • McAfee MIS08EMB3RUA | User Guide - Page 122
    120 McAfee Internet Security 1. On the SecurityCenter Home pane, click E-mail & IM. 2. In the E-mail & IM information area, click Configure. 3. On the E-mail & IM Configuration pane, under Spam protection,
  • McAfee MIS08EMB3RUA | User Guide - Page 123
    McAfee Internet Security 121 Remove a Webmail account Remove a Webmail account if you no longer want to filter its e-mail for spam. For example, if your account is not active any more or you are experiencing problems, you can remove the account while you troubleshoot your Internet Service Provider (
  • McAfee MIS08EMB3RUA | User Guide - Page 124
    122 McAfee Internet Security Checking options Option Check every Check on startup Description Anti-Spam checks dial a connection Anti-Spam does not automatically dial a connection for you. You must manually start your dial-up connection. Dial when no When an Internet connection is not available
  • McAfee MIS08EMB3RUA | User Guide - Page 125
    scheduled intervals (daily, weekly, or monthly) to prevent your friends list from becoming out-of-date. You can also update your Anti-Spam friends list manually, or add an entire domain if you want each user on the domain to be added to your friends list. For example, if you add
  • McAfee MIS08EMB3RUA | User Guide - Page 126
    124 McAfee Internet Security Setting up friends automatically You automatically update your list of friends by adding your address books to Anti-Spam. Adding an address book allows Anti-
  • McAfee MIS08EMB3RUA | User Guide - Page 127
    Chapter 25 McAfee Internet Security 125 1. On the SecurityCenter Home pane, click E-mail & IM. 2. In the E-mail & IM information area, click Configure. 3. On the E-mail & IM Configuration pane, under Spam
  • McAfee MIS08EMB3RUA | User Guide - Page 128
    126 McAfee Internet Security Setting up friends manually You manually update your list of friends by editing the entries one-by-one. For example, if you receive an e-mail from a friend whose address is not in your address book, you can manually add their e-mail address right away. The easiest way
  • McAfee MIS08EMB3RUA | User Guide - Page 129
    Chapter 25 McAfee Internet Security 127 Add a domain Add an entire domain if you want to add every user on that domain to your friends list. For example, if you
  • McAfee MIS08EMB3RUA | User Guide - Page 130
    128 McAfee Internet Security Edit a domain If the information for a domain changes, you can update your friends list to ensure that Anti-Spam does not mark the messages from
  • McAfee MIS08EMB3RUA | User Guide - Page 131
    that contains the word mortgage. If you are having issues with your e-mail, you can disable spam protection as part of your troubleshooting strategy. In this chapter Disable spam protection 129 Setting filtering options 130 Using personal filters 133 Disable spam protection You can disable spam
  • McAfee MIS08EMB3RUA | User Guide - Page 132
    130 McAfee Internet Security Setting filtering options Adjust Anti-Spam's filtering options if you want to filter messages more aggressively, specify what to look for in a message, and look
  • McAfee MIS08EMB3RUA | User Guide - Page 133
    Chapter 26 McAfee Internet Security 131 1. On the SecurityCenter Home pane, click E-mail & IM. 2. In the E-mail & IM information area, click Configure. 3. On the E-mail & IM Configuration pane, under Spam
  • McAfee MIS08EMB3RUA | User Guide - Page 134
    132 McAfee Internet Security Filter Description Filter messages that Looks for messages that contain invalid contain intentional formatting because invalid formatting is used HTML formatting to prevent filters from
  • McAfee MIS08EMB3RUA | User Guide - Page 135
    Chapter 26 McAfee Internet Security 133 Using personal filters A filter specifies what Anti-Spam looks for in an e-mail message. When spam is found, the message is marked as spam and left in your Inbox or moved to the McAfee Anti-Spam folder. For more information about how spam is handled, see
  • McAfee MIS08EMB3RUA | User Guide - Page 136
    134 McAfee Internet Security Edit a personal filter Edit existing filters to fine-tune which messages are identified as spam. 1 Open the Spam Protection pane. How? 1. On the SecurityCenter Home
  • McAfee MIS08EMB3RUA | User Guide - Page 137
    Chapter 26 McAfee Internet Security 135 Information Description This filter uses regular Specify character patterns used in filter expressions (RegEx) conditions. To test a character pattern, click Test.
  • McAfee MIS08EMB3RUA | User Guide - Page 138
  • McAfee MIS08EMB3RUA | User Guide - Page 139
    You can also disable Anti-Spam toolbars as part of your troubleshooting strategy when you are experiencing issues with your e-mail program. In with [SPAM] or a tag of your choice and left in your Inbox, your McAfee Anti-Spam folder (Outlook, Outlook Express, Windows Mail, Thunderbird), or your Junk
  • McAfee MIS08EMB3RUA | User Guide - Page 140
    138 McAfee Internet Security Modify how a message is processed and marked You can change how spam is processed and marked. For example, you can decide whether the e-mail message is left in your Inbox or McAfee Anti-Spam folder, and change the [SPAM] or [PHISH] tag that appears in the message
  • McAfee MIS08EMB3RUA | User Guide - Page 141
    Chapter 27 McAfee Internet Security 139 1. On the SecurityCenter Home pane, click E-mail & IM. 2. In the E-mail & IM information area, click Configure. 3. On the E-mail & IM Configuration pane, under Spam
  • McAfee MIS08EMB3RUA | User Guide - Page 142
  • McAfee MIS08EMB3RUA | User Guide - Page 143
    spam may not be detected. When this happens, you can report spam to McAfee, where it is analyzed to create filter updates. If you are using a protection, click Advanced. 2 On the Spam Protection pane, click Reporting to McAfee. 3 Select the appropriate check boxes, and then click OK. Option Enable
  • McAfee MIS08EMB3RUA | User Guide - Page 144
    142 McAfee Internet Security Copy or delete a filtered Webmail message You can copy or delete messages that have been filtered in your Webmail account. 1 Under Common Tasks, click View
  • McAfee MIS08EMB3RUA | User Guide - Page 145
    whitelist. You can also edit or remove Web sites from the whitelist. You do not need to add sites such as Google®, Yahoo, or McAfee, because these Web sites are not considered fraudulent. Note: If you have SiteAdvisor installed, you do not receive Anti-Spam phishing protection because SiteAdvisor
  • McAfee MIS08EMB3RUA | User Guide - Page 146
    144 McAfee Internet Security Edit sites in your whitelist If you added a Web site to , and then click Remove. Disable phishing protection If you already have phishing software that is not from McAfee and there is a conflict, you can disable Anti-Spam phishing protection. 1 On the SecurityCenter Home
  • McAfee MIS08EMB3RUA | User Guide - Page 147
    habits, as well as a secure storage area for personal passwords. Before you begin using Privacy Service, you can familiarize yourself with problems as soon as it detects them. If you need help diagnosing your protection problems, you can run McAfee Virtual Technician. In this chapter Privacy Service
  • McAfee MIS08EMB3RUA | User Guide - Page 148
    146 McAfee Internet Security Privacy Service features Privacy Service provides the following features: ƒ Parental Controls , and so on) across the Web. Password Vault The Password Vault is a secure storage area for your personal passwords. It allows you to store your passwords with confidence
  • McAfee MIS08EMB3RUA | User Guide - Page 149
    147 CHAPTER 31 Setting up Parental Controls If your children use your computer, you can configure Parental Controls for them. You use Parental Controls to help regulate what your children can see and do while they browse the Web. To set up Parental Controls, you can enable or disable image filtering
  • McAfee MIS08EMB3RUA | User Guide - Page 150
    148 McAfee Internet Security Configuring users To configure Parental Controls, you assign permissions to SecurityCenter users. By default, SecurityCenter users correspond to the Windows users that you have set
  • McAfee MIS08EMB3RUA | User Guide - Page 151
    Chapter 31 McAfee Internet Security 149 Working with Windows users To configure Parental Controls, you must assign permissions to users for those users in SecurityCenter. If you upgraded from a previous version of SecurityCenter that used McAfee users, see Working with McAfee users (page 150).
  • McAfee MIS08EMB3RUA | User Guide - Page 152
    Advanced. 2 On the Users Settings pane, click Switch. 3 Confirm the operation. Add a McAfee user After creating a McAfee user, you can configure Parental Controls for the user. For more information, see the Privacy Service help. 1 Log in to SecurityCenter as the Administrator user. 2 Open the Users
  • McAfee MIS08EMB3RUA | User Guide - Page 153
    Chapter 31 McAfee Internet Security 151 1. Under Common Tasks, click Home. 2. On the SecurityCenter the on-screen instructions to edit the user's password, account type, or parental controls. 5 Click OK. Remove a McAfee user You can remove a McAfee user at any time. To remove a McAfee user: 1
  • McAfee MIS08EMB3RUA | User Guide - Page 154
    Configuration pane, click Advanced. 3 On the Users Settings pane, under McAfee User Accounts, select a user name, and then click Remove. Change the McAfee administrator's password If you have trouble remembering the McAfee administrator password or suspect that it is compromised, you can change it
  • McAfee MIS08EMB3RUA | User Guide - Page 155
    Chapter 31 McAfee Internet Security 153 Filtering potentially inappropriate Web images Depending on a user's enable image filtering. Each potentially inappropriate Web image is automatically replaced with a static McAfee image. 1 Open the Users Settings pane. How? 1. On the SecurityCenter Home pane
  • McAfee MIS08EMB3RUA | User Guide - Page 156
    154 McAfee Internet Security Setting the content rating group A user can belong to one of the following content rating groups: ƒ Young child ƒ Child ƒ Younger teen ƒ Older teen ƒ Adult Privacy Service rates (blocks or allows) Web content based on the group to which a user belongs. This lets you
  • McAfee MIS08EMB3RUA | User Guide - Page 157
    Chapter 31 McAfee Internet Security 155 Setting Web browsing time limits If you are days or prohibit Web browsing entirely. If a child tries to browse the Web during a prohibited period, McAfee notifies the child that they cannot do so. If you prohibit Web browsing entirely, the child can log
  • McAfee MIS08EMB3RUA | User Guide - Page 158
    156 McAfee Internet Security Filtering Web sites You can filter (block or allow) Web sites Web site, a message indicates that the site cannot be accessed because it is blocked by McAfee. You allow a Web site if McAfee has blocked it by default but you want to let your children access it. For more
  • McAfee MIS08EMB3RUA | User Guide - Page 159
    Chapter 31 McAfee Internet Security 157 Allow a Web site You allow a Web site to make sure that it is not blocked for any users. If you allow a Web site that McAfee has blocked by default, you override the default setting. 1 Open the Parental Controls pane. How? 1. On the SecurityCenter Home pane,
  • McAfee MIS08EMB3RUA | User Guide - Page 160
    158 McAfee Internet Security Remove a filtered Web site You can remove a filtered Web site if you no longer want to block or allow it. 1 Open the Parental Controls pane.
  • McAfee MIS08EMB3RUA | User Guide - Page 161
    Chapter 31 McAfee Internet Security 159 Filtering Web sites using keywords Keyword filtering lets and corresponding rules is used to rate content for users according to their content rating group. Although McAfee does not recommend doing so, you can disable keyword filtering at any time. 1 Open the
  • McAfee MIS08EMB3RUA | User Guide - Page 162
    160 McAfee Internet Security 1. On the SecurityCenter Home pane, click Parental Controls. 2. In the Parental Controls information section, click Configure. 3. On the Parental Controls Configuration pane, ensure that Parental
  • McAfee MIS08EMB3RUA | User Guide - Page 163
    , and bank account numbers) from being transmitted over the Web by adding it to the blocked information area. Note: Privacy Service does not block the transmission of personal information by secure Web sites (that is, Web sites that use the https:// protocol), such as banking sites. In this chapter
  • McAfee MIS08EMB3RUA | User Guide - Page 164
    162 McAfee Internet Security Protecting personal information Prevent your personal information (such as name, address, credit card numbers, and bank account numbers) from being transmitted over the Web by blocking it. If McAfee detects personal information contained in something (for example, a form
  • McAfee MIS08EMB3RUA | User Guide - Page 165
    163 CHAPTER 33 Protecting passwords The Password Vault is a secure storage area for your personal passwords. It allows you to store your passwords with confidence so that no other user (even an Administrator) can access them. In this chapter Setting up the Password Vault 164
  • McAfee MIS08EMB3RUA | User Guide - Page 166
    164 McAfee Internet Security Setting up the Password Vault Before you start using the password at any time. Add a password If you have trouble remembering your passwords, you can add them to the Password Vault. The Password Vault is a secure location that can only be accessed by users who know
  • McAfee MIS08EMB3RUA | User Guide - Page 167
    Chapter 33 McAfee Internet Security 165 1. Under Common Tasks, click Home. 2. On the SecurityCenter Home pane, click Internet & Network. 3. In the Internet & Network information section, click Configure. 4. On the Internet &
  • McAfee MIS08EMB3RUA | User Guide - Page 168
    166 McAfee Internet Security 1. Under Common Tasks, click Home. 2. On the SecurityCenter Home pane, click Internet & Network. 3. In the Internet & Network information section, click Configure. 4. On the Internet & Network
  • McAfee MIS08EMB3RUA | User Guide - Page 169
    167 CHAPTER 34 McAfee Data Backup Use Data Backup to avoid accidental loss of your data by reports critical and non-critical protection problems as soon as it detects them. If you need help diagnosing your protection problems, you can run McAfee Virtual Technician. In this chapter Data
  • McAfee MIS08EMB3RUA | User Guide - Page 170
    168 McAfee Internet Security Data Backup features Data Backup provides the following features to save and restore your photos, music, and By default, your archived files are compressed, which saves space on your archive media. As an additional security measure, your archives are encrypted by default.
  • McAfee MIS08EMB3RUA | User Guide - Page 171
    default archive location (CD, DVD, USB drive, external hard drive, or network drive). McAfee has preset some other settings; for example, the folders and file types that you want quick archives. You can run manual archives at any time. In this chapter Setting archive options 170 Running full and
  • McAfee MIS08EMB3RUA | User Guide - Page 172
    170 McAfee Internet Security Setting archive options Before you start archiving your data, you must where archived data will be stored). You can change the archive location at any time. For security reasons or size issues, encryption or compression are enabled by default for your archived files. The
  • McAfee MIS08EMB3RUA | User Guide - Page 173
    Chapter 35 McAfee Internet Security 171 ƒ To archive the contents of a folder, but not the contents of its subfolders, click Add Folder under Shallow Watch Locations. 5 In the Browse For
  • McAfee MIS08EMB3RUA | User Guide - Page 174
    Local Archive Settings dialog box, click Advanced Settings. 4 Clear the Enable encryption to increase security check box. 5 Clear the Enable compression to reduce storage check box. 6 Click Save. Note: McAfee recommends that you do not disable encryption and compression when archiving your files.
  • McAfee MIS08EMB3RUA | User Guide - Page 175
    Chapter 35 McAfee Internet Security 173 Running full and quick archives You can run two types of quick archive for another few hours, you can archive the files manually. When you archive files manually, the interval that you set for automatic archives is reset. You can also interrupt an automatic
  • McAfee MIS08EMB3RUA | User Guide - Page 176
    174 McAfee Internet Security 5 Select the check box beside the day on which you want archive. A full archive archives the watch file types in all watch locations. To run a quick or full archive manually: 1 Click the Local Archive tab. 2 To run a quick archive, click Quick Archive in the left pane.
  • McAfee MIS08EMB3RUA | User Guide - Page 177
    175 CHAPTER 36 Working with archived files After you archive some files, you can use Data Backup to work with them. Your archived files are presented to you in a traditional explorer view which allows you to locate them easily. As your archive grows, you might want to sort the files or search for
  • McAfee MIS08EMB3RUA | User Guide - Page 178
    176 McAfee Internet Security Using the local archive explorer The local archive explorer allows you to view and manipulate the files that you have archived locally. You can view
  • McAfee MIS08EMB3RUA | User Guide - Page 179
    Chapter 36 McAfee Internet Security 177 ƒ Click Specify Dates, click Archived in the list, and then click the appropriate date values from the date lists. 5 Click Search. Note: If you
  • McAfee MIS08EMB3RUA | User Guide - Page 180
    178 McAfee Internet Security Restoring archived files If a watch file becomes corrupt, is missing, or hard drive on computer A, you can restore those files on computer B. To do so, you must install McAfee Data Backup on computer B and connect the external hard drive. Then, in Data Backup, you browse
  • McAfee MIS08EMB3RUA | User Guide - Page 181
    Chapter 36 McAfee Internet Security 179 Restore an older version of a file from a local archive If you want to restore an older version of an archived file, you can locate
  • McAfee MIS08EMB3RUA | User Guide - Page 182
    180 McAfee Internet Security Managing archives You can view a summary of information about your full and quick archives at any time. For example, you can view information about the
  • McAfee MIS08EMB3RUA | User Guide - Page 183
    your privacy by using the McAfee Shredder component to securely and permanently delete items that may do not want to maintain your computer manually, you can schedule both QuickClean and Disk problems as soon as it detects them. If you need help diagnosing your protection problems, you can run McAfee
  • McAfee MIS08EMB3RUA | User Guide - Page 184
    182 McAfee Internet Security QuickClean features QuickClean provides various cleaners that delete unnecessary files safely and efficiently. By deleting these files, you increase the space on your computer's hard drive and improve its performance.
  • McAfee MIS08EMB3RUA | User Guide - Page 185
    Chapter 37 McAfee Internet Security 183 Cleaning your computer QuickClean deletes files that can create clutter on your computer. It empties your Recycle Bin and deletes temporary files, shortcuts, lost
  • McAfee MIS08EMB3RUA | User Guide - Page 186
    184 McAfee Internet Security Name Function Cookie Cleaner Deletes cookies. These files are usually stored as temporary files. A cookie is a small file containing information, by Windows to mark any changes made to your computer so that you can revert to a previous state if any problems occur.
  • McAfee MIS08EMB3RUA | User Guide - Page 187
    Chapter 37 McAfee Internet Security 185 Clean your computer You can use any of to accept the default No, I want to delete files using standard Windows deletion. ƒ Click Yes, I want to securely erase my files using Shredder, specify the number of passes, up to 10, and then click Next. Shredding files
  • McAfee MIS08EMB3RUA | User Guide - Page 188
    186 McAfee Internet Security Defragmenting your computer Disk Defragmenter arranges files and folders retrieval. 1 On the McAfee SecurityCenter pane, under Common Tasks, click Maintain Computer. 2 Under Disk Defragmenter, click Analyze. 3 Follow the on-screen instructions. Note: For more information
  • McAfee MIS08EMB3RUA | User Guide - Page 189
    Chapter 37 McAfee Internet Security 187 Scheduling a task Task Scheduler automates the frequency with your task is scheduled to run again. 1 Open the Task Scheduler pane. How? 1. On the McAfee SecurityCenter, under Common Tasks, click Maintain Computer. 2. Under Task Scheduler, click Start. 2 In
  • McAfee MIS08EMB3RUA | User Guide - Page 190
    188 McAfee Internet Security 6 In the Schedule dialog box, select the frequency with Finish. Note: Files deleted with Shredder cannot be recovered. For information about shredding files, see McAfee Shredder. Modify a QuickClean task You can modify a scheduled QuickClean task to change the cleaners
  • McAfee MIS08EMB3RUA | User Guide - Page 191
    Chapter 37 McAfee Internet Security 189 6 In the Schedule dialog box, select the frequency Finish. Note: Files deleted with Shredder cannot be recovered. For information about shredding files, see McAfee Shredder. Delete a QuickClean task You can delete a scheduled QuickClean task if you no longer
  • McAfee MIS08EMB3RUA | User Guide - Page 192
    190 McAfee Internet Security 1. On the McAfee SecurityCenter, under Common Tasks, click Maintain Computer. 2. Under Task is scheduled to run again. 1 Open the Task Scheduler pane. How? 1. On the McAfee SecurityCenter, under Common Tasks, click Maintain Computer. 2. Under Task Scheduler, click Start.
  • McAfee MIS08EMB3RUA | User Guide - Page 193
    Chapter 37 McAfee Internet Security 191 Delete a Disk Defragmenter task You can delete a scheduled Disk Defragmenter task if you no longer want it to run automatically. 1 Open the Task Scheduler pane. How? 1. On the McAfee SecurityCenter, under Common Tasks, click Maintain Computer. 2. Under Task
  • McAfee MIS08EMB3RUA | User Guide - Page 194
  • McAfee MIS08EMB3RUA | User Guide - Page 195
    CHAPTER 38 McAfee Shredder McAfee Shredder deletes (or shreds) items permanently from your computer's hard drive. Even when you manually delete files -critical protection problems as soon as it detects them. If you need help diagnosing your protection problems, you can run McAfee Virtual Technician.
  • McAfee MIS08EMB3RUA | User Guide - Page 196
    194 McAfee Internet Security Shredder features Shredder deletes items from your computer's hard drive so that their associated information cannot be recovered. It protects your privacy by safely and
  • McAfee MIS08EMB3RUA | User Guide - Page 197
    Chapter 38 McAfee Internet Security 195 Shredding files, folders, and disks Shredder ensures 10) you want an item to be shredded. A higher number of shredding passes increases your level of secure file deletion. Shred files and folders You can shred files and folders from your computer's hard drive,
  • McAfee MIS08EMB3RUA | User Guide - Page 198
    196 McAfee Internet Security Shred an entire disk You can shred the entire contents of a disk at once. Only removable drives, such as external hard drives, writeable CDs, and floppy disks can be shredded. 1 Open Shredder. How? 1. On the McAfee SecurityCenter pane, under Common Tasks, click Advanced
  • McAfee MIS08EMB3RUA | User Guide - Page 199
    the Network Manager help. Note: SecurityCenter reports critical and non-critical protection problems as soon as it detects them. If you need help diagnosing your protection problems, you can run McAfee Virtual Technician. In this chapter Network Manager features 198 Understanding Network Manager
  • McAfee MIS08EMB3RUA | User Guide - Page 200
    198 McAfee Internet Security Network Manager features Network Manager provides the following features. Graphical network map Network Manager's to join the managed network, monitor the managed computer's protection status, and fix known security vulnerabilities from a remote computer on the network.
  • McAfee MIS08EMB3RUA | User Guide - Page 201
    Chapter 39 McAfee Internet Security 199 Understanding Network Manager icons The following table describes the icons commonly used on the Network Manager network map. Icon Description Represents an online, managed
  • McAfee MIS08EMB3RUA | User Guide - Page 202
  • McAfee MIS08EMB3RUA | User Guide - Page 203
    201 CHAPTER 40 Setting up a managed network To set up a managed network, work with the items on your network map and add members (computers) to the network. Before a computer can be remotely managed, or granted permission to remotely manage other computers on the network, it must become a trusted
  • McAfee MIS08EMB3RUA | User Guide - Page 204
    202 McAfee Internet Security Working with the network map When you connect a computer to the network, Network Manager analyzes the network to determine if there are any managed or
  • McAfee MIS08EMB3RUA | User Guide - Page 205
    Chapter 40 McAfee Internet Security 203 Rename the network By default, the name of the network includes the workgroup or domain name of the first computer that connects to the
  • McAfee MIS08EMB3RUA | User Guide - Page 206
    204 McAfee Internet Security Joining the managed network Before a computer can be remotely must authenticate each other. When a computer joins the network, it is prompted to expose its McAfee protection status to other computers on the network. If a computer agrees to expose its protection status
  • McAfee MIS08EMB3RUA | User Guide - Page 207
    . You can also determine whether you want this computer and other computers on the network to monitor each other's security settings (for example, whether a computer's virus protection services are up-to-date). 1 In the Managed Network dialog box, ensure that the Allow every computer on this network
  • McAfee MIS08EMB3RUA | User Guide - Page 208
    206 McAfee Internet Security 4 Click OK. An invitation to join the managed network is sent managed network does not display the same playing cards that appear in the security confirmation dialog box, there has been a security breach on the managed network. Allowing the computer to join the network
  • McAfee MIS08EMB3RUA | User Guide - Page 209
    Chapter 40 McAfee Internet Security 207 Stop trusting computers on the network If you trusted other computers on the network by mistake, you can stop trusting them. ƒ Click Stop trusting
  • McAfee MIS08EMB3RUA | User Guide - Page 210
  • McAfee MIS08EMB3RUA | User Guide - Page 211
    the computers and components that make up your network. You can monitor the status and permission levels of the computers and components and fix most security vulnerabilities remotely. In this chapter Monitoring status and permissions 210 Fixing
  • McAfee MIS08EMB3RUA | User Guide - Page 212
    210 McAfee Internet Security Monitoring status and permissions A managed network has managed and unmanaged members. Managed members allow other computers on the network to monitor their McAfee protection status; unmanaged members do not. Unmanaged members are usually guest computers that want to
  • McAfee MIS08EMB3RUA | User Guide - Page 213
    Chapter 41 McAfee Internet Security 211 Modify a managed computer's permissions You can change a managed computer's permissions at any time. This allows you to modify which computers can monitor the protection
  • McAfee MIS08EMB3RUA | User Guide - Page 214
    security vulnerabilities remotely, Network Manager repairs most reported issues. However, some security vulnerabilities may require manual intervention the vulnerable computer and follow the recommendations provided. Install McAfee security software on remote computers If one or more computers on
  • McAfee MIS08EMB3RUA | User Guide - Page 215
    213 ƒ http://au.mcafee.com/root/myAccount.asp (Australia) 2 Log in using the e-mail address and password that you used to register your security software the first time you installed it. 3 Select the appropriate product, click the Download/Install icon, and then follow the on-screen instructions.
  • McAfee MIS08EMB3RUA | User Guide - Page 216
  • McAfee MIS08EMB3RUA | User Guide - Page 217
    215 CHAPTER 42 McAfee EasyNetwork EasyNetwork allows you to share files securely, simplify file transfers, and share printers among the and non-critical protection problems as soon as it detects them. If you need help diagnosing your protection problems, you can run McAfee Virtual Technician. In
  • McAfee MIS08EMB3RUA | User Guide - Page 218
    216 McAfee Internet Security EasyNetwork features EasyNetwork provides the following features. File sharing EasyNetwork makes it easy to share files with other computers on your network. When you share
  • McAfee MIS08EMB3RUA | User Guide - Page 219
    open EasyNetwork after installation; however, you can also open EasyNetwork later. ƒ On the Start menu, point to Programs, point to McAfee, and then click McAfee EasyNetwork. Tip: If you created desktop and quick launch icons during the installation, you can also open EasyNetwork by double-clicking
  • McAfee MIS08EMB3RUA | User Guide - Page 220
    218 McAfee Internet Security Joining a managed network If no computers on the network you are connected access cannot perform these administrative tasks. Note: After you join, if you have other McAfee networking programs installed (for example, Network Manager), the computer is also recognized as a
  • McAfee MIS08EMB3RUA | User Guide - Page 221
    Chapter 43 McAfee Internet Security 219 Join the network When a computer connects to a managed network does not display the same playing cards that appear in the security confirmation dialog box, there has been a security breach on the managed network. Joining the network can place your computer
  • McAfee MIS08EMB3RUA | User Guide - Page 222
    220 McAfee Internet Security ƒ Click Allow administrative access to managed network programs to 3 Click OK. 4 Confirm that the computer is displaying the playing cards that appear in the security confirmation dialog box, and then click Grant Access. Note: If the computer does not display the same
  • McAfee MIS08EMB3RUA | User Guide - Page 223
    Chapter 43 McAfee Internet Security 221 Rename the network By default, the network name includes the name of the first computer that joined; however, you can change the network name
  • McAfee MIS08EMB3RUA | User Guide - Page 224
    222 McAfee Internet Security Leaving a managed network If you join a managed network but then decide that you do not want to be a member, you can leave the network. After
  • McAfee MIS08EMB3RUA | User Guide - Page 225
    223 CHAPTER 44 Sharing and sending files EasyNetwork makes it easy to share and send files among other computers on the network. When you share files, you grant other computers read-only access to them. Only computers that are members of the managed network (full or administrative access) can share
  • McAfee MIS08EMB3RUA | User Guide - Page 226
    224 McAfee Internet Security Sharing files Only computers that are members of the managed network ( be accessed from other computers using Windows Explorer because EasyNetwork file sharing must be performed over secure connections. Share a file When you share a file, it is available to all members
  • McAfee MIS08EMB3RUA | User Guide - Page 227
    Chapter 44 McAfee Internet Security 225 Copy a shared file You copy a shared file so that you still have it when it's not shared any more. You can copy a shared file
  • McAfee MIS08EMB3RUA | User Guide - Page 228
    226 McAfee Internet Security Type of file Type Any Document Image Video Audio Compressed Description Search all shared file types. Search all shared documents. Search all shared image files.
  • McAfee MIS08EMB3RUA | User Guide - Page 229
    Chapter 44 McAfee Internet Security 227 Sending files to other computers You can send files to other computers that are members of the managed network. Before sending a file, EasyNetwork confirms
  • McAfee MIS08EMB3RUA | User Guide - Page 230
    228 McAfee Internet Security Receive notification when a file is sent You can receive a notification message when another computer on the managed network sends you a file. If EasyNetwork is not
  • McAfee MIS08EMB3RUA | User Guide - Page 231
    229 CHAPTER 45 Sharing printers After you join a managed network, EasyNetwork shares the local printers attached to your computer and uses the printer's name as the shared printer name. EasyNetwork also detects printers shared by other computers on your network and allows you to configure and use
  • McAfee MIS08EMB3RUA | User Guide - Page 232
    230 McAfee Internet Security Working with shared printers EasyNetwork detects the printers that are shared by the computers on the network. If EasyNetwork detects a remote printer that is not
  • McAfee MIS08EMB3RUA | User Guide - Page 233
    Chapter 45 McAfee Internet Security 231
  • McAfee MIS08EMB3RUA | User Guide - Page 234
    232 McAfee Internet Security Reference The Glossary of Terms lists and defines the most commonly used security terminology found in McAfee products.
  • McAfee MIS08EMB3RUA | User Guide - Page 235
    a wireless router) that plugs into an Ethernet hub or switch to extend the physical range of service for a wireless user. When wireless users roam with their mobile devices, transmission passes from one Access and password. B back up To create a copy of important files on a secure, online server.
  • McAfee MIS08EMB3RUA | User Guide - Page 236
    234 McAfee Internet Security bandwidth The amount of data that can be transmitted in a fixed amount of time. blacklist In anti-phishing, a list of Web sites that are considered
  • McAfee MIS08EMB3RUA | User Guide - Page 237
    the definitions that are used when detecting viruses, Trojans, spyware, adware, and security vulnerabilities. dialer Software that helps you to establish an Internet connection. When used maliciously, dialers can redirect your Internet connections to someone other than your default Internet Service
  • McAfee MIS08EMB3RUA | User Guide - Page 238
    236 McAfee Internet Security E e-mail (electronic mail) Messages sent and received electronically, across do not know how to decrypt it. Encrypted data is also known as cipher text. ESS (Extended Service Set) A set of two or more networks that form a single subnetwork. event An action initiated
  • McAfee MIS08EMB3RUA | User Guide - Page 239
    appearing. integrated gateway A device that combines the functions of an access point (AP), router, and firewall. Some devices may also include security enhancements and bridging features. Internet The Internet consists of a huge number of interconnected networks that use the TCP/IP protocols for
  • McAfee MIS08EMB3RUA | User Guide - Page 240
    238 McAfee Internet Security L LAN (Local Area Network) A computer network that spans a relatively small recognizes the decrypted code as valid. MSN (Microsoft Network) A group of Web-based services offered by Microsoft Corporation, including a search engine, e-mail, instant messaging, and portal
  • McAfee MIS08EMB3RUA | User Guide - Page 241
    O on-demand scan A scan that is launched on demand (that is, when you launch the operation). Unlike real-time scanning, on-demand scans do not launch to your computer, a program, or a Web site. Password Vault A secure storage area for your personal passwords. It allows you to store your passwords
  • McAfee MIS08EMB3RUA | User Guide - Page 242
    240 McAfee Internet Security plain text Text that is not encrypted. See also encryption. plug A format (hardware or software) for transmitting data between two devices. Your computer or device must support the correct protocol if you want to communicate with other computers. proxy A computer (or the
  • McAfee MIS08EMB3RUA | User Guide - Page 243
    of a WLAN user's shared secret. real-time scanning To scan files and folders for viruses and other activity when they are accessed by you in service or loss in connectivity. rogue access point An unauthorized Access Point. Rogue access points can be installed on a secure company network
  • McAfee MIS08EMB3RUA | User Guide - Page 244
    242 McAfee Internet Security rootkit A collection of tools (programs) that grant a user administrator-level access to a computer or computer network. Rootkits may include spyware and other potentially unwanted programs that can create additional security or privacy risks to your computer data and
  • McAfee MIS08EMB3RUA | User Guide - Page 245
    Service Set Identifier) A token (secret key) that identifies a Wi-Fi (802.11) network. The SSID is set up by the network administrator and must be supplied by users who want to join the network. SSL (Secure restore points at any time. SystemGuard McAfee alerts that detect unauthorized changes to your
  • McAfee MIS08EMB3RUA | User Guide - Page 246
    244 McAfee Internet Security trusted list Contains items that you trusted and are not being USB wireless adapter card A wireless adapter card that plugs into a USB slot in the computer. V virus Self-replicating programs that might alter your files or data. They often appear to be from a trusted
  • McAfee MIS08EMB3RUA | User Guide - Page 247
    are based on RC4 ciphers and have significant weaknesses. WEP attempts to provide security by encrypting data over radio waves so that it is protected as it is point to another. However, it has been found that WEP is not as secure as once believed. whitelist A list of Web sites that users are allowed
  • McAfee MIS08EMB3RUA | User Guide - Page 248
    McAfee Internet Security worm A self-replicating virus class security and do not have access to authentication servers. In this mode, the home user manually devices often support multiple encryption modes (for example, AES, TKIP) simultaneously, while older devices generally support only a single
  • McAfee MIS08EMB3RUA | User Guide - Page 249
    Management, delivers proactive and proven solutions and services that secure systems and networks around the world. With its unmatched security expertise and commitment to innovation, McAfee empowers home users, businesses, the public sector, and service providers with the ability to block attacks
  • McAfee MIS08EMB3RUA | User Guide - Page 250
    248 McAfee Internet Security License NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO MCAFEE, INC. OR THE PLACE OF PURCHASE FOR A FULL REFUND.
  • McAfee MIS08EMB3RUA | User Guide - Page 251
    fix or ignore all non-critical problems. If you need help diagnosing your protection problems, you can run McAfee Virtual Technician. For more information about McAfee Virtual Technician, see the McAfee Virtual Technician help. If you purchased your security software from a partner or provider other
  • McAfee MIS08EMB3RUA | User Guide - Page 252
    250 McAfee Internet Security Using McAfee Virtual Technician Like a personal, technical support representative, Virtual Technician collects information about your SecurityCenter programs so that it can help resolve your computer's protection problems. When you run Virtual Technician, it checks to
  • McAfee MIS08EMB3RUA | User Guide - Page 253
    the following tables for the McAfee Support and Download sites in your country, including User Guides. Support and Downloads Country McAfee Support McAfee Downloads Australia www.mcafeehelp.com au.mcafee.com/root/do wnloads.asp Brazil www.mcafeeajuda.com br.mcafee.com/root/do wnloads.asp
  • McAfee MIS08EMB3RUA | User Guide - Page 254
    root/do wnloads.asp es.mcafee.com/root/do wnloads.asp se.mcafee.com/root/do wnloads.asp tr.mcafee.com/root/do wnloads.asp us.mcafee.com/root/do wnloads.asp McAfee Total Protection User Guides Country McAfee User Guides Australia download.mcafee.com/products/manuals/en-au/MTP_us erguide_2008.pdf
  • McAfee MIS08EMB3RUA | User Guide - Page 255
    uide_2008.pdf Turkey download.mcafee.com/products/manuals/tr/MTP_userg uide_2008.pdf United States download.mcafee.com/products/manuals/en-us/MTP_us erguide_2008.pdf McAfee Internet Security User Guides Country McAfee User Guides Australia download.mcafee.com/products/manuals/en-au/MIS_us
  • McAfee MIS08EMB3RUA | User Guide - Page 256
    pdf United States download.mcafee.com/products/manuals/en-us/MIS_use rguide_2008.pdf McAfee VirusScan Plus User Guides Country McAfee User Guides Australia download.mcafee.com/products/manuals/en-au/VSP_us erguide_2008.pdf Brazil download.mcafee.com/products/manuals/pt-br/VSP_use rguide_2008
  • McAfee MIS08EMB3RUA | User Guide - Page 257
    uide_2008.pdf Finland download.mcafee.com/products/manuals/fi/VSP_usergu ide_2008.pdf France download.mcafee.com/products/manuals/fr/VSP_usergu ide_2008.pdf Germany download.mcafee.com/products/manuals/de/VSP_userg uide_2008.pdf Great Britain download.mcafee.com/products/manuals/en-uk/VSP_us
  • McAfee MIS08EMB3RUA | User Guide - Page 258
    256 McAfee Internet Security McAfee VirusScan User Guides Country McAfee User Guides Australia download.mcafee.com/products/manuals/en-au/VS_user guide_2008.pdf Brazil download.mcafee.com/products/manuals/pt-br/VS_user guide_2008.pdf Canada (English) download.mcafee.com/products/manuals/en-
  • McAfee MIS08EMB3RUA | User Guide - Page 259
    VS_usergui de_2008.pdf United States download.mcafee.com/products/manuals/en-us/VS_user guide_2008.pdf Consult the following table for the McAfee Threat Center and Virus Information sites in your country. Country Security Headquarters Virus Information Australia www.mcafee.com/us/threat_ce au
  • McAfee MIS08EMB3RUA | User Guide - Page 260
    258 McAfee Internet Security Holland www.mcafee.com/us/threat_ce nl.mcafee.com/virusInf nter o Italy www.mcafee.com/us/threat_cent it.mcafee.com/virusInf er o Japan www.mcafee.com/us/threat_cent jp.mcafee.com/virusInf er o Korea www.mcafee.com/us/threat_cent kr.mcafee.com/virusInf er
  • McAfee MIS08EMB3RUA | User Guide - Page 261
    Chapter 46 About McAfee 259 France Germany Great Britain Holland www.hackerwatch.org/?lang=fr www.hackerwatch.org/?lang=de www.hackerwatch.org www.hackerwatch.org/?lang=nl Italy
  • McAfee MIS08EMB3RUA | User Guide - Page 262
    a friend from the Anti-Spam toolbar 126 Add a friend manually 126 Add a McAfee user 150 Add a password 164 Add a personal filter 133 address book 124 Allow a Web site 157 Allow access to an existing system service port 93 Allow full access for a new program .......84 Allow full access for
  • McAfee MIS08EMB3RUA | User Guide - Page 263
    Support service Edit a McAfee user's account problems automatically .18 Fix protection problems manually.........18 Fix security vulnerabilities 212 Fixing or ignoring protection problems .8, 17 Fixing protection problems 8, 18 Fixing security virus outbreak alerts 25 home network 236 hotspot 237
  • McAfee MIS08EMB3RUA | User Guide - Page 264
    McAfee Anti-Spam 117 McAfee Data Backup 167 McAfee EasyNetwork 215 McAfee Internet Security 3 McAfee Network Manager 197 McAfee Personal Firewall 61 McAfee Privacy Service 145 McAfee QuickClean 181 McAfee SecurityCenter 5 McAfee Shredder 193 McAfee on-demand scan 239 online backup
  • McAfee MIS08EMB3RUA | User Guide - Page 265
    types 171 Set manual scan location 41 Set manual scan options 40 Set real-time scan options 38 Set security level to Lockdown 73 Set security level to Open 75 Set security level to Standard 74 Set security level to Stealth 73 Set security level to Tight 74 Set security level to Trusting
  • McAfee MIS08EMB3RUA | User Guide - Page 266
    manually 126 Setting up Parental Controls 147 Setting up the Password Vault 164 Setting up virus ignored problems virus protection 31 Start script scanning virus protection 31 Stop sharing a file 224 Stop sharing a printer 230 Stop trusting computers on the network 207 Support services McAfee
  • McAfee MIS08EMB3RUA | User Guide - Page 267
    with quarantined programs and cookies 59 Work with viruses and Trojans 57 Working with alerts 14, 21, 67 Working with archived files 175 Working with filtered e-mail 141 Working with McAfee users ..........149, 150 Working with scan results 57 Working with shared printers 230 Working with
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267

User Guide