McAfee MIS09EMB3RAA User Guide - Page 64

Personal Firewall features

Page 64 highlights

62 McAfee Internet Security Personal Firewall features Standard and custom protection levels Guard against intrusion and suspicious activity using Firewall's default or customizable protection settings. Real-time recommendations Intelligent access management for programs Receive recommendations, dynamically, to help you decide whether programs should be allowed Internet access or network traffic should be trusted. Manage Internet access for programs, through alerts and event logs, and configure access permissions for specific programs. Gaming protection Computer startup protection Prevent alerts regarding intrusion attempts and suspicious activities from distracting you during full-screen gameplay. Protect your computer from intrusion attempts, unwanted programs and network traffic as soon as Windows® starts. System service port control Manage open and closed system service ports required by some programs. Manage computer connections Allow and block remote connections between other computers and your computer. HackerWatch information integration Lockdown Firewall Restore Firewall Track global hacking and intrusion patterns through HackerWatch's Web site, which also provides current security information about programs on your computer, as well as global security events and Internet port statistics. Block all inbound and outbound traffic instantly between your computer and the Internet. Restore Firewall's original protection settings instantly. Advanced Trojan detection Event logging Detect and block potentially malicious applications, such as Trojans, from sending your personal data to the Internet. Track recent inbound, outbound, and intrusion events. Monitor Internet traffic Intrusion prevention Sophisticated traffic analysis Review worldwide maps showing the source of hostile attacks and traffic. In addition, locate detailed owner information and geographical data for originating IP addresses. Also, analyze inbound and outbound traffic, monitor program bandwidth and program activity. Protect your privacy from possible Internet threats. Using heuristic-like functionality, we provide a tertiary layer of protection by blocking items that display symptoms of attacks or characteristics of hacking attempts. Review both inbound and outbound Internet traffic and program connections, including those that are actively listening for open connections. This allows you to see and act upon programs that can be vulnerable to intrusion.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274

62
McAfee Internet Security
Personal Firewall features
Standard and custom
protection levels
Guard against intrusion and suspicious activity using Firewall's
default or customizable protection settings.
Real-time
recommendations
Receive recommendations, dynamically, to help you decide
whether programs should be allowed Internet access or network
traffic should be trusted.
Intelligent access
management for programs
Manage Internet access for programs, through alerts and event
logs, and configure access permissions for specific programs.
Gaming protection
Prevent alerts regarding intrusion attempts and suspicious
activities from distracting you during full-screen gameplay.
Computer startup
protection
Protect your computer from intrusion attempts, unwanted
programs and network traffic as soon as Windows® starts.
System service port control
Manage open and closed system service ports required by some
programs.
Manage computer
connections
Allow and block remote connections between other computers
and your computer.
HackerWatch information
integration
Track global hacking and intrusion patterns through
HackerWatch's Web site, which also provides current security
information about programs on your computer, as well as global
security events and Internet port statistics.
Lockdown Firewall
Block all inbound and outbound traffic instantly between your
computer and the Internet.
Restore Firewall
Restore Firewall's original protection settings instantly.
Advanced Trojan detection
Detect and block potentially malicious applications, such as
Trojans, from sending your personal data to the Internet.
Event logging
Track recent inbound, outbound, and intrusion events.
Monitor Internet traffic
Review worldwide maps showing the source of hostile attacks and
traffic. In addition, locate detailed owner information and
geographical data for originating IP addresses. Also, analyze
inbound and outbound traffic, monitor program bandwidth and
program activity.
Intrusion prevention
Protect your privacy from possible Internet threats. Using
heuristic-like functionality, we provide a tertiary layer of
protection by blocking items that display symptoms of attacks or
characteristics of hacking attempts.
Sophisticated traffic
analysis
Review both inbound and outbound Internet traffic and program
connections, including those that are actively listening for open
connections. This allows you to see and act upon programs that
can be vulnerable to intrusion.