McAfee MTP08EMB3RCA User Guide

McAfee MTP08EMB3RCA - Total Protection 2008 Manual

McAfee MTP08EMB3RCA manual content summary:

  • McAfee MTP08EMB3RCA | User Guide - Page 1
    User Guide
  • McAfee MTP08EMB3RCA | User Guide - Page 2
  • McAfee MTP08EMB3RCA | User Guide - Page 3
    protection problems 17 Working with alerts 21 Viewing events...27 McAfee VirusScan ...29 VirusScan features 30 Starting real-time virus protection 31 Starting additional protection 33 Setting up virus protection 37 Scanning your computer 53 Working with scan results 57 McAfee Personal
  • McAfee MTP08EMB3RCA | User Guide - Page 4
    up a managed network 201 Managing the network remotely 209 McAfee EasyNetwork...215 EasyNetwork features 216 Setting up EasyNetwork 217 Sharing 233 About McAfee 247 Copyright ...247 License ...248 Customer and Technical Support 249 Using McAfee Virtual Technician 250 Support and Downloads
  • McAfee MTP08EMB3RCA | User Guide - Page 5
    McAfee's security service you always have the latest enhancements and threat updates that block viruses and spyware. Also, it includes a firewall to deter hacking. In this chapter McAfee SecurityCenter 5 McAfee VirusScan 29 McAfee Personal Firewall 61 McAfee Anti-Spam 117 McAfee Privacy Service
  • McAfee MTP08EMB3RCA | User Guide - Page 6
  • McAfee MTP08EMB3RCA | User Guide - Page 7
    review SecurityCenter events, such as virus scanning configuration changes, in an event log. Note: SecurityCenter reports critical and non-critical protection problems as soon as it detects them. If you need help diagnosing your protection problems, you can run McAfee Virtual Technician. In this
  • McAfee MTP08EMB3RCA | User Guide - Page 8
    . When a new version of a registered McAfee program is available, you get it at no charge while your subscription is valid, ensuring that you always have up-to-date protection. Real-time alerting Security alerts notify you of emergency virus outbreaks and security threats, and provide options to
  • McAfee MTP08EMB3RCA | User Guide - Page 9
    in this image, see Understanding protection status (page 8) and Understanding protection categories (page 9). Then, you can review your McAfee account information and verifying the validity of your subscription. In this chapter Understanding protection status 8 Understanding protection categories
  • McAfee MTP08EMB3RCA | User Guide - Page 10
    protection status area on the SecurityCenter Home pane is green and states that you are protected. SecurityCenter does not report any critical or non-critical security problems. Each protection category lists the services that are protecting your computer.
  • McAfee MTP08EMB3RCA | User Guide - Page 11
    Parental Controls. These categories help you to browse and configure the security services protecting your computer. You click a category name to configure its protection services and view any security problems detected for those services. If your computer's protection status is red or yellow, one
  • McAfee MTP08EMB3RCA | User Guide - Page 12
    components that you configure to protect your computer. Protection services directly correspond to McAfee programs. For example, when you install VirusScan, the following protection services become available: Virus Protection, PUP Protection, System Monitors, and Windows Protection. For
  • McAfee MTP08EMB3RCA | User Guide - Page 13
    If you installed your McAfee programs from a CD, you must register them on the McAfee Web site to set up or update your McAfee account. Only then are . 1 Under Common Tasks, click My Account. 2 Log in to your McAfee account. Verify your subscription You verify your subscription to ensure that it has
  • McAfee MTP08EMB3RCA | User Guide - Page 14
  • McAfee MTP08EMB3RCA | User Guide - Page 15
    SecurityCenter SecurityCenter ensures that your registered McAfee programs are current by checking for and installing online updates every four hours. Depending on the programs you have installed and registered, online updates may include the latest virus definitions and hacker, spam, spyware, or
  • McAfee MTP08EMB3RCA | User Guide - Page 16
    McAfee buttons: ƒ Install the updates automatically and notify me when my services are updated (recommended) ƒ Download the updates automatically and notify me computer will not have the latest security protection. For information about checking for updates manually, see Check for updates (page
  • McAfee MTP08EMB3RCA | User Guide - Page 17
    Chapter 4 McAfee Total Protection 15 1. Under Common Tasks, click Home. 2. On the right pane, under SecurityCenter Information, click Configure automatic updates by clicking the On button or by clearing Disable automatic updating and let me manually check for updates on the Update Options pane.
  • McAfee MTP08EMB3RCA | User Guide - Page 18
  • McAfee MTP08EMB3RCA | User Guide - Page 19
    status, you must fix all critical problems and either fix or ignore all non-critical problems. If you need help diagnosing your protection problems, you can run McAfee Virtual Technician. For more information about McAfee Virtual Technician, see the McAfee Virtual Technician help. In this chapter
  • McAfee MTP08EMB3RCA | User Guide - Page 20
    18 McAfee Total Protection Fixing protection problems Most security problems can be fixed automatically; however, some problems may require might take when fixing protection problems manually: Problem Action A full scan of your computer has Scan your computer manually. For not been performed in
  • McAfee MTP08EMB3RCA | User Guide - Page 21
    Chapter 5 McAfee Total Protection 19 Ignoring protection problems If SecurityCenter detects a non-critical problem, you can either fix or ignore it. Other non-critical problems (for example, if Anti-Spam or Privacy Service are not installed) are automatically ignored. Ignored problems are not shown
  • McAfee MTP08EMB3RCA | User Guide - Page 22
  • McAfee MTP08EMB3RCA | User Guide - Page 23
    well as recommendations and options for resolving problems that may be associated with the event. Some alerts also contain links to additional information about the event. These links let you launch McAfee's global Web site or send information to McAfee for troubleshooting. There are three types of
  • McAfee MTP08EMB3RCA | User Guide - Page 24
    22 McAfee Total Protection Showing and hiding informational alerts Informational alerts notify you when events occur that do not pose threats to your computer's security. For example, if you have set up Firewall Protection, an informational alert appears by default whenever a program on your
  • McAfee MTP08EMB3RCA | User Guide - Page 25
    Chapter 6 McAfee Total Protection 23 Show or hide informational alerts when gaming You can hide informational alerts when you are playing a game in full-screen mode on
  • McAfee MTP08EMB3RCA | User Guide - Page 26
    starts. You can also hide alerts that notify you about virus outbreaks and other security threats in the online community. Play a sound with alerts check box. Hide the splash screen at startup By default, the McAfee splash screen appears briefly when Windows starts, notifying you that SecurityCenter
  • McAfee MTP08EMB3RCA | User Guide - Page 27
    Chapter 6 McAfee Total Protection 25 Hide virus outbreak alerts You can hide alerts that notify you about virus outbreaks and other security threats in the online community. 1 Open the Alert Options pane. How? 1. Under Common Tasks, click Home. 2. On the right pane, under SecurityCenter Information,
  • McAfee MTP08EMB3RCA | User Guide - Page 28
  • McAfee MTP08EMB3RCA | User Guide - Page 29
    record different types of events. For example, SecurityCenter records an event if a protection service is enabled or disabled; Virus Protection records an event each time a virus is detected and removed; and Firewall Protection records an event each time an Internet connection attempt is blocked
  • McAfee MTP08EMB3RCA | User Guide - Page 30
  • McAfee MTP08EMB3RCA | User Guide - Page 31
    as it detects them. If you need help diagnosing your protection problems, you can run McAfee Virtual Technician. In this chapter VirusScan features 30 Starting real-time virus protection 31 Starting additional protection 33 Setting up virus protection 37 Scanning your computer 53 Working with
  • McAfee MTP08EMB3RCA | User Guide - Page 32
    30 McAfee Total Protection VirusScan features VirusScan provides the following features. Comprehensive virus protection VirusScan's advanced detection and protection services defend you and your computer from the latest security threats, including viruses, Trojans, tracking cookies, spyware,
  • McAfee MTP08EMB3RCA | User Guide - Page 33
    about real-time and manual scanning, see Scanning your computer (page 53). Although rare, there may be times when you want to temporarily stop real-time scanning (for example, to change some scanning options or troubleshoot a performance issue). When real-time virus protection is disabled, your
  • McAfee MTP08EMB3RCA | User Guide - Page 34
    32 McAfee Total Protection 1. On the left pane, click Advanced Menu. 2. Click Configure. 3. On the Configure pane, click Computer & Files. 2 Under Virus protection, click Off. 3 In the dialog box, select when to resume real-time scanning. 4 Click OK.
  • McAfee MTP08EMB3RCA | User Guide - Page 35
    virus protection, VirusScan provides advanced protection against scripts, spyware, and potentially harmful e-mail and instant message attachments. By default, script scanning messaging protection Instant messaging protection detects potential security threats from instant message attachments that you
  • McAfee MTP08EMB3RCA | User Guide - Page 36
    34 McAfee Total Protection Start script scanning protection Turn on script scanning protection to detect potentially harmful scripts and prevent them from running on your computer. Script scanning protection alerts you when a script tries to create, copy, or delete files on your computer, or make
  • McAfee MTP08EMB3RCA | User Guide - Page 37
    Chapter 9 McAfee Total Protection 35 1. On the left pane, click Advanced Menu. 2. Click Configure. to e-mail threats. Start instant messaging protection Turn on instant messaging protection to detect security threats that can be included in inbound instant message attachments. 1 Open the E-mail
  • McAfee MTP08EMB3RCA | User Guide - Page 38
  • McAfee MTP08EMB3RCA | User Guide - Page 39
    37 CHAPTER 10 Setting up virus protection VirusScan provides two types of virus protection: real-time and manual. Real-time virus protection scans files each time you or your computer access them. Manual virus protection lets you scan files on demand. You can set different options for each type of
  • McAfee MTP08EMB3RCA | User Guide - Page 40
    computer becomes more vulnerable to security attacks. Set real-time scan options You set real-time scan options to customize what VirusScan looks for during a real-time scan, as well as the locations and file types it scans. Options include scanning for unknown viruses and tracking cookies as well
  • McAfee MTP08EMB3RCA | User Guide - Page 41
    Chapter 10 McAfee Total Protection 39 To... Detect cookies Do this... Select the Scan and remove tracking cookies check box. Detect viruses and other potential threats on drives that are connected to your network Select the Scan network drives check box. Protect your computer from Select the
  • McAfee MTP08EMB3RCA | User Guide - Page 42
    40 McAfee Total Protection Setting manual scan options Manual virus protection lets you scan files on demand. When you start a manual scan, VirusScan checks your computer for viruses and other potentially harmful items using a more comprehensive set of scanning options. To change manual scanning
  • McAfee MTP08EMB3RCA | User Guide - Page 43
    either All files (recommended) or Program files and documents only. Set manual scan location You set the manual scan location to determine where VirusScan looks for viruses and other harmful items during a manual scan. You can scan all files, folders, and drives on your computer or you can restrict
  • McAfee MTP08EMB3RCA | User Guide - Page 44
    Computer & Files Configuration pane, ensure that virus protection is enabled, and click Advanced. 5. Click Manual Scan in the Virus Protection pane. 2 Click Default Location to Scan. 3 Specify your manual scanning location, and then click OK. To... Do this... Scan all the files and Select the
  • McAfee MTP08EMB3RCA | User Guide - Page 45
    & Files information area, click Configure. 4. On the Computer & Files Configuration pane, ensure that virus protection is enabled, and click Advanced. 5. Click Scheduled Scan in the Virus Protection pane. 2 Select Enable scheduled scanning. 3 To reduce the amount of processor power normally used for
  • McAfee MTP08EMB3RCA | User Guide - Page 46
    McAfee Total Protection Using SystemGuards options SystemGuards monitor, log, report, and manage potentially unauthorized changes made to the Windows registry or critical system files on your computer. Unauthorized registry and file changes can harm your computer, compromise its security service
  • McAfee MTP08EMB3RCA | User Guide - Page 47
    Chapter 10 McAfee Total Protection 45 Like Program and Windows SystemGuards, Browser SystemGuards , and Internet Explorer. Unauthorized registry and file changes can harm your computer, compromise its security, and damage valuable system files. 1 Open the SystemGuards pane. 1. Under Common Tasks,
  • McAfee MTP08EMB3RCA | User Guide - Page 48
    46 McAfee Total Protection ƒ Browser SystemGuards 3 Under I want to, do one of the following: unwanted programs that can install Windows shell execute hooks to prevent security programs from running properly. Shell Service Object Delay Load Spyware, adware, and other potentially unwanted programs
  • McAfee MTP08EMB3RCA | User Guide - Page 49
    Chapter 10 McAfee Total Protection 47 Windows SystemGuards technology helps prevent your computer Spyware, adware, and other potentially Layered Service unwanted programs that can install registry Providers changes to Winsock Layered Service Providers (LSPs) to intercept and change information
  • McAfee MTP08EMB3RCA | User Guide - Page 50
    48 McAfee Total Protection SystemGuard Detects... Windows Messenger Service Spyware, adware, and other potentially unwanted programs that can make registry changes to the Windows messenger service, allowing unsolicited ads and remotely run programs on your computer. Windows Win.ini File
  • McAfee MTP08EMB3RCA | User Guide - Page 51
    Chapter 10 McAfee Total Protection 49 SystemGuard Detects... Internet Explorer Restrictions Spyware, adware, and other potentially unwanted programs that can make registry changes to Internet Explorer restrictions, affecting browser settings and options. Internet Explorer Security Zones Spyware
  • McAfee MTP08EMB3RCA | User Guide - Page 52
    50 McAfee Total Protection Using trusted lists If VirusScan detects a file or registry change ( 4. On the Computer & Files Configuration pane, ensure that virus protection is enabled, and click Advanced. 5. Click Trusted Lists in the Virus Protection pane. 2 Select one of the following trusted list
  • McAfee MTP08EMB3RCA | User Guide - Page 53
    Chapter 10 McAfee Total Protection 51 4 that you have chosen to allow from an alert of from the Scan results pane. There are five types of trusted list types that service object delay load activity. These types of unauthorized registry and file changes can harm your computer, compromise its security
  • McAfee MTP08EMB3RCA | User Guide - Page 54
    chosen to allow from an alert or from the Scan Results pane. Browser SystemGuards detect unauthorized registry changes and other unwanted behavior associated with Browser helper objects, Internet Explorer add-ons, Internet Explorer URLs, Internet Explorer security zones, and so on. These types of
  • McAfee MTP08EMB3RCA | User Guide - Page 55
    computer stays protected against the latest security threats, leave real-time virus protection on and set up a schedule for regular, more comprehensive manual scans. For more information about setting real-time and manual scan options, see Setting up virus protection (page 37). VirusScan provides
  • McAfee MTP08EMB3RCA | User Guide - Page 56
    54 McAfee Total Protection Scan your computer You can run a manual scan from either the Advanced or Basic menu in SecurityCenter. If you run a scan from the Advanced menu, you can confirm your manual scan options before scanning. If you run a scan from the Basic menu, VirusScan starts scanning
  • McAfee MTP08EMB3RCA | User Guide - Page 57
    View details about detected items, infection status, and type. Do this... Double-click the Scan completed icon in the notification area on your taskbar. Double-click the Scan completed icon in the notification area on your taskbar, and then click View Results on the Scan Progress: Manual Scan pane.
  • McAfee MTP08EMB3RCA | User Guide - Page 58
  • McAfee MTP08EMB3RCA | User Guide - Page 59
    57 CHAPTER 12 Working with scan results If VirusScan detects a security threat while running a real-time or manual scan, it tries to handle the threat automatically according to the threat type. For example, If VirusScan detects a virus, Trojan, or tracking cookie on your computer, it tries to clean
  • McAfee MTP08EMB3RCA | User Guide - Page 60
    58 McAfee Total Protection 1. Double-click the Scan completed icon in the notification area at the far right of your taskbar. 2. On the Scan Progress: Manual Scan pane, click View Results. 2 In the scan results list, click Viruses and Trojans. Note: To work with the files that VirusScan has
  • McAfee MTP08EMB3RCA | User Guide - Page 61
    Chapter 12 McAfee Total Protection 59 ƒ To remove the infected file from your computer, click Remove. 4 Click Yes to confirm your selected option. Tip: You can restore or
  • McAfee MTP08EMB3RCA | User Guide - Page 62
  • McAfee MTP08EMB3RCA | User Guide - Page 63
    your protection problems, you can run McAfee Virtual Technician. In this chapter Personal Firewall features 62 Starting Firewall 65 Working with alerts 67 Managing informational alerts 69 Configuring Firewall protection 71 Managing programs and permissions 83 Managing system services 91
  • McAfee MTP08EMB3RCA | User Guide - Page 64
    service ports required by some programs. Manage computer connections Allow and block remote connections between other computers and your computer. HackerWatch information integration Track global hacking and intrusion patterns through HackerWatch's Web site, which also provides current security
  • McAfee MTP08EMB3RCA | User Guide - Page 65
    , monitor program bandwidth and program activity. Intrusion prevention Protect your privacy from possible Internet threats. Using heuristic-like functionality, McAfee provides a tertiary layer of protection by blocking items that display symptoms of attacks or characteristics of hacking attempts
  • McAfee MTP08EMB3RCA | User Guide - Page 66
  • McAfee MTP08EMB3RCA | User Guide - Page 67
    access for known and unknown programs. Smart Recommendations and Trusting security level (with the option selected to allow programs outbound-only as well as manage inbound and outbound Internet connections. 1 On the McAfee SecurityCenter pane, click Internet & Network, and then click Configure. 2
  • McAfee MTP08EMB3RCA | User Guide - Page 68
    from intrusion and unwanted network traffic. When Firewall is disabled, you cannot manage inbound or outbound Internet connections. 1 On the McAfee SecurityCenter pane, click Internet & Network, and then click Configure. 2 On the Internet & Network Configuration pane, under Firewall protection is
  • McAfee MTP08EMB3RCA | User Guide - Page 69
    67 CHAPTER 15 Working with alerts Firewall employs an array of alerts to help you manage your security. These alerts can be grouped into three basic types: ƒ Red alert ƒ Yellow alert ƒ Green alert Alerts can also contain information to help you decide how
  • McAfee MTP08EMB3RCA | User Guide - Page 70
    detects, then blocks, a Trojan on your computer, and recommends that you scan for additional threats. A Trojan appears to be a legitimate program, but can manage your computer's security, which includes the following: ƒ Learn more about this program: Launch McAfee's global security Web site to get
  • McAfee MTP08EMB3RCA | User Guide - Page 71
    You can prevent Firewall informational alerts from being displayed when it detects intrusion attempts or suspicious activity. 1 On the McAfee SecurityCenter pane, click Advanced Menu. 2 Click Configure. 3 On the SecurityCenter Configuration pane, under Alerts, click Advanced. 4 On the SecurityCenter
  • McAfee MTP08EMB3RCA | User Guide - Page 72
  • McAfee MTP08EMB3RCA | User Guide - Page 73
    Firewall protection Firewall offers a number of methods to manage your security and to tailor the way you want to respond to security events and alerts. After you install Firewall for the first time, your computer's protection security level is set to Trusting and your programs are allowed outbound
  • McAfee MTP08EMB3RCA | User Guide - Page 74
    72 McAfee Total Protection Managing Firewall security levels Firewall's security levels control the degree to which you want to manage and respond to alerts. These alerts appear when it detects unwanted network traffic and inbound and outbound Internet connections. By default, Firewall's security
  • McAfee MTP08EMB3RCA | User Guide - Page 75
    -only access) from the Restore Firewall Protection Defaults pane. Set security level to Lockdown You can set Firewall's security level to Lockdown to block all inbound and outbound network connections. 1 On the McAfee SecurityCenter pane, click Internet & Network, then click Configure. 2 On the
  • McAfee MTP08EMB3RCA | User Guide - Page 76
    so that Standard displays as the current level. 4 Click OK. Set security level to Trusting You can set Firewall's security level to Trusting to allow either full access or outbound-only network access. 1 On the McAfee SecurityCenter pane, click Internet & Network, then click Configure. 2 On the
  • McAfee MTP08EMB3RCA | User Guide - Page 77
    Click OK. Note: The Allow Outbound-Only Access is the default option. Set security level to Open You can set Firewall's security level to Open to allow all inbound and outbound network connections. 1 On the McAfee SecurityCenter pane, click Internet & Network, then click Configure. 2 On the Internet
  • McAfee MTP08EMB3RCA | User Guide - Page 78
    how to handle alerts. When Smart Recommendations is enabled (and the security level is set to Trusting with outbound-only access enabled), Firewall alert you about unrecognized and potentially dangerous programs. 1 On the McAfee SecurityCenter pane, click Internet & Network, then click Configure. 2
  • McAfee MTP08EMB3RCA | User Guide - Page 79
    automatically blocks the program from accessing the Internet. 1 On the McAfee SecurityCenter pane, click Internet & Network, then click Configure. 2 under Firewall protection is enabled, click Advanced. 3 On the Security Level pane, under Smart Recommendations, select Disable Smart Recommendations.
  • McAfee MTP08EMB3RCA | User Guide - Page 80
    of Service attacks or exploits. Using the standard installation settings ensures that you are protected against these attacks and scans; however or block. To use this option, your security level must not be set to Open or Lockdown. 1 On the McAfee SecurityCenter pane, click Internet & Network, then
  • McAfee MTP08EMB3RCA | User Guide - Page 81
    Firewall protection is enabled, click Advanced. 3 On the Security Level pane, under Security Settings, do one of the following: ƒ Select Allow ICMP Denial of Service attacks or exploits; however, you can disable automatic detection for one or more attacks or scans. 1 On the McAfee SecurityCenter
  • McAfee MTP08EMB3RCA | User Guide - Page 82
    80 McAfee Total Protection ƒ Firewall is set to Open security level. ƒ Firewall service is not running. ƒ Firewall Protection is not installed on your computer. ƒ Your Windows Firewall is disabled. ƒ Outbound firewall is not installed on your computer. 4 Click OK.
  • McAfee MTP08EMB3RCA | User Guide - Page 83
    and outbound network traffic to help you isolate and troubleshoot a problem on your computer. Lock Firewall instantly You can lock Firewall to instantly block all network traffic between your computer and the Internet. 1 On the McAfee SecurityCenter pane, under Common Tasks, click Lockdown Firewall
  • McAfee MTP08EMB3RCA | User Guide - Page 84
    permissions in the Program Permissions pane, removes trusted and banned IP addresses, and restores system services, event log settings, and intrusion detection. 1 On the McAfee SecurityCenter pane, click Restore Firewall Defaults. 2 On the Restore Firewall Protection Defaults pane, click Restore
  • McAfee MTP08EMB3RCA | User Guide - Page 85
    83 CHAPTER 18 Managing programs and permissions Firewall allows you to manage and create access permissions for existing and new programs that require inbound and outbound Internet access. Firewall lets you control full or outbound-only access for programs. You can also block access for programs. In
  • McAfee MTP08EMB3RCA | User Guide - Page 86
    for a new program You can allow a new program on your computer to have full inbound and outbound Internet access. 1 On the McAfee SecurityCenter pane, click Internet & Network, then click Configure. 2 On the Internet & Network Configuration pane, under Firewall protection is enabled, click Advanced
  • McAfee MTP08EMB3RCA | User Guide - Page 87
    can allow an existing blocked program that appears in the Recent Events log to have full inbound and outbound Internet access. 1 On the McAfee SecurityCenter pane, click Advanced Menu. 2 Click Reports & Logs. 3 Under Recent Events, select the event description, and then click Allow Access. 4 In the
  • McAfee MTP08EMB3RCA | User Guide - Page 88
    log You can allow an existing blocked program that appears in the Recent Events log to have outbound-only Internet access. 1 On the McAfee SecurityCenter pane, click Advanced Menu. 2 Click Reports & Logs. 3 Under Recent Events, select the event description, and then click Allow Outbound-Only Access
  • McAfee MTP08EMB3RCA | User Guide - Page 89
    to function properly. Block access for a program You can block a program from having inbound and outbound Internet access. 1 On the McAfee SecurityCenter pane, click Internet & Network, then click Configure. 2 On the Internet & Network Configuration pane, under Firewall protection is enabled, click
  • McAfee MTP08EMB3RCA | User Guide - Page 90
    Events log You can block a program that appears in the Recent Events log from having inbound and outbound Internet access. 1 On the McAfee SecurityCenter pane, click Advanced Menu. 2 Click Reports & Logs. 3 Under Recent Events, select the event description, and then click Block Access. 4 In the
  • McAfee MTP08EMB3RCA | User Guide - Page 91
    your network connection. Remove a program permission You can remove a program from having any inbound or outbound Internet access. 1 On the McAfee SecurityCenter pane, click Internet & Network, then click Configure. 2 On the Internet & Network Configuration pane, under Firewall protection is enabled
  • McAfee MTP08EMB3RCA | User Guide - Page 92
    's HackerWatch Web site, which provides up-to-date information about programs, Internet access requirements, and security threats. 1 On the McAfee SecurityCenter pane, click Internet & Network, then click Configure. 2 On the Internet & Network Configuration pane, under Firewall protection is enabled
  • McAfee MTP08EMB3RCA | User Guide - Page 93
    Web servers and file-sharing server programs) must accept unsolicited connections from other computers through designated system service ports. Typically, Firewall closes these system service ports because they represent the most likely source of insecurities in your system. To accept connections
  • McAfee MTP08EMB3RCA | User Guide - Page 94
    McAfee Total Protection Configuring system service ports System service ports can be configured to allow or block remote network access to a service on your computer. The list below shows the common system services Procedure Calls (RPC) Port 135 ƒ Secure Web Server (HTTPS) Port 443 ƒ Universal
  • McAfee MTP08EMB3RCA | User Guide - Page 95
    existing port to allow remote access to a network service on your computer. Note: An open system service port can make your computer vulnerable to Internet security threats; therefore, only open a port if necessary. 1 On the McAfee SecurityCenter pane, click Internet & Network, then click Configure
  • McAfee MTP08EMB3RCA | User Guide - Page 96
    port You can modify inbound and outbound network access information about an existing system service port. Note: If port information is entered incorrectly, the system service fails. 1 On the McAfee SecurityCenter pane, click Internet & Network, then click Configure. 2 On the Internet & Network
  • McAfee MTP08EMB3RCA | User Guide - Page 97
    from your computer. After removal, remote computers can no longer access the network service on your computer. 1 On the McAfee SecurityCenter pane, click Internet & Network, then click Configure. 2 On the Internet & Network Configuration pane, under Firewall protection is enabled, click Advanced
  • McAfee MTP08EMB3RCA | User Guide - Page 98
  • McAfee MTP08EMB3RCA | User Guide - Page 99
    to infection. In addition, McAfee recommends that the computer(s) you trust are protected by a firewall and an up-to-date antivirus program also. Firewall does DNS or DHCP server, or other ISP-related servers. Depending on your security settings, Firewall can alert you when it detects an event from a
  • McAfee MTP08EMB3RCA | User Guide - Page 100
    through a worm or other mechanism, your computer can be vulnerable to infection. In addition, McAfee recommends that the computer(s) you trust are protected by a firewall and an up-to-date antivirus program also. Add a trusted computer connection You can add a trusted computer connection and its
  • McAfee MTP08EMB3RCA | User Guide - Page 101
    Chapter 20 McAfee Total Protection 99 6 If a system service uses Internet Connection Sharing (ICS), you can add the Note: For more information about Internet Connection Sharing (ICS), see Configure a new system service. Add a trusted computer from the Inbound Events log You can add a trusted computer
  • McAfee MTP08EMB3RCA | User Guide - Page 102
    private network. Remove a trusted computer connection You can remove a trusted computer connection and its associated IP address. 1 On the McAfee SecurityCenter pane, click Internet & Network, then click Configure. 2 On the Internet & Network Configuration pane, under Firewall protection is enabled
  • McAfee MTP08EMB3RCA | User Guide - Page 103
    your DNS or DHCP server, or other ISP-related servers. Depending on your security settings, Firewall can alert you when it detects an event from a banned DNS or DHCP server, or other ISP-related servers. 1 On the McAfee SecurityCenter pane, click Internet & Network, then click Configure. 2 On the
  • McAfee MTP08EMB3RCA | User Guide - Page 104
    Total Protection Edit a banned computer connection You can edit a banned computer connection and its associated IP address. 1 On the McAfee SecurityCenter pane, click Internet & Network, then click Configure. 2 On the Internet & Network Configuration pane, under Firewall protection is enabled, click
  • McAfee MTP08EMB3RCA | User Guide - Page 105
    inbound Internet traffic, to ban an IP address that you suspect is the source of suspicious or undesirable Internet activity. 1 On the McAfee SecurityCenter pane, under Common Tasks, click Advanced Menu. 2 Click Reports & Logs. 3 Under Recent Events, click View Log. 4 Click Internet & Network, and
  • McAfee MTP08EMB3RCA | User Guide - Page 106
  • McAfee MTP08EMB3RCA | User Guide - Page 107
    105 CHAPTER 21 Logging, monitoring, and analysis Firewall provides extensive and easy-to-read logging, monitoring, and analysis for Internet events and traffic. Understanding Internet traffic and events helps you manage your Internet connections. In this chapter Event Logging 106 Working with
  • McAfee MTP08EMB3RCA | User Guide - Page 108
    106 McAfee Total Protection Event Logging Firewall allows you to enable or include the following: ƒ Blocked Programs ƒ ICMP Pings ƒ Traffic from Banned IP Addresses ƒ Events on System Service Ports ƒ Events on Unknown Ports ƒ Intrusion Detection (IDS) events 5 To prevent logging on specific ports,
  • McAfee MTP08EMB3RCA | User Guide - Page 109
    Chapter 21 McAfee Total Protection 107 View inbound events If logging is enabled, you can view inbound events. Inbound Events include the date and time, source IP address,
  • McAfee MTP08EMB3RCA | User Guide - Page 110
    Protection Working with Statistics Firewall leverages McAfee's HackerWatch security Web site to provide you with statistics about global Internet security events and port activity. View global security event statistics HackerWatch tracks worldwide Internet security events, which you can view from
  • McAfee MTP08EMB3RCA | User Guide - Page 111
    Chapter 21 McAfee Total Protection 109 Tracing Internet traffic Firewall offers a number of options for tracing Internet traffic. These options let you geographically trace a network computer, obtain domain
  • McAfee MTP08EMB3RCA | User Guide - Page 112
    110 McAfee Total Protection Trace a computer from the Inbound Events log From the Inbound Events pane, you can trace an IP address that appears in the Inbound
  • McAfee MTP08EMB3RCA | User Guide - Page 113
    Chapter 21 McAfee Total Protection 111 Trace a monitored IP address You can trace a monitored IP address to obtain a geographical view which shows the most probable route of data
  • McAfee MTP08EMB3RCA | User Guide - Page 114
    112 McAfee Total Protection Monitoring Internet traffic Firewall provides a number of methods to monitor your Internet traffic, including the following: ƒ Traffic Analysis graph: Displays recent inbound and
  • McAfee MTP08EMB3RCA | User Guide - Page 115
    Chapter 21 McAfee Total Protection 113 Analyze inbound and outbound traffic The Traffic Analysis graph is a numerical and graphical representation of inbound Select a Listening item under the program name. ƒ Computer connection: Select an IP address under the program name, system process, or service.
  • McAfee MTP08EMB3RCA | User Guide - Page 116
    114 McAfee Total Protection Note: To view the most up-to-date statistics, click Refresh under Active Programs.
  • McAfee MTP08EMB3RCA | User Guide - Page 117
    115 CHAPTER 22 Learning about Internet security Firewall leverages McAfee's security Web site, HackerWatch, to provide up-to-date information about programs and global Internet activity. HackerWatch also provides an HTML tutorial about Firewall. In this chapter Launch the HackerWatch tutorial 116
  • McAfee MTP08EMB3RCA | User Guide - Page 118
    116 McAfee Total Protection Launch the HackerWatch tutorial To learn about Firewall, you can access the HackerWatch tutorial from SecurityCenter. 1 Ensure that the Advanced Menu is enabled,
  • McAfee MTP08EMB3RCA | User Guide - Page 119
    to add them to Anti-Spam. Note: SecurityCenter reports critical and non-critical protection problems as soon as it detects them. If you need help diagnosing your protection problems, you can run McAfee Virtual Technician. In this chapter Anti-Spam features 118 Setting up your Webmail accounts 119
  • McAfee MTP08EMB3RCA | User Guide - Page 120
    processing Mark unsolicited e-mail as spam and move it to your McAfee Anti-Spam folder, or mark legitimate e-mail as not spam name). Additional support Anti-Spam supports Mozilla® Thunderbird™ 1.5 and 2.0, and provides Windows Vista™ 64-bit support for Windows Mail SSL (Secure Socket Layer) ports.
  • McAfee MTP08EMB3RCA | User Guide - Page 121
    accounts are Web-based. Filtering POP3 Webmail accounts is similar to filtering POP3 accounts. MAPI is a system designed by Microsoft that supports many types of messaging, including Internet e-mail, fax, and Exchange Server messaging. Currently, only Microsoft Outlook can work directly with MAPI
  • McAfee MTP08EMB3RCA | User Guide - Page 122
    120 McAfee Total Protection 1. On the SecurityCenter Home pane, click E-mail & IM. 2. In the E-mail & IM information area, click Configure. 3. On the E-mail & IM Configuration pane, under
  • McAfee MTP08EMB3RCA | User Guide - Page 123
    McAfee Total Protection 121 Remove a Webmail account Remove a Webmail account if you no longer want to filter its e-mail for spam. For example, if your account is not active any more or you are experiencing problems, you can remove the account while you troubleshoot your Internet Service Provider (
  • McAfee MTP08EMB3RCA | User Guide - Page 124
    122 McAfee Total Protection Checking options Option Check every Check on startup Description Anti- Never dial a connection Anti-Spam does not automatically dial a connection for you. You must manually start your dial-up connection. Dial when no When an Internet connection is not available,
  • McAfee MTP08EMB3RCA | User Guide - Page 125
    scheduled intervals (daily, weekly, or monthly) to prevent your friends list from becoming out-of-date. You can also update your Anti-Spam friends list manually, or add an entire domain if you want each user on the domain to be added to your friends list. For example, if you add
  • McAfee MTP08EMB3RCA | User Guide - Page 126
    124 McAfee Total Protection Setting up friends automatically You automatically update your list of friends by adding your address books to Anti-Spam. Adding an address book
  • McAfee MTP08EMB3RCA | User Guide - Page 127
    Chapter 25 McAfee Total Protection 125 1. On the SecurityCenter Home pane, click E-mail & IM. 2. In the E-mail & IM information area, click Configure. 3. On the E-mail & IM Configuration pane,
  • McAfee MTP08EMB3RCA | User Guide - Page 128
    126 McAfee Total Protection Setting up friends manually You manually update your list of friends by editing the entries one-by-one. For example, if you receive an e-mail from a friend whose address is not in your address book, you can manually add their e-mail address right away. The easiest way to
  • McAfee MTP08EMB3RCA | User Guide - Page 129
    Chapter 25 McAfee Total Protection 127 Add a domain Add an entire domain if you want to add every user on that domain to your friends list. For example,
  • McAfee MTP08EMB3RCA | User Guide - Page 130
    128 McAfee Total Protection Edit a domain If the information for a domain changes, you can update your friends list to ensure that Anti-Spam does not mark the
  • McAfee MTP08EMB3RCA | User Guide - Page 131
    that contains the word mortgage. If you are having issues with your e-mail, you can disable spam protection as part of your troubleshooting strategy. In this chapter Disable spam protection 129 Setting filtering options 130 Using personal filters 133 Disable spam protection You can disable spam
  • McAfee MTP08EMB3RCA | User Guide - Page 132
    130 McAfee Total Protection Setting filtering options Adjust Anti-Spam's filtering options if you want to filter messages more aggressively, specify what to look for in a message,
  • McAfee MTP08EMB3RCA | User Guide - Page 133
    Chapter 26 McAfee Total Protection 131 1. On the SecurityCenter Home pane, click E-mail & IM. 2. In the E-mail & IM information area, click Configure. 3. On the E-mail & IM Configuration pane,
  • McAfee MTP08EMB3RCA | User Guide - Page 134
    132 McAfee Total Protection Filter Description Filter messages that Looks for messages that contain invalid contain intentional formatting because invalid formatting is used HTML formatting to prevent
  • McAfee MTP08EMB3RCA | User Guide - Page 135
    the message is marked as spam and left in your Inbox or moved to the McAfee Anti-Spam folder. For more information about how spam is handled, see Modify how and sequences that can also be used in personal filters; however, McAfee only recommends using regular expressions if you are an advanced user.
  • McAfee MTP08EMB3RCA | User Guide - Page 136
    134 McAfee Total Protection Edit a personal filter Edit existing filters to fine-tune which messages are identified as spam. 1 Open the Spam Protection pane. How? 1. On the
  • McAfee MTP08EMB3RCA | User Guide - Page 137
    Chapter 26 McAfee Total Protection 135 Information Description This filter uses regular Specify character patterns used in filter expressions (RegEx) conditions. To test a character pattern, click Test.
  • McAfee MTP08EMB3RCA | User Guide - Page 138
  • McAfee MTP08EMB3RCA | User Guide - Page 139
    You can also disable Anti-Spam toolbars as part of your troubleshooting strategy when you are experiencing issues with your e-mail program. In with [SPAM] or a tag of your choice and left in your Inbox, your McAfee Anti-Spam folder (Outlook, Outlook Express, Windows Mail, Thunderbird), or your Junk
  • McAfee MTP08EMB3RCA | User Guide - Page 140
    marked You can change how spam is processed and marked. For example, you can decide whether the e-mail message is left in your Inbox or McAfee Anti-Spam folder, and change the [SPAM] or [PHISH] tag that appears in the message subject line. 1 Open the Spam Protection pane. How? 1. On the
  • McAfee MTP08EMB3RCA | User Guide - Page 141
    Chapter 27 McAfee Total Protection 139 1. On the SecurityCenter Home pane, click E-mail & IM. 2. In the E-mail & IM information area, click Configure. 3. On the E-mail & IM Configuration pane,
  • McAfee MTP08EMB3RCA | User Guide - Page 142
  • McAfee MTP08EMB3RCA | User Guide - Page 143
    spam may not be detected. When this happens, you can report spam to McAfee, where it is analyzed to create filter updates. If you are using a protection, click Advanced. 2 On the Spam Protection pane, click Reporting to McAfee. 3 Select the appropriate check boxes, and then click OK. Option Enable
  • McAfee MTP08EMB3RCA | User Guide - Page 144
    142 McAfee Total Protection Copy or delete a filtered Webmail message You can copy or delete messages that have been filtered in your Webmail account. 1 Under Common Tasks,
  • McAfee MTP08EMB3RCA | User Guide - Page 145
    whitelist. You can also edit or remove Web sites from the whitelist. You do not need to add sites such as Google®, Yahoo, or McAfee, because these Web sites are not considered fraudulent. Note: If you have SiteAdvisor installed, you do not receive Anti-Spam phishing protection because SiteAdvisor
  • McAfee MTP08EMB3RCA | User Guide - Page 146
    the Web site you want to remove, and then click Remove. Disable phishing protection If you already have phishing software that is not from McAfee and there is a conflict, you can disable Anti-Spam phishing protection. 1 On the SecurityCenter Home pane, click Internet & Network. 2 In the Internet
  • McAfee MTP08EMB3RCA | User Guide - Page 147
    habits, as well as a secure storage area for personal passwords. Before you begin using Privacy Service, you can familiarize yourself with problems as soon as it detects them. If you need help diagnosing your protection problems, you can run McAfee Virtual Technician. In this chapter Privacy Service
  • McAfee MTP08EMB3RCA | User Guide - Page 148
    146 McAfee Total Protection Privacy Service features Privacy Service provides the following features: ƒ Parental Controls , and so on) across the Web. Password Vault The Password Vault is a secure storage area for your personal passwords. It allows you to store your passwords with confidence
  • McAfee MTP08EMB3RCA | User Guide - Page 149
    147 CHAPTER 31 Setting up Parental Controls If your children use your computer, you can configure Parental Controls for them. You use Parental Controls to help regulate what your children can see and do while they browse the Web. To set up Parental Controls, you can enable or disable image filtering
  • McAfee MTP08EMB3RCA | User Guide - Page 150
    correspond to the Windows users that you have set up on your computer. However, if you upgraded from a previous version of SecurityCenter that used McAfee users, your McAfee users and their permissions are retained. Note: To configure users, you must log in to SecurityCenter as an administrator.
  • McAfee MTP08EMB3RCA | User Guide - Page 151
    Chapter 31 McAfee Total Protection 149 Working with Windows users To configure Parental Controls, you must assign permissions to Controls for those users in SecurityCenter. If you upgraded from a previous version of SecurityCenter that used McAfee users, see Working with McAfee users (page 150).
  • McAfee MTP08EMB3RCA | User Guide - Page 152
    Advanced. 2 On the Users Settings pane, click Switch. 3 Confirm the operation. Add a McAfee user After creating a McAfee user, you can configure Parental Controls for the user. For more information, see the Privacy Service help. 1 Log in to SecurityCenter as the Administrator user. 2 Open the Users
  • McAfee MTP08EMB3RCA | User Guide - Page 153
    user name, and then click Edit. 4 Follow the on-screen instructions to edit the user's password, account type, or parental controls. 5 Click OK. Remove a McAfee user You can remove a McAfee user at any time. To remove a McAfee user: 1 Log in to SecurityCenter as the Administrator user. 2 Open
  • McAfee MTP08EMB3RCA | User Guide - Page 154
    Configuration pane, click Advanced. 3 On the Users Settings pane, under McAfee User Accounts, select a user name, and then click Remove. Change the McAfee administrator's password If you have trouble remembering the McAfee administrator password or suspect that it is compromised, you can change it
  • McAfee MTP08EMB3RCA | User Guide - Page 155
    a particular user browses the Web, you can enable image filtering. Each potentially inappropriate Web image is automatically replaced with a static McAfee image. 1 Open the Users Settings pane. How? 1. On the SecurityCenter Home pane, click Parental Controls. 2. In the Parental Controls information
  • McAfee MTP08EMB3RCA | User Guide - Page 156
    154 McAfee Total Protection Setting the content rating group A user can belong to one of the following content rating groups: ƒ Young child ƒ Child ƒ Younger teen ƒ Older teen ƒ Adult Privacy Service rates (blocks or allows) Web content based on the group to which a user belongs. This lets you block
  • McAfee MTP08EMB3RCA | User Guide - Page 157
    , you can limit Web browsing to specific times or days or prohibit Web browsing entirely. If a child tries to browse the Web during a prohibited period, McAfee notifies the child that they cannot do so. If you prohibit Web browsing entirely, the child can log in to and use the computer, including
  • McAfee MTP08EMB3RCA | User Guide - Page 158
    that the site cannot be accessed because it is blocked by McAfee. You allow a Web site if McAfee has blocked it by default but you want to let your appears indicating that the site cannot be accessed because it is blocked by McAfee. 1 Open the Parental Controls pane. How? 1. On the SecurityCenter
  • McAfee MTP08EMB3RCA | User Guide - Page 159
    157 Allow a Web site You allow a Web site to make sure that it is not blocked for any users. If you allow a Web site that McAfee has blocked by default, you override the default setting. 1 Open the Parental Controls pane. How? 1. On the SecurityCenter Home pane, click Parental Controls. 2. In the
  • McAfee MTP08EMB3RCA | User Guide - Page 160
    158 McAfee Total Protection Remove a filtered Web site You can remove a filtered Web site if you no longer want to block or allow it. 1 Open the Parental
  • McAfee MTP08EMB3RCA | User Guide - Page 161
    means that a default list of keywords and corresponding rules is used to rate content for users according to their content rating group. Although McAfee does not recommend doing so, you can disable keyword filtering at any time. 1 Open the Parental Controls pane. How? 1. On the SecurityCenter Home
  • McAfee MTP08EMB3RCA | User Guide - Page 162
    160 McAfee Total Protection 1. On the SecurityCenter Home pane, click Parental Controls. 2. In the Parental Controls information section, click Configure. 3. On the Parental Controls Configuration pane, ensure
  • McAfee MTP08EMB3RCA | User Guide - Page 163
    , and bank account numbers) from being transmitted over the Web by adding it to the blocked information area. Note: Privacy Service does not block the transmission of personal information by secure Web sites (that is, Web sites that use the https:// protocol), such as banking sites. In this chapter
  • McAfee MTP08EMB3RCA | User Guide - Page 164
    account numbers) from being transmitted over the Web by blocking it. If McAfee detects personal information contained in something (for example, a form field or of personal information: name, address, zip code, social security information, phone number, credit card numbers, bank accounts, brokerage
  • McAfee MTP08EMB3RCA | User Guide - Page 165
    163 CHAPTER 33 Protecting passwords The Password Vault is a secure storage area for your personal passwords. It allows you to store your passwords with confidence so that no other user (even an Administrator) can access them. In this chapter Setting up the Password Vault 164
  • McAfee MTP08EMB3RCA | User Guide - Page 166
    164 McAfee Total Protection Setting up the Password Vault Before you start using the password at any time. Add a password If you have trouble remembering your passwords, you can add them to the Password Vault. The Password Vault is a secure location that can only be accessed by users who know your
  • McAfee MTP08EMB3RCA | User Guide - Page 167
    Chapter 33 McAfee Total Protection 165 1. Under Common Tasks, click Home. 2. On the SecurityCenter Home pane, click Internet & Network. 3. In the Internet & Network information section, click Configure. 4. On
  • McAfee MTP08EMB3RCA | User Guide - Page 168
    166 McAfee Total Protection 1. Under Common Tasks, click Home. 2. On the SecurityCenter Home pane, click Internet & Network. 3. In the Internet & Network information section, click Configure. 4. On the
  • McAfee MTP08EMB3RCA | User Guide - Page 169
    167 CHAPTER 34 McAfee Data Backup Use Data Backup to avoid accidental loss of your data by reports critical and non-critical protection problems as soon as it detects them. If you need help diagnosing your protection problems, you can run McAfee Virtual Technician. In this chapter Data
  • McAfee MTP08EMB3RCA | User Guide - Page 170
    168 McAfee Total Protection Data Backup features Data Backup provides the following features to save and restore your photos, music By default, your archived files are compressed, which saves space on your archive media. As an additional security measure, your archives are encrypted by default.
  • McAfee MTP08EMB3RCA | User Guide - Page 171
    default archive location (CD, DVD, USB drive, external hard drive, or network drive). McAfee has preset some other settings; for example, the folders and file types that you want quick archives. You can run manual archives at any time. In this chapter Setting archive options 170 Running full and
  • McAfee MTP08EMB3RCA | User Guide - Page 172
    ). You can change the archive location at any time. For security reasons or size issues, encryption or compression are enabled by default a form that minimizes the space required to store or transmit it. Although McAfee does not recommend doing so, you can disable encryption or compression at any
  • McAfee MTP08EMB3RCA | User Guide - Page 173
    Chapter 35 McAfee Total Protection 171 ƒ To archive the contents of a folder, but not the contents of its subfolders, click Add Folder under Shallow Watch Locations. 5 In the
  • McAfee MTP08EMB3RCA | User Guide - Page 174
    Local Archive Settings dialog box, click Advanced Settings. 4 Clear the Enable encryption to increase security check box. 5 Clear the Enable compression to reduce storage check box. 6 Click Save. Note: McAfee recommends that you do not disable encryption and compression when archiving your files.
  • McAfee MTP08EMB3RCA | User Guide - Page 175
    Chapter 35 McAfee Total Protection 173 Running full and quick archives You can run two types or quick archive for another few hours, you can archive the files manually. When you archive files manually, the interval that you set for automatic archives is reset. You can also interrupt an automatic or
  • McAfee MTP08EMB3RCA | User Guide - Page 176
    174 McAfee Total Protection 5 Select the check box beside the day on which you quick archive. A full archive archives the watch file types in all watch locations. To run a quick or full archive manually: 1 Click the Local Archive tab. 2 To run a quick archive, click Quick Archive in the left pane. 3
  • McAfee MTP08EMB3RCA | User Guide - Page 177
    175 CHAPTER 36 Working with archived files After you archive some files, you can use Data Backup to work with them. Your archived files are presented to you in a traditional explorer view which allows you to locate them easily. As your archive grows, you might want to sort the files or search for
  • McAfee MTP08EMB3RCA | User Guide - Page 178
    176 McAfee Total Protection Using the local archive explorer The local archive explorer allows you to view and manipulate the files that you have archived locally. You
  • McAfee MTP08EMB3RCA | User Guide - Page 179
    Chapter 36 McAfee Total Protection 177 ƒ Click Specify Dates, click Archived in the list, and then click the appropriate date values from the date lists. 5 Click Search. Note:
  • McAfee MTP08EMB3RCA | User Guide - Page 180
    178 McAfee Total Protection Restoring archived files If a watch file becomes corrupt, is missing hard drive on computer A, you can restore those files on computer B. To do so, you must install McAfee Data Backup on computer B and connect the external hard drive. Then, in Data Backup, you browse for
  • McAfee MTP08EMB3RCA | User Guide - Page 181
    Chapter 36 McAfee Total Protection 179 Restore an older version of a file from a local archive If you want to restore an older version of an archived file, you
  • McAfee MTP08EMB3RCA | User Guide - Page 182
    180 McAfee Total Protection Managing archives You can view a summary of information about your full and quick archives at any time. For example, you can view information
  • McAfee MTP08EMB3RCA | User Guide - Page 183
    your privacy by using the McAfee Shredder component to securely and permanently delete items that may do not want to maintain your computer manually, you can schedule both QuickClean and Disk problems as soon as it detects them. If you need help diagnosing your protection problems, you can run McAfee
  • McAfee MTP08EMB3RCA | User Guide - Page 184
    182 McAfee Total Protection QuickClean features QuickClean provides various cleaners that delete unnecessary files safely and efficiently. By deleting these files, you increase the space on your computer's hard drive and improve its performance.
  • McAfee MTP08EMB3RCA | User Guide - Page 185
    Chapter 37 McAfee Total Protection 183 Cleaning your computer QuickClean deletes files that can create clutter on your computer. It empties your Recycle Bin and deletes temporary files,
  • McAfee MTP08EMB3RCA | User Guide - Page 186
    184 McAfee Total Protection Name Function Cookie Cleaner Deletes cookies. These files are usually stored as temporary files. A cookie is a small file containing created by Windows to mark any changes made to your computer so that you can revert to a previous state if any problems occur.
  • McAfee MTP08EMB3RCA | User Guide - Page 187
    your computer. 1 On the McAfee SecurityCenter pane, under Common Tasks, click Maintain Computer. 2 Under McAfee QuickClean, click Start. 3 Do want to delete files using standard Windows deletion. ƒ Click Yes, I want to securely erase my files using Shredder, specify the number of passes, up to 10,
  • McAfee MTP08EMB3RCA | User Guide - Page 188
    your computer to improve file and folder access and retrieval. 1 On the McAfee SecurityCenter pane, under Common Tasks, click Maintain Computer. 2 Under Disk Defragmenter, click Analyze. 3 Follow the on-screen instructions. Note: For more information about Disk Defragmenter, see the Windows Help.
  • McAfee MTP08EMB3RCA | User Guide - Page 189
    to run again. 1 Open the Task Scheduler pane. How? 1. On the McAfee SecurityCenter, under Common Tasks, click Maintain Computer. 2. Under Task Scheduler, click Windows deletion. ƒ Click Yes, I want to securely erase my files using Shredder, specify the number of passes, up to 10, and
  • McAfee MTP08EMB3RCA | User Guide - Page 190
    with Shredder cannot be recovered. For information about shredding files, see McAfee Shredder. Modify a QuickClean task You can modify a scheduled QuickClean standard Windows deletion. ƒ Click Yes, I want to securely erase my files using Shredder, and specify the number of passes, up to 10,
  • McAfee MTP08EMB3RCA | User Guide - Page 191
    with Shredder cannot be recovered. For information about shredding files, see McAfee Shredder. Delete a QuickClean task You can delete a scheduled QuickClean . 1 Open the Task Scheduler pane. How? 1. On the McAfee SecurityCenter, under Common Tasks, click Maintain Computer. 2. Under Task Scheduler
  • McAfee MTP08EMB3RCA | User Guide - Page 192
    , you can view the date and time when your task is scheduled to run again. 1 Open the Task Scheduler pane. How? 1. On the McAfee SecurityCenter, under Common Tasks, click Maintain Computer. 2. Under Task Scheduler, click Start. 2 In the Select operation to schedule list, click Disk Defragmenter
  • McAfee MTP08EMB3RCA | User Guide - Page 193
    can delete a scheduled Disk Defragmenter task if you no longer want it to run automatically. 1 Open the Task Scheduler pane. How? 1. On the McAfee SecurityCenter, under Common Tasks, click Maintain Computer. 2. Under Task Scheduler, click Start. 2 In the Select operation to schedule list, click Disk
  • McAfee MTP08EMB3RCA | User Guide - Page 194
  • McAfee MTP08EMB3RCA | User Guide - Page 195
    CHAPTER 38 McAfee Shredder McAfee Shredder deletes (or shreds) items permanently from your computer's hard drive. Even when you manually delete files -critical protection problems as soon as it detects them. If you need help diagnosing your protection problems, you can run McAfee Virtual Technician.
  • McAfee MTP08EMB3RCA | User Guide - Page 196
    194 McAfee Total Protection Shredder features Shredder deletes items from your computer's hard drive so that their associated information cannot be recovered. It protects your privacy by
  • McAfee MTP08EMB3RCA | User Guide - Page 197
    be shredded. A higher number of shredding passes increases your level of secure file deletion. Shred files and folders You can shred files and folders Temporary Internet Files folder. 1 Open Shredder. How? 1. On the McAfee SecurityCenter pane, under Common Tasks, click Advanced Menu. 2. On the
  • McAfee MTP08EMB3RCA | User Guide - Page 198
    at once. Only removable drives, such as external hard drives, writeable CDs, and floppy disks can be shredded. 1 Open Shredder. How? 1. On the McAfee SecurityCenter pane, under Common Tasks, click Advanced Menu. 2. On the left pane, click Tools. 3. Click Shredder. 2 On the Shred files and folders
  • McAfee MTP08EMB3RCA | User Guide - Page 199
    the Network Manager help. Note: SecurityCenter reports critical and non-critical protection problems as soon as it detects them. If you need help diagnosing your protection problems, you can run McAfee Virtual Technician. In this chapter Network Manager features 198 Understanding Network Manager
  • McAfee MTP08EMB3RCA | User Guide - Page 200
    198 McAfee Total Protection Network Manager features Network Manager provides the following features. Graphical network map Network a computer to join the managed network, monitor the managed computer's protection status, and fix known security vulnerabilities from a remote computer on the network.
  • McAfee MTP08EMB3RCA | User Guide - Page 201
    Chapter 39 McAfee Total Protection 199 Understanding Network Manager icons The following table describes the icons commonly used on the Network Manager network map. Icon Description Represents an
  • McAfee MTP08EMB3RCA | User Guide - Page 202
  • McAfee MTP08EMB3RCA | User Guide - Page 203
    201 CHAPTER 40 Setting up a managed network To set up a managed network, work with the items on your network map and add members (computers) to the network. Before a computer can be remotely managed, or granted permission to remotely manage other computers on the network, it must become a trusted
  • McAfee MTP08EMB3RCA | User Guide - Page 204
    202 McAfee Total Protection Working with the network map When you connect a computer to the network, Network Manager analyzes the network to determine if there are any
  • McAfee MTP08EMB3RCA | User Guide - Page 205
    Chapter 40 McAfee Total Protection 203 Rename the network By default, the name of the network includes the workgroup or domain name of the first computer that connects
  • McAfee MTP08EMB3RCA | User Guide - Page 206
    the network, users at the granting and joining computers must authenticate each other. When a computer joins the network, it is prompted to expose its McAfee protection status to other computers on the network. If a computer agrees to expose its protection status, it becomes a managed member of the
  • McAfee MTP08EMB3RCA | User Guide - Page 207
    . You can also determine whether you want this computer and other computers on the network to monitor each other's security settings (for example, whether a computer's virus protection services are up-to-date). 1 In the Managed Network dialog box, ensure that the Allow every computer on this network
  • McAfee MTP08EMB3RCA | User Guide - Page 208
    206 McAfee Total Protection 4 Click OK. An invitation to join the managed network the managed network does not display the same playing cards that appear in the security confirmation dialog box, there has been a security breach on the managed network. Allowing the computer to join the network can
  • McAfee MTP08EMB3RCA | User Guide - Page 209
    Chapter 40 McAfee Total Protection 207 Stop trusting computers on the network If you trusted other computers on the network by mistake, you can stop trusting them. ƒ Click
  • McAfee MTP08EMB3RCA | User Guide - Page 210
  • McAfee MTP08EMB3RCA | User Guide - Page 211
    the computers and components that make up your network. You can monitor the status and permission levels of the computers and components and fix most security vulnerabilities remotely. In this chapter Monitoring status and permissions 210 Fixing
  • McAfee MTP08EMB3RCA | User Guide - Page 212
    status and permissions A managed network has managed and unmanaged members. Managed members allow other computers on the network to monitor their McAfee protection status; unmanaged members do not. Unmanaged members are usually guest computers that want to access other network features (for example
  • McAfee MTP08EMB3RCA | User Guide - Page 213
    Chapter 41 McAfee Total Protection 211 Modify a managed computer's permissions You can change a 's security settings. Note: If the device is a Wireless Network Security protected wireless router or access point, you must use Wireless Network Security to configure the device's security settings
  • McAfee MTP08EMB3RCA | User Guide - Page 214
    security vulnerabilities remotely, Network Manager repairs most reported issues. However, some security vulnerabilities may require manual intervention the vulnerable computer and follow the recommendations provided. Install McAfee security software on remote computers If one or more computers on
  • McAfee MTP08EMB3RCA | User Guide - Page 215
    213 ƒ http://au.mcafee.com/root/myAccount.asp (Australia) 2 Log in using the e-mail address and password that you used to register your security software the first time you installed it. 3 Select the appropriate product, click the Download/Install icon, and then follow the on-screen instructions.
  • McAfee MTP08EMB3RCA | User Guide - Page 216
  • McAfee MTP08EMB3RCA | User Guide - Page 217
    215 CHAPTER 42 McAfee EasyNetwork EasyNetwork allows you to share files securely, simplify file transfers, and share printers among the and non-critical protection problems as soon as it detects them. If you need help diagnosing your protection problems, you can run McAfee Virtual Technician. In
  • McAfee MTP08EMB3RCA | User Guide - Page 218
    216 McAfee Total Protection EasyNetwork features EasyNetwork provides the following features. File sharing EasyNetwork makes it easy to share files with other computers on your network. When
  • McAfee MTP08EMB3RCA | User Guide - Page 219
    open EasyNetwork after installation; however, you can also open EasyNetwork later. ƒ On the Start menu, point to Programs, point to McAfee, and then click McAfee EasyNetwork. Tip: If you created desktop and quick launch icons during the installation, you can also open EasyNetwork by double-clicking
  • McAfee MTP08EMB3RCA | User Guide - Page 220
    (promote or demote computers); computers with full access cannot perform these administrative tasks. Note: After you join, if you have other McAfee networking programs installed (for example, Network Manager), the computer is also recognized as a managed computer in those programs. The permission
  • McAfee MTP08EMB3RCA | User Guide - Page 221
    Chapter 43 McAfee Total Protection 219 Join the network When a computer connects to a managed network does not display the same playing cards that appear in the security confirmation dialog box, there has been a security breach on the managed network. Joining the network can place your computer at
  • McAfee MTP08EMB3RCA | User Guide - Page 222
    220 McAfee Total Protection ƒ Click Allow administrative access to managed network programs . 3 Click OK. 4 Confirm that the computer is displaying the playing cards that appear in the security confirmation dialog box, and then click Grant Access. Note: If the computer does not display the same playing
  • McAfee MTP08EMB3RCA | User Guide - Page 223
    Chapter 43 McAfee Total Protection 221 Rename the network By default, the network name includes the name of the first computer that joined; however, you can change the
  • McAfee MTP08EMB3RCA | User Guide - Page 224
    222 McAfee Total Protection Leaving a managed network If you join a managed network but then decide that you do not want to be a member, you can leave the
  • McAfee MTP08EMB3RCA | User Guide - Page 225
    223 CHAPTER 44 Sharing and sending files EasyNetwork makes it easy to share and send files among other computers on the network. When you share files, you grant other computers read-only access to them. Only computers that are members of the managed network (full or administrative access) can share
  • McAfee MTP08EMB3RCA | User Guide - Page 226
    224 McAfee Total Protection Sharing files Only computers that are members of the managed cannot be accessed from other computers using Windows Explorer because EasyNetwork file sharing must be performed over secure connections. Share a file When you share a file, it is available to all members with
  • McAfee MTP08EMB3RCA | User Guide - Page 227
    Chapter 44 McAfee Total Protection 225 Copy a shared file You copy a shared file so that you still have it when it's not shared any more. You can copy a
  • McAfee MTP08EMB3RCA | User Guide - Page 228
    226 McAfee Total Protection Type of file Type Any Document Image Video Audio Compressed Description Search all shared file types. Search all shared documents. Search all shared
  • McAfee MTP08EMB3RCA | User Guide - Page 229
    Chapter 44 McAfee Total Protection 227 Sending files to other computers You can send files to other computers that are members of the managed network. Before sending a file,
  • McAfee MTP08EMB3RCA | User Guide - Page 230
    228 McAfee Total Protection Receive notification when a file is sent You can receive a notification message when another computer on the managed network sends you a file. If EasyNetwork
  • McAfee MTP08EMB3RCA | User Guide - Page 231
    229 CHAPTER 45 Sharing printers After you join a managed network, EasyNetwork shares the local printers attached to your computer and uses the printer's name as the shared printer name. EasyNetwork also detects printers shared by other computers on your network and allows you to configure and use
  • McAfee MTP08EMB3RCA | User Guide - Page 232
    230 McAfee Total Protection Working with shared printers EasyNetwork detects the printers that are shared by the computers on the network. If EasyNetwork detects a remote printer that
  • McAfee MTP08EMB3RCA | User Guide - Page 233
    Chapter 45 McAfee Total Protection 231
  • McAfee MTP08EMB3RCA | User Guide - Page 234
    232 McAfee Total Protection Reference The Glossary of Terms lists and defines the most commonly used security terminology found in McAfee products.
  • McAfee MTP08EMB3RCA | User Guide - Page 235
    a wireless router) that plugs into an Ethernet hub or switch to extend the physical range of service for a wireless user. When wireless users roam with their mobile devices, transmission passes from one Access and password. B back up To create a copy of important files on a secure, online server.
  • McAfee MTP08EMB3RCA | User Guide - Page 236
    234 McAfee Total Protection bandwidth The amount of data that can be transmitted in a fixed amount of time. blacklist In anti-phishing, a list of Web sites that
  • McAfee MTP08EMB3RCA | User Guide - Page 237
    the definitions that are used when detecting viruses, Trojans, spyware, adware, and security vulnerabilities. dialer Software that helps you to establish an Internet connection. When used maliciously, dialers can redirect your Internet connections to someone other than your default Internet Service
  • McAfee MTP08EMB3RCA | User Guide - Page 238
    data is also known as cipher text. ESS (Extended Service Set) A set of two or more networks that or the computer itself which triggers a response. McAfee records events in its event log. external hard blocks those that do not meet the specified security criteria. full archive To archive a complete
  • McAfee MTP08EMB3RCA | User Guide - Page 239
    appearing. integrated gateway A device that combines the functions of an access point (AP), router, and firewall. Some devices may also include security enhancements and bridging features. Internet The Internet consists of a huge number of interconnected networks that use the TCP/IP protocols for
  • McAfee MTP08EMB3RCA | User Guide - Page 240
    238 McAfee Total Protection L LAN as the Exchange client. message authentication code (MAC) A security code used to encrypt messages that are transmitted between computers. valid. MSN (Microsoft Network) A group of Web-based services offered by Microsoft Corporation, including a search engine, e-mail
  • McAfee MTP08EMB3RCA | User Guide - Page 241
    O on-demand scan A scan that is launched on demand (that is, when you launch the operation). Unlike real-time scanning, on-demand scans do not launch to your computer, a program, or a Web site. Password Vault A secure storage area for your personal passwords. It allows you to store your passwords
  • McAfee MTP08EMB3RCA | User Guide - Page 242
    240 McAfee Total Protection plain text Text that is not encrypted. See also A format (hardware or software) for transmitting data between two devices. Your computer or device must support the correct protocol if you want to communicate with other computers. proxy A computer (or the software
  • McAfee MTP08EMB3RCA | User Guide - Page 243
    of a WLAN user's shared secret. real-time scanning To scan files and folders for viruses and other activity when they are accessed by you in service or loss in connectivity. rogue access point An unauthorized Access Point. Rogue access points can be installed on a secure company network
  • McAfee MTP08EMB3RCA | User Guide - Page 244
    242 McAfee Total Protection rootkit A collection of tools (programs) that grant a user administrator-level access to a computer or computer network. Rootkits may include spyware and other potentially unwanted programs that can create additional security or privacy risks to your computer data and
  • McAfee MTP08EMB3RCA | User Guide - Page 245
    Service Set Identifier) A token (secret key) that identifies a Wi-Fi (802.11) network. The SSID is set up by the network administrator and must be supplied by users who want to join the network. SSL (Secure restore points at any time. SystemGuard McAfee alerts that detect unauthorized changes to your
  • McAfee MTP08EMB3RCA | User Guide - Page 246
    244 McAfee Total Protection trusted list Contains items that you trusted and are not . USB wireless adapter card A wireless adapter card that plugs into a USB slot in the computer. V virus Self-replicating programs that might alter your files or data. They often appear to be from a trusted sender
  • McAfee MTP08EMB3RCA | User Guide - Page 247
    are based on RC4 ciphers and have significant weaknesses. WEP attempts to provide security by encrypting data over radio waves so that it is protected as it is point to another. However, it has been found that WEP is not as secure as once believed. whitelist A list of Web sites that users are allowed
  • McAfee MTP08EMB3RCA | User Guide - Page 248
    McAfee Total Protection worm A self-replicating virus class security and do not have access to authentication servers. In this mode, the home user manually enters devices often support multiple encryption modes (for example, AES, TKIP) simultaneously, while older devices generally support only a
  • McAfee MTP08EMB3RCA | User Guide - Page 249
    Management, delivers proactive and proven solutions and services that secure systems and networks around the world. With its unmatched security expertise and commitment to innovation, McAfee empowers home users, businesses, the public sector, and service providers with the ability to block attacks
  • McAfee MTP08EMB3RCA | User Guide - Page 250
    248 McAfee Total Protection License NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO MCAFEE, INC. OR THE PLACE OF PURCHASE FOR A FULL REFUND.
  • McAfee MTP08EMB3RCA | User Guide - Page 251
    fix or ignore all non-critical problems. If you need help diagnosing your protection problems, you can run McAfee Virtual Technician. For more information about McAfee Virtual Technician, see the McAfee Virtual Technician help. If you purchased your security software from a partner or provider other
  • McAfee MTP08EMB3RCA | User Guide - Page 252
    discovers problems, Virtual Technician offers to fix them for you or provides you with more detailed information about them. When finished, Virtual Technician displays the results of its analysis and allows you to seek additional technical support from McAfee, if necessary. To maintain the security
  • McAfee MTP08EMB3RCA | User Guide - Page 253
    the following tables for the McAfee Support and Download sites in your country, including User Guides. Support and Downloads Country McAfee Support McAfee Downloads Australia www.mcafeehelp.com au.mcafee.com/root/do wnloads.asp Brazil www.mcafeeajuda.com br.mcafee.com/root/do wnloads.asp
  • McAfee MTP08EMB3RCA | User Guide - Page 254
    root/do wnloads.asp es.mcafee.com/root/do wnloads.asp se.mcafee.com/root/do wnloads.asp tr.mcafee.com/root/do wnloads.asp us.mcafee.com/root/do wnloads.asp McAfee Total Protection User Guides Country McAfee User Guides Australia download.mcafee.com/products/manuals/en-au/MTP_us erguide_2008.pdf
  • McAfee MTP08EMB3RCA | User Guide - Page 255
    uide_2008.pdf Turkey download.mcafee.com/products/manuals/tr/MTP_userg uide_2008.pdf United States download.mcafee.com/products/manuals/en-us/MTP_us erguide_2008.pdf McAfee Internet Security User Guides Country McAfee User Guides Australia download.mcafee.com/products/manuals/en-au/MIS_us
  • McAfee MTP08EMB3RCA | User Guide - Page 256
    pdf United States download.mcafee.com/products/manuals/en-us/MIS_use rguide_2008.pdf McAfee VirusScan Plus User Guides Country McAfee User Guides Australia download.mcafee.com/products/manuals/en-au/VSP_us erguide_2008.pdf Brazil download.mcafee.com/products/manuals/pt-br/VSP_use rguide_2008
  • McAfee MTP08EMB3RCA | User Guide - Page 257
    uide_2008.pdf Finland download.mcafee.com/products/manuals/fi/VSP_usergu ide_2008.pdf France download.mcafee.com/products/manuals/fr/VSP_usergu ide_2008.pdf Germany download.mcafee.com/products/manuals/de/VSP_userg uide_2008.pdf Great Britain download.mcafee.com/products/manuals/en-uk/VSP_us
  • McAfee MTP08EMB3RCA | User Guide - Page 258
    256 McAfee Total Protection McAfee VirusScan User Guides Country McAfee User Guides Australia download.mcafee.com/products/manuals/en-au/VS_user guide_2008.pdf Brazil download.mcafee.com/products/manuals/pt-br/VS_user guide_2008.pdf Canada (English) download.mcafee.com/products/manuals/en-
  • McAfee MTP08EMB3RCA | User Guide - Page 259
    VS_usergui de_2008.pdf United States download.mcafee.com/products/manuals/en-us/VS_user guide_2008.pdf Consult the following table for the McAfee Threat Center and Virus Information sites in your country. Country Security Headquarters Virus Information Australia www.mcafee.com/us/threat_ce au
  • McAfee MTP08EMB3RCA | User Guide - Page 260
    virusInf er o Korea www.mcafee.com/us/threat_cent kr.mcafee.com/virusInf er o Mexico www.mcafee.com/us/threat_cent mx.mcafee.com/virusI er nfo Norway www.mcafee.com/us/threat_cent no.mcafee.com/virusIn er fo Poland www.mcafee.com/us/threat_cent pl.mcafee.com/virusInf er o Portugal
  • McAfee MTP08EMB3RCA | User Guide - Page 261
    Chapter 46 About McAfee 259 France Germany Great Britain Holland www.hackerwatch.org/?lang=fr www.hackerwatch.org/?lang=de www.hackerwatch.org www.hackerwatch.org/?lang=nl Italy
  • McAfee MTP08EMB3RCA | User Guide - Page 262
    a friend from the Anti-Spam toolbar 126 Add a friend manually 126 Add a McAfee user 150 Add a password 164 Add a personal filter 133 address book 124 Allow a Web site 157 Allow access to an existing system service port 93 Allow full access for a new program .......84 Allow full access for
  • McAfee MTP08EMB3RCA | User Guide - Page 263
    Support service Edit a McAfee user's account problems automatically .18 Fix protection problems manually.........18 Fix security vulnerabilities 212 Fixing or ignoring protection problems .8, 17 Fixing protection problems 8, 18 Fixing security virus outbreak alerts 25 home network 236 hotspot 237
  • McAfee MTP08EMB3RCA | User Guide - Page 264
    security levels ..........72 Managing informational alerts 69 Managing programs and permissions ...83 Managing system services 91 Managing the network remotely ..........209 Managing your McAfee registration information 109 on-demand scan 239 online backup repository 239 Open an
  • McAfee MTP08EMB3RCA | User Guide - Page 265
    types 171 Set manual scan location 41 Set manual scan options 40 Set real-time scan options 38 Set security level to Lockdown 73 Set security level to Open 75 Set security level to Standard 74 Set security level to Stealth 73 Set security level to Tight 74 Set security level to Trusting
  • McAfee MTP08EMB3RCA | User Guide - Page 266
    manually 126 Setting up Parental Controls 147 Setting up the Password Vault 164 Setting up virus ignored problems virus protection 31 Start script scanning virus protection 31 Stop sharing a file 224 Stop sharing a printer 230 Stop trusting computers on the network 207 Support services McAfee
  • McAfee MTP08EMB3RCA | User Guide - Page 267
    with quarantined programs and cookies 59 Work with viruses and Trojans 57 Working with alerts 14, 21, 67 Working with archived files 175 Working with filtered e-mail 141 Working with McAfee users ..........149, 150 Working with scan results 57 Working with shared printers 230 Working with
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267

User Guide