McAfee TSA00M005PAA Processor Guide - Page 7

Using the SaaS Vulnerability Scanning Service - downloader

Page 7 highlights

Enabling and disabling protection at the client computer 109 Block and warn sites by safety ratings...109 Blocking or warning site access based on safety ratings 111 Blocking or warning file downloads based on safety ratings 111 Blocking phishing pages...112 Block and warn sites by content...112 Blocking or warning site access based on content 113 Authorize and prohibit sites by URL or domain 113 How site patterns work...114 Adding authorized and prohibited sites 115 Customizing messages for users...115 Viewing browsing acitivity...116 Web Filtering report...117 Best practices (browser protection)...117 Frequently asked questions...118 Using the SaaS Vulnerability Scanning Service 119 Vulnerability scanning features...119 Certification programs...120 The SaaS vulnerability scanning widget and portal 121 Accessing the SaaS vulnerability scanning portal 122 Overview of scanning process...122 Overview of the certification process...123 Types of devices to scan...123 Types of scans...124 Managing scan devices...125 Discovering IP addresses in a domain 126 Discovering IP addresses in a network 126 Adding devices to scan...127 Configuring devices to accept scans 128 Creating device groups...128 Changing device groups...129 Deleting devices...129 Performing scans...130 Starting a scan...130 Scheduling scans for devices...131 How detections are reported ...131 Viewing scan results...132 Viewing results for audit scans...132 Viewing results for DNS discovery on domains 133 Viewing results for network discovery scans 133 McAfee Total Protection Service Product Guide 7

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134

McAfee Total Protection Service Product Guide
7
Enabling and disabling protection at the client computer
.........................................................................
109
Block and warn sites by safety ratings
...................................................................................................
109
Blocking or warning site access based on safety ratings
................................................................
111
Blocking or warning file downloads based on safety ratings
...........................................................
111
Blocking phishing pages
.............................................................................................................
112
Block and warn sites by content
............................................................................................................
112
Blocking or warning site access based on content
.........................................................................
113
Authorize and prohibit sites by URL or domain
.......................................................................................
113
How site patterns work
...............................................................................................................
114
Adding authorized and prohibited sites
........................................................................................
115
Customizing messages for users
............................................................................................................
115
Viewing browsing acitivity
.....................................................................................................................
116
Web Filtering report
.............................................................................................................................
117
Best practices (browser protection)
.......................................................................................................
117
Frequently asked questions
...................................................................................................................
118
Using the SaaS Vulnerability Scanning Service
...................................................
119
Vulnerability scanning features
..............................................................................................................
119
Certification programs
..........................................................................................................................
120
The SaaS vulnerability scanning widget and portal
..................................................................................
121
Accessing the SaaS vulnerability scanning portal
...........................................................................
122
Overview of scanning process
...............................................................................................................
122
Overview of the certification process
.....................................................................................................
123
Types of devices to scan
.......................................................................................................................
123
Types of scans
.....................................................................................................................................
124
Managing scan devices
.........................................................................................................................
125
Discovering IP addresses in a domain
..........................................................................................
126
Discovering IP addresses in a network
.........................................................................................
126
Adding devices to scan
...............................................................................................................
127
Configuring devices to accept scans
.............................................................................................
128
Creating device groups
...............................................................................................................
128
Changing device groups
..............................................................................................................
129
Deleting devices
........................................................................................................................
129
Performing scans
.................................................................................................................................
130
Starting a scan
...........................................................................................................................
130
Scheduling scans for devices
.......................................................................................................
131
How detections are reported
................................................................................................................
131
Viewing scan results
.............................................................................................................................
132
Viewing results for audit scans
....................................................................................................
132
Viewing results for DNS discovery on domains
..............................................................................
133
Viewing results for network discovery scans
.................................................................................
133