McAfee VSF08EMB3RUA User Guide - Page 198

Index

Page 198 highlights

196 Index 8 802.11 169 802.11a 169 802.11b 169 802.1x 169 A About alerts 68 About McAfee 183 About SystemGuards types 46 About the Traffic Analysis graph ..........112 About trusted lists types 51 Accept a file from another computer ...163 Access Point 169 Access the network map 138 ActiveX control 169 Add a banned computer connection ...101 Add a trusted computer connection ......98 Add a trusted computer from the Inbound Events log 99 Allow access to an existing system service port 93 Allow full access for a new program .......84 Allow full access for a program 84 Allow full access from the Outbound Events log 85 Allow full access from the Recent Events log 85 Allow outbound-only access for a program 86 Allow outbound-only access from the Outbound Events log 86 Allow outbound-only access from the Recent Events log 86 Allowing Internet access for programs ..84 Allowing outbound-only access for programs 86 Analyze inbound and outbound traffic113 archive 169 authentication 169 B back up 169 Ban a computer from the Inbound Events log 103 Ban a computer from the Intrusion Detection Events log 103 bandwidth 170 Banning computer connections...........101 blacklist 170 Block access for a new program 87 Block access for a program 87 Block access from the Recent Events log 88 Block access to an existing system service port 93 Blocking Internet access for programs ..87 browser 170 brute-force attack 170 buffer overflow 170 C cache 170 Check for updates 13, 14 cipher text 170 Clean your computer 121 Cleaning your computer 119 client 170 compression 170 Configure a new system service port .....93 Configure automatic updates 14 Configure event log settings 106 Configure Firewall Protection Status settings 79 Configure intrusion detection 79 Configure ping request settings 79 Configure SystemGuards options ..........45 Configuring alert options 24 Configuring Firewall protection 71 Configuring Smart Recommendations for alerts 76 Configuring system service ports ...........92 content-rating group 170 cookie 171 Copy a shared file 161 Copyright 183 Customer and Technical Support ........185 D DAT 171 deep watch location 171 Defragment your computer 122

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202

196
8
802.11
.....................................................
169
802.11a
....................................................
169
802.11b
...................................................
169
802.1x
......................................................
169
A
About alerts
..............................................
68
About McAfee
........................................
183
About SystemGuards types
.....................
46
About the Traffic Analysis graph
..........
112
About trusted lists types
..........................
51
Accept a file from another computer ...163
Access Point
...........................................
169
Access the network map
.......................
138
ActiveX control
.......................................
169
Add a banned computer connection ...101
Add a trusted computer connection
......
98
Add a trusted computer from the
Inbound Events log
..............................
99
Allow access to an existing system service
port
........................................................
93
Allow full access for a new program
.......
84
Allow full access for a program
...............
84
Allow full access from the Outbound
Events log
..............................................
85
Allow full access from the Recent Events
log
..........................................................
85
Allow outbound-only access for a
program
................................................
86
Allow outbound-only access from the
Outbound Events log
...........................
86
Allow outbound-only access from the
Recent Events log
.................................
86
Allowing Internet access for programs ..84
Allowing outbound-only access for
programs
...............................................
86
Analyze inbound and outbound traffic113
archive
....................................................
169
authentication
.......................................
169
B
back up
...................................................
169
Ban a computer from the Inbound Events
log
........................................................
103
Ban a computer from the Intrusion
Detection Events log
..........................
103
bandwidth
..............................................
170
Banning computer connections
...........
101
blacklist
..................................................
170
Block access for a new program
.............
87
Block access for a program
.....................
87
Block access from the Recent Events log
...............................................................
88
Block access to an existing system service
port
........................................................
93
Blocking Internet access for programs ..87
browser
..................................................
170
brute-force attack
..................................
170
buffer overflow
......................................
170
C
cache
......................................................
170
Check for updates
.............................
13, 14
cipher text
..............................................
170
Clean your computer
............................
121
Cleaning your computer
.......................
119
client
.......................................................
170
compression
..........................................
170
Configure a new system service port
.....
93
Configure automatic updates
.................
14
Configure event log settings
.................
106
Configure Firewall Protection Status
settings
..................................................
79
Configure intrusion detection
................
79
Configure ping request settings
.............
79
Configure SystemGuards options
..........
45
Configuring alert options
........................
24
Configuring Firewall protection
.............
71
Configuring Smart Recommendations for
alerts
.....................................................
76
Configuring system service ports
...........
92
content-rating group
.............................
170
cookie
.....................................................
171
Copy a shared file
..................................
161
Copyright
...............................................
183
Customer and Technical Support
........
185
D
DAT
.........................................................
171
deep watch location
..............................
171
Defragment your computer
..................
122
Index