198
Index
Managing your McAfee account
.............
11
man-in-the-middle attack
....................
174
MAPI
.......................................................
174
McAfee EasyNetwork
............................
151
McAfee Network Manager
....................
133
McAfee Personal Firewall
........................
61
McAfee QuickClean
...............................
117
McAfee SecurityCenter
.............................
5
McAfee Shredder
...................................
129
McAfee VirusScan
....................................
29
message authentication code (MAC) ...174
Modify a device's display properties
....
147
Modify a Disk Defragmenter task
.........
126
Modify a managed computer's
permissions
........................................
147
Modify a QuickClean task
.....................
124
Modify a system service port
..................
94
Monitor a computer's protection status
.............................................................
146
Monitor program activity
......................
113
Monitor program bandwidth
...............
113
Monitoring Internet traffic
....................
112
Monitoring status and permissions
.....
146
MSN
........................................................
174
N
network
..................................................
174
network drive
.........................................
175
Network Manager features
...................
134
network map
..........................................
175
NIC
..........................................................
175
node
........................................................
175
O
Obtain computer network information
.............................................................
109
Obtain computer registration information
.............................................................
109
on-demand scan
....................................
175
online backup repository
......................
175
Open EasyNetwork
................................
153
Optimizing Firewall security
...................
78
P
Parental Controls
...................................
175
password
................................................
175
Password Vault
......................................
175
PCI wireless adapter cards
....................
175
Personal Firewall features
.......................
62
phishing
..................................................
175
plain text
.................................................
176
Play a sound with alerts
...........................
24
plug-in
....................................................
176
POP3
.......................................................
176
pop-ups
..................................................
176
port
.........................................................
176
potentially unwanted program (PUP) .176
PPPoE
.....................................................
176
Protect your computer during startup...78
protocol
..................................................
176
proxy
.......................................................
176
proxy server
...........................................
176
publish
...................................................
177
Q
quarantine
.............................................
177
quick archive
.........................................
177
QuickClean features
..............................
118
R
RADIUS
..................................................
177
real-time scanning
................................
177
Receive notification when a file is sent 164
Recycle Bin
.............................................
177
Reference
...............................................
168
Refresh the network map
......................
138
registry
...................................................
177
Remove a banned computer connection
.............................................................
102
Remove a program permission
..............
89
Remove a system service port
................
95
Remove a trusted computer connection
.............................................................
100
Removing access permissions for
programs
..............................................
89
Rename the network
.....................
139, 157
restore
....................................................
177
Restore Firewall settings
.........................
82
roaming
..................................................
177
rogue access point
.................................
177
rootkit
.....................................................
178
router
......................................................
178
S
Scan your computer
................................
54
Scanning your computer
..................
31, 53
Schedule a Disk Defragmenter task
.....
125
Schedule a QuickClean task
.................
123
Schedule a scan
.......................................
42
Scheduling a task
...................................
123
script
.......................................................
178
Search criteria
........................................
161
Search for a shared file
..........................
161
SecurityCenter features
............................
6
Send a file to another computer
...........
163
Sending files to other computers
.........
163
server
......................................................
178
Set manual scan location
........................
41