McAfee VSF09EMB1RAA User Guide - Page 201

Index

Page 201 highlights

199 Index 8 802.11 171 802.11a 171 802.11b 171 802.1x 171 A About alerts 66 About computer connections 90 About McAfee 185 About SystemGuards types 54 About the Traffic Analysis graph ..........110 About trusted lists types 59 Accept a file from another computer ...165 access point (AP 171 Access the network map 138 Access your McAfee account 11 Activate your product 11 ActiveX control 171 Add a banned computer connection .....94 Add a computer connection 90 Add a computer from the Inbound Events log 91 Allow access to an existing system service port 99 Allow full access for a new program .......82 Allow full access for a program 82 Allow full access from the Outbound Events log 83 Allow full access from the Recent Events log 83 Allow outbound-only access for a program 84 Allow outbound-only access from the Outbound Events log 84 Allow outbound-only access from the Recent Events log 84 Allowing Internet access for programs ..82 Allowing outbound-only access for programs 84 Analyze inbound and outbound traffic111 archive 171 authentication 171 B back up 171 Ban a computer from the Inbound Events log 96 Ban a computer from the Intrusion Detection Events log 96 bandwidth 172 Banning computer connections 94 blacklist 172, 182 Block access for a new program 85 Block access for a program 85 Block access from the Recent Events log 86 Block access to an existing system service port 99 Blocking Internet access for programs ..85 browser 172 brute-force attack 172 buffer overflow 172 C cache 172 Check for updates 13, 14 cipher text 172 Clean your computer 119 Cleaning your computer 117 client 172 compression 172 Configure a new system service port ...100 Configure automatic updates 14 Configure event log settings 104 Configure Firewall Protection Status settings 77 Configure intrusion detection 77 Configure ping request settings 76 Configure SystemGuards options ..........53 Configure UDP settings 76 Configuring alert options 24 Configuring Firewall protection 69 Configuring Smart Recommendations for alerts 73 Configuring system service ports ...........98 content-rating group 172 cookie 173 Copy a shared file 163 Copyright 186 Customer and Technical Support ........187

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205

199
8
802.11
.....................................................
171
802.11a
....................................................
171
802.11b
...................................................
171
802.1x
......................................................
171
A
About alerts
..............................................
66
About computer connections
.................
90
About McAfee
........................................
185
About SystemGuards types
.....................
54
About the Traffic Analysis graph
..........
110
About trusted lists types
..........................
59
Accept a file from another computer ...165
access point (AP)
...................................
171
Access the network map
.......................
138
Access your McAfee account
..................
11
Activate your product
..............................
11
ActiveX control
.......................................
171
Add a banned computer connection
.....
94
Add a computer connection
...................
90
Add a computer from the Inbound Events
log
..........................................................
91
Allow access to an existing system service
port
........................................................
99
Allow full access for a new program
.......
82
Allow full access for a program
...............
82
Allow full access from the Outbound
Events log
..............................................
83
Allow full access from the Recent Events
log
..........................................................
83
Allow outbound-only access for a
program
................................................
84
Allow outbound-only access from the
Outbound Events log
...........................
84
Allow outbound-only access from the
Recent Events log
.................................
84
Allowing Internet access for programs ..82
Allowing outbound-only access for
programs
...............................................
84
Analyze inbound and outbound traffic111
archive
....................................................
171
authentication
.......................................
171
B
back up
...................................................
171
Ban a computer from the Inbound Events
log
..........................................................
96
Ban a computer from the Intrusion
Detection Events log
............................
96
bandwidth
..............................................
172
Banning computer connections
.............
94
blacklist
..........................................
172, 182
Block access for a new program
.............
85
Block access for a program
.....................
85
Block access from the Recent Events log
...............................................................
86
Block access to an existing system service
port
........................................................
99
Blocking Internet access for programs ..85
browser
..................................................
172
brute-force attack
..................................
172
buffer overflow
......................................
172
C
cache
......................................................
172
Check for updates
.............................
13, 14
cipher text
..............................................
172
Clean your computer
............................
119
Cleaning your computer
.......................
117
client
.......................................................
172
compression
..........................................
172
Configure a new system service port ...100
Configure automatic updates
.................
14
Configure event log settings
.................
104
Configure Firewall Protection Status
settings
..................................................
77
Configure intrusion detection
................
77
Configure ping request settings
.............
76
Configure SystemGuards options
..........
53
Configure UDP settings
..........................
76
Configuring alert options
........................
24
Configuring Firewall protection
.............
69
Configuring Smart Recommendations for
alerts
.....................................................
73
Configuring system service ports
...........
98
content-rating group
.............................
172
cookie
.....................................................
173
Copy a shared file
..................................
163
Copyright
...............................................
186
Customer and Technical Support
........
187
Index