Index
201
Managing your subscriptions
...........
11, 17
man-in-the-middle attack
....................
175
MAPI
.......................................................
175
Mark as Friend
.......................................
150
Mark as Intruder
....................................
150
McAfee EasyNetwork
............................
153
McAfee Network Manager
....................
133
McAfee Personal Firewall
........................
61
McAfee QuickClean
...............................
115
McAfee SecurityCenter
.............................
5
McAfee Shredder
...................................
129
McAfee VirusScan
....................................
29
message authentication code (MAC) ...175
Modify a device's display properties
....
145
Modify a Disk Defragmenter task
.........
126
Modify a managed computer's
permissions
........................................
145
Modify a QuickClean task
.....................
124
Modify a system service port
................
101
Monitor program activity
......................
111
Monitor program bandwidth
...............
111
Monitoring Internet traffic
....................
110
Monitoring your networks
....................
149
MSN
........................................................
175
N
network
..................................................
176
network drive
.........................................
176
Network Manager features
...................
134
network map
..........................................
176
NIC
..........................................................
176
node
........................................................
176
O
Obtain computer network information
.............................................................
107
Obtain computer registration information
.............................................................
107
on-demand scanning
............................
176
Open EasyNetwork
................................
155
Optimizing Firewall security
...................
75
P
password
................................................
176
password vault
.......................................
176
PCI wireless adapter card
......................
176
Personal Firewall features
.......................
62
phishing
..................................................
176
plain text
.................................................
177
Play a sound with alerts
...........................
24
plugin, plug-in
.......................................
177
POP3
...............................................
177, 180
popups
....................................................
177
port
.........................................................
177
potentially unwanted program (PUP) .177
PPPoE
.....................................................
177
Protect your computer during startup...75
protocol
..................................................
177
proxy
.......................................................
177
proxy server
...................................
177, 178
publish
...................................................
178
Q
quarantine
.............................................
178
QuickClean features
..............................
116
R
RADIUS
..........................................
178, 179
real-time scanning
................................
178
Receive notification when a file is sent 166
Recycle Bin
.............................................
178
Re-enabling network monitoring
notifications
.......................................
150
Reference
...............................................
170
Refresh the network map
......................
138
registry
...................................................
178
Remove a banned computer connection
...............................................................
95
Remove a computer connection
............
93
Remove a program permission
..............
87
Remove a system service port
..............
102
Removing access permissions for
programs
..............................................
87
Rename the network
.....................
139, 159
Renew your subscription
........................
12
Restore Firewall settings
.........................
79
roaming
..................................................
178
rogue access point
.................................
178
rootkit
.....................................................
179
router
......................................................
179
S
Scan types
..........................................
33, 38
Scan your PC
......................................
31, 39
Scanning your computer
........................
31
Schedule a Disk Defragmenter task
.....
125
Schedule a QuickClean task
.................
123
Scheduling a scan
..............................
39, 51
Scheduling a task
...................................
123
script
.......................................................
179
Search criteria
........................................
163
Search for a shared file
..........................
163
SecurityCenter features
............................
6
Send a file to another computer
...........
165
Sending files to other computers
.........
165
server
......................................................
179
Set custom scan options
.........................
48
Set real-time scan options
......................
46