McAfee VSF09EMB1RAA User Guide - Page 204

Trojan, Trojan horse

Page 204 highlights

202 Index Set security level to Automatic 71 Set security level to Standard 71 Set security level to Stealth 71 Setting custom scan options 38, 48 Setting real-time scan options..........38, 46 Setting up a managed network 137 Setting up EasyNetwork 155 Setting up virus protection 31, 45 share 179 Share a file 162 shared secret 179 Sharing and sending files 161 Sharing files 162 Sharing printers 167 shortcut 179 Show or hide an item on the network map 139 Show or hide ignored problems 19 Show or hide informational alerts..........22 Show or hide informational alerts when gaming 23 Showing and hiding informational alerts 22 Shred an entire disk 132 Shred files and folders 131 Shredder features 130 Shredding files, folders, and disks ........131 smart drive 179 SMTP 179 SSID 179 SSL 180 standard e-mail account 180 Start e-mail protection 42 Start firewall protection 63 Start instant messaging protection ........43 Start script scanning protection 42 Start spyware protection 42 Starting Firewall 63 Stop detecting new Friends 149 Stop firewall protection 64 Stop managing a computer's protection status 144 Stop monitoring networks 151 Stop real-time virus protection 47 Stop sharing a file 162 Stop sharing a printer 168 Stop trusting computers on the network 142 synchronize 180 system restore point 180 SystemGuard 180 T temporary file 180 TKIP 180, 183 Trace a computer from the Inbound Events log 108 Trace a computer from the Intrusion Detection Events log 108 Trace a monitored IP address 109 Tracing Internet traffic 107 Trojan, Trojan horse 180 trusted list 180 U U3 181 Understanding Network Manager icons 135 Understanding protection categories. 7, 9, 27 Understanding protection services........10 Understanding protection status ..... 7, 8, 9 Unlock Firewall instantly 78 Updating SecurityCenter 13 URL 181 USB 181 USB drive 179, 181 USB wireless adapter card 181 Using additional protection 41 Using McAfee Virtual Technician ........188 Using SecurityCenter 7 Using SystemGuards options 52 Using trusted lists 58 V Verify your subscription 11 View all events 27 View details for an item 139 View global Internet port activity.........106 View global security event statistics.....106 View inbound events 105 View intrusion detection events...........105 View outbound events 83, 105 View recent events 27, 104 View scan results 33 Viewing events 17, 27 virus 181 VirusScan features 30 VPN 181 W wardriver 181 watch file types 181 watch locations 181 web bugs 182 webmail 173, 182 WEP 175, 182 whitelist 172, 182

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205

202
Index
Set security level to Automatic
...............
71
Set security level to Standard
..................
71
Set security level to Stealth
.....................
71
Setting custom scan options
.............
38, 48
Setting real-time scan options
..........
38, 46
Setting up a managed network
.............
137
Setting up EasyNetwork
........................
155
Setting up virus protection
...............
31, 45
share
.......................................................
179
Share a file
..............................................
162
shared secret
..........................................
179
Sharing and sending files
......................
161
Sharing files
............................................
162
Sharing printers
.....................................
167
shortcut
..................................................
179
Show or hide an item on the network map
.............................................................
139
Show or hide ignored problems
.............
19
Show or hide informational alerts
..........
22
Show or hide informational alerts when
gaming
..................................................
23
Showing and hiding informational alerts
...............................................................
22
Shred an entire disk
...............................
132
Shred files and folders
...........................
131
Shredder features
..................................
130
Shredding files, folders, and disks
........
131
smart drive
.............................................
179
SMTP
......................................................
179
SSID
........................................................
179
SSL
..........................................................
180
standard e-mail account
.......................
180
Start e-mail protection
............................
42
Start firewall protection
..........................
63
Start instant messaging protection
........
43
Start script scanning protection
.............
42
Start spyware protection
.........................
42
Starting Firewall
.......................................
63
Stop detecting new Friends
..................
149
Stop firewall protection
...........................
64
Stop managing a computer's protection
status
...................................................
144
Stop monitoring networks
....................
151
Stop real-time virus protection
..............
47
Stop sharing a file
..................................
162
Stop sharing a printer
............................
168
Stop trusting computers on the network
.............................................................
142
synchronize
............................................
180
system restore point
..............................
180
SystemGuard
..........................................
180
T
temporary file
........................................
180
TKIP
................................................
180, 183
Trace a computer from the Inbound
Events log
...........................................
108
Trace a computer from the Intrusion
Detection Events log
..........................
108
Trace a monitored IP address
...............
109
Tracing Internet traffic
..........................
107
Trojan, Trojan horse
.............................
180
trusted list
..............................................
180
U
U3
...........................................................
181
Understanding Network Manager icons
.............................................................
135
Understanding protection categories. 7, 9,
27
Understanding protection services
........
10
Understanding protection status
.....
7, 8, 9
Unlock Firewall instantly
........................
78
Updating SecurityCenter
........................
13
URL
.........................................................
181
USB
.........................................................
181
USB drive
.......................................
179, 181
USB wireless adapter card
....................
181
Using additional protection
...................
41
Using McAfee Virtual Technician
........
188
Using SecurityCenter
................................
7
Using SystemGuards options
.................
52
Using trusted lists
....................................
58
V
Verify your subscription
.........................
11
View all events
.........................................
27
View details for an item
........................
139
View global Internet port activity
.........
106
View global security event statistics
.....
106
View inbound events
.............................
105
View intrusion detection events
...........
105
View outbound events
....................
83, 105
View recent events
..........................
27, 104
View scan results
.....................................
33
Viewing events
...................................
17, 27
virus
........................................................
181
VirusScan features
...................................
30
VPN
.........................................................
181
W
wardriver
................................................
181
watch file types
......................................
181
watch locations
......................................
181
web bugs
................................................
182
webmail
..........................................
173, 182
WEP
................................................
175, 182
whitelist
..........................................
172, 182