McAfee MIS09EMB3RAA User Guide - Page 270

Configuring Smart Recommendations

Page 270 highlights

268 Index client 240 compression 240 Configure a new system service port ...100 Configure automatic updates 14 Configure event log settings 104 Configure Firewall Protection Status settings 77 Configure intrusion detection 77 Configure ping request settings 76 Configure SystemGuards options ..........53 Configure UDP settings 76 Configuring alert options 24 Configuring Firewall protection 69 Configuring phishing protection..........139 Configuring Smart Recommendations for alerts 73 Configuring spam detection 119 Configuring system service ports ...........98 Configuring users 145 content-rating group 240 cookie 241 Copy a shared file 231 Copyright 254 Customer and Technical Support ........255 D DAT 241 Defragment your computer 189 Defragmenting your computer 189 Delete a Disk Defragmenter task ..........195 Delete a QuickClean task 193 denial-of-service (DOS) attack 241 dialers 241 dictionary attack 241 Disable archive encryption and compression 174 Disable automatic updates 14 Disable keyword filtering 158 Disable local archive 170 Disable phishing protection 140 Disable Smart Recommendations..........74 Disable spam protection 125 Disable the Anti-Spam toolbar 128 Display alerts while gaming 67 Display Smart Recommendations..........74 DNS 241 domain 241 E EasyNetwork features 222 Edit a banned computer connection .....95 Edit a computer connection 92 Edit a domain 132 Edit a friend 131 Edit a McAfee user's account information 148 Edit a personal filter 124 Edit a Webmail account 134 Edit sites in your whitelist 140 email 241, 250 email client 241 Enable age-appropriate searching .......150 Enable local archive 170 Enable Smart Recommendations ..........73 Enable SystemGuards protection ..........53 Enabling age appropriate searching ....150 Enabling and disabling local archive ...170 encryption 240, 242, 245 ESS 242 event 242 Event Logging 104 Exclude a location from the archive.....173 external hard drive 242 F file fragments 242 Filter potentially inappropriate Web images 152 Filtering e-mail 127 Filtering potentially inappropriate Web images 152 Filtering Web sites 153, 155 Filtering Web sites using keywords.....155, 158 firewall 242 Fix protection problems automatically .17 Fix protection problems manually.........18 Fix security vulnerabilities 214 Fixing or ignoring protection problems .8, 16 Fixing protection problems 8, 17 Fixing security vulnerabilities 214 G Geographically trace a network computer 107 Get program information 88 Get program information from the Outbound Events log 88 Grant access to the network 225 H Hide informational alerts 67 Hide security messages 25 Hide the splash screen at startup ...........24 Hide virus outbreak alerts 25 home network 242, 244 hotspot 242

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274

268
Index
client
.......................................................
240
compression
..........................................
240
Configure a new system service port ...100
Configure automatic updates
.................
14
Configure event log settings
.................
104
Configure Firewall Protection Status
settings
..................................................
77
Configure intrusion detection
................
77
Configure ping request settings
..............
76
Configure SystemGuards options
..........
53
Configure UDP settings
...........................
76
Configuring alert options
........................
24
Configuring Firewall protection
.............
69
Configuring phishing protection
..........
139
Configuring Smart Recommendations for
alerts
......................................................
73
Configuring spam detection
.................
119
Configuring system service ports
...........
98
Configuring users
..................................
145
content-rating group
.............................
240
cookie
.....................................................
241
Copy a shared file
..................................
231
Copyright
...............................................
254
Customer and Technical Support
........
255
D
DAT
.........................................................
241
Defragment your computer
..................
189
Defragmenting your computer
.............
189
Delete a Disk Defragmenter task
..........
195
Delete a QuickClean task
......................
193
denial-of-service (DOS) attack
.............
241
dialers
.....................................................
241
dictionary attack
....................................
241
Disable archive encryption and
compression
.......................................
174
Disable automatic updates
.....................
14
Disable keyword filtering
......................
158
Disable local archive
.............................
170
Disable phishing protection
.................
140
Disable Smart Recommendations
..........
74
Disable spam protection
.......................
125
Disable the Anti-Spam toolbar
.............
128
Display alerts while gaming
....................
67
Display Smart Recommendations
..........
74
DNS
.........................................................
241
domain
...................................................
241
E
EasyNetwork features
............................
222
Edit a banned computer connection
.....
95
Edit a computer connection
...................
92
Edit a domain
.........................................
132
Edit a friend
............................................
131
Edit a McAfee user's account information
.............................................................
148
Edit a personal filter
..............................
124
Edit a Webmail account
........................
134
Edit sites in your whitelist
.....................
140
email
...............................................
241, 250
email client
............................................
241
Enable age-appropriate searching
.......
150
Enable local archive
..............................
170
Enable Smart Recommendations
..........
73
Enable SystemGuards protection
..........
53
Enabling age appropriate searching
....
150
Enabling and disabling local archive ...170
encryption
..............................
240, 242, 245
ESS
..........................................................
242
event
.......................................................
242
Event Logging
........................................
104
Exclude a location from the archive
.....
173
external hard drive
................................
242
F
file fragments
.........................................
242
Filter potentially inappropriate Web
images
.................................................
152
Filtering e-mail
......................................
127
Filtering potentially inappropriate Web
images
.................................................
152
Filtering Web sites
.........................
153, 155
Filtering Web sites using keywords
.....
155,
158
firewall
....................................................
242
Fix protection problems automatically . 17
Fix protection problems manually
.........
18
Fix security vulnerabilities
....................
214
Fixing or ignoring protection problems .8,
16
Fixing protection problems
................
8, 17
Fixing security vulnerabilities
..............
214
G
Geographically trace a network computer
.............................................................
107
Get program information
.......................
88
Get program information from the
Outbound Events log
...........................
88
Grant access to the network
.................
225
H
Hide informational alerts
.......................
67
Hide security messages
...........................
25
Hide the splash screen at startup
...........
24
Hide virus outbreak alerts
......................
25
home network
................................
242, 244
hotspot
...................................................
242