McAfee MTP08EMB3RUA Product Guide - Page 5

Using Firewall Protection, Using Browser Protection and Web Filtering

Page 5 highlights

Contents Viewing quarantined files on client computers 81 Viewing user-approved programs and applications 81 Viewing threats detected on the account 82 Viewing unrecognized programs detected on the account 83 Reports for virus and spyware protection 83 Detections report 83 Unrecognized Programs report 84 Detection History report 85 Best practices (virus and spyware protection 85 Frequently asked questions 87 Error messages 87 5 Using Firewall Protection 89 Connection type and detections of incoming communications 90 Custom connections 91 Firewall protection mode and detections of unknown applications 92 Use learn mode to discover Internet applications 93 The role of IP addresses 93 The role of system service ports 94 Standard assignments for system service ports 94 Firewall configuration 95 Interaction between user and administrator policy settings 97 Configuring policy options 97 Selecting general firewall settings 97 Configuring options for Internet applications 98 Tracking blocked communications 98 Configuring custom connections 99 Configuring system services and port assignments 99 Configuring IP addresses 100 Installing and enabling firewall protection at the policy level 101 Installing firewall protection during policy updates 101 Enabling and disabling firewall protection 102 Managing detections 102 Viewing unrecognized programs detected on the account 102 Viewing user-approved programs and applications 103 Viewing blocked communications 103 Reports for firewall protection 104 Unrecognized Programs report 104 Inbound Events Blocked by Firewall report 105 Best practices (firewall protection 105 Frequently asked questions 106 Questions about policies 107 Questions about general firewall protection 107 6 Using Browser Protection and Web Filtering 109 Browser protection features 109 How safety ratings are compiled 110 Safety icons and balloons protect during searches 111 Using site safety balloons 111 Testing communication problems 111 SiteAdvisor menu protects while browsing 112 Using the SiteAdvisor menu 113 Safety reports provide details 113 Viewing safety reports 115 Information that browser protection sends to McAfee 115 Installing browser protection during policy updates 116 McAfee Total Protection Service 5.1.5 Product Guide 5

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175

Viewing quarantined files on client computers
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
81
Viewing user-approved programs and applications
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
81
Viewing threats detected on the account
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
82
Viewing unrecognized programs detected on the account
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
83
Reports for virus and spyware protection
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
83
Detections report
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
83
Unrecognized Programs report
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
84
Detection History report
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
85
Best practices (virus and spyware protection)
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
85
Frequently asked questions
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
87
Error messages
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
87
5
Using Firewall Protection
89
Connection type and detections of incoming communications
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
90
Custom connections
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
91
Firewall protection mode and detections of unknown applications
.
.
.
.
.
.
.
.
.
.
.
.
.
.
92
Use learn mode to discover Internet applications
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
93
The role of IP addresses
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
93
The role of system service ports
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
94
Standard assignments for system service ports
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
94
Firewall configuration
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
95
Interaction between user and administrator policy settings
.
.
.
.
.
.
.
.
.
.
.
.
.
.
97
Configuring policy options
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
97
Selecting general firewall settings
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
97
Configuring options for Internet applications
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
98
Tracking blocked communications
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
98
Configuring custom connections
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
99
Configuring system services and port assignments
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
99
Configuring IP addresses
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
100
Installing and enabling firewall protection at the policy level
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
101
Installing firewall protection during policy updates
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
101
Enabling and disabling firewall protection
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
102
Managing detections
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
102
Viewing unrecognized programs detected on the account
.
.
.
.
.
.
.
.
.
.
.
.
.
.
102
Viewing user-approved programs and applications
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
103
Viewing blocked communications
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
103
Reports for firewall protection
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
104
Unrecognized Programs report
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
104
Inbound Events Blocked by Firewall report
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
105
Best practices (firewall protection)
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
105
Frequently asked questions
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
106
Questions about policies
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
107
Questions about general firewall protection
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
107
6
Using Browser Protection and Web Filtering
109
Browser protection features
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
109
How safety ratings are compiled
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
110
Safety icons and balloons protect during searches
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
111
Using site safety balloons
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
111
Testing communication problems
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
111
SiteAdvisor menu protects while browsing
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
112
Using the SiteAdvisor menu
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
113
Safety reports provide details
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
113
Viewing safety reports
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
115
Information that browser protection sends to McAfee
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
115
Installing browser protection during policy updates
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
116
Contents
McAfee Total Protection Service 5.1.5 Product Guide
5