McAfee MTP08EMB3RUA Product Guide - Page 6

Using SaaS Email Protection, Using Email Server Protection, Using Vulnerability Scanning

Page 6 highlights

Contents Web filtering features 116 Enabling and disabling browser protection via policy 117 Enabling and disabling browser protection at the client computer 117 Block and warn sites by safety ratings 118 Blocking or warning site access based on safety ratings 119 Blocking or warning file downloads based on safety ratings 119 Blocking phishing pages 120 Block and warn sites by content 120 Blocking or warning site access based on content 121 Authorize and prohibit sites by URL or domain 121 How site patterns work 122 Adding authorized and prohibited sites 123 Customizing messages for users 123 Viewing browsing activity 124 Web Filtering report 125 Best practices (browser protection 126 Frequently asked questions 127 7 Using SaaS Email Protection 129 Core SaaS email protection features 129 Additional SaaS email protection services 130 The SaaS email protection widget and portal 131 Account activation and setup 132 Activating and setting up your account 133 Accessing the SaaS email protection portal 133 Configuring policy settings for SaaS email protection 134 Checking quarantined messages 134 Reports and statistics for email protection 135 Viewing email activity for the week 135 Viewing reports 135 Getting more information 135 8 Using Email Server Protection 137 Email server protection features 137 The installation and setup process 139 Installing email server protection 139 The email server protection widget and management console 140 Management of email server protection 141 Checking notifications and action items 141 Viewing detection and status information 142 Accessing the management console on the server 143 Where to find more information 144 9 Using Vulnerability Scanning 145 Vulnerability scanning features 145 The vulnerability scanning widget and portal 146 Accessing the vulnerability scanning portal 147 Overview of scanning process 148 Types of devices to scan 148 Types of scans 149 Managing scan devices 150 Discovering IP addresses in a domain 150 Discovering IP addresses in a network 150 Adding devices to scan 151 Configuring devices to accept scans 152 Creating device groups 153 6 McAfee Total Protection Service 5.1.5 Product Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175

Web filtering features
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
116
Enabling and disabling browser protection via policy
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
117
Enabling and disabling browser protection at the client computer
.
.
.
.
.
.
.
.
.
.
.
.
.
.
117
Block and warn sites by safety ratings
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
118
Blocking or warning site access based on safety ratings
.
.
.
.
.
.
.
.
.
.
.
.
.
.
119
Blocking or warning file downloads based on safety ratings
.
.
.
.
.
.
.
.
.
.
.
.
.
119
Blocking phishing pages
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
120
Block and warn sites by content
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
120
Blocking or warning site access based on content
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
121
Authorize and prohibit sites by URL or domain
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
121
How site patterns work
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
122
Adding authorized and prohibited sites
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
123
Customizing messages for users
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
123
Viewing browsing activity
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
124
Web Filtering report
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
125
Best practices (browser protection)
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
126
Frequently asked questions
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
127
7
Using SaaS Email Protection
129
Core SaaS email protection features
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
129
Additional SaaS email protection services
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
130
The SaaS email protection widget and portal
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
131
Account activation and setup
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
132
Activating and setting up your account
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
133
Accessing the SaaS email protection portal
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
133
Configuring policy settings for SaaS email protection
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
134
Checking quarantined messages
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
134
Reports and statistics for email protection
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
135
Viewing email activity for the week
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
135
Viewing reports
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
135
Getting more information
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
135
8
Using Email Server Protection
137
Email server protection features
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
137
The installation and setup process
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
139
Installing email server protection
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
139
The email server protection widget and management console
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
140
Management of email server protection
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
141
Checking notifications and action items
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
141
Viewing detection and status information
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
142
Accessing the management console on the server
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
143
Where to find more information
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
144
9
Using Vulnerability Scanning
145
Vulnerability scanning features
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
145
The vulnerability scanning widget and portal
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
146
Accessing the vulnerability scanning portal
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
147
Overview of scanning process
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
148
Types of devices to scan
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
148
Types of scans
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
149
Managing scan devices
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
150
Discovering IP addresses in a domain
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
150
Discovering IP addresses in a network
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
150
Adding devices to scan
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
151
Configuring devices to accept scans
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
152
Creating device groups
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
153
Contents
6
McAfee Total Protection Service 5.1.5 Product Guide