McAfee Total Protection Service Product Guide
5
Spyware protection mode and detections
.................................................................................................
64
Use learn mode to discover programs
............................................................................................
65
Types of scans
.......................................................................................................................................
65
On-access (automatic) scans
.........................................................................................................
65
On-demand scans
........................................................................................................................
66
Email scans
.................................................................................................................................
67
Spyware scans
.............................................................................................................................
67
Scanning on client computers
.................................................................................................................
68
Scanning on demand from the console
..........................................................................................
68
Scanning on demand from Windows Explorer
.................................................................................
68
Scanning email on client computers
...............................................................................................
69
Viewing the progress of scheduled scans
.......................................................................................
69
Enabling and disabling on-access scanning
.....................................................................................
69
Configuring scanning policy options
.........................................................................................................
70
Scheduling a scan
........................................................................................................................
70
Enabling optional types of virus scans
............................................................................................
70
Excluding files and folders from virus scans
....................................................................................
71
Selecting spyware scanning options
...............................................................................................
72
Approving and unapproving programs in a policy
............................................................................
72
Managing detections
..............................................................................................................................
73
Viewing scan results on client computers
.......................................................................................
73
Managing potentially unwanted programs on client computers
........................................................
74
Viewing quarantined files on client computers
................................................................................
74
Viewing user-approved programs and applications
..........................................................................
75
Viewing threats detected on the account
.......................................................................................
76
Viewing unrecognized programs detected on the account
................................................................
77
Reports for virus and spyware protection
.................................................................................................
77
Detections report
.........................................................................................................................
78
Unrecognized Programs report
......................................................................................................
79
Detection History report
...............................................................................................................
79
Best practices (virus and spyware protection)
...........................................................................................
80
Frequently asked questions
.....................................................................................................................
80
Error messages
......................................................................................................................................
81
Using Firewall Protection
.........................................................................................
82
Connection type and detections of incoming communications
....................................................................
83
Custom connections
.....................................................................................................................
83
Firewall protection mode and detections of unknown applications
..............................................................
85
Use learn mode to discover Internet applications
............................................................................
86
The role of IP addresses
.........................................................................................................................
86