McAfee MTP10EMB3RAA Processor Guide - Page 5

Using Firewall Protection - virus scan

Page 5 highlights

Spyware protection mode and detections 64 Use learn mode to discover programs 65 Types of scans...65 On-access (automatic) scans...65 On-demand scans...66 Email scans...67 Spyware scans...67 Scanning on client computers...68 Scanning on demand from the console 68 Scanning on demand from Windows Explorer 68 Scanning email on client computers 69 Viewing the progress of scheduled scans 69 Enabling and disabling on-access scanning 69 Configuring scanning policy options...70 Scheduling a scan...70 Enabling optional types of virus scans 70 Excluding files and folders from virus scans 71 Selecting spyware scanning options 72 Approving and unapproving programs in a policy 72 Managing detections...73 Viewing scan results on client computers 73 Managing potentially unwanted programs on client computers 74 Viewing quarantined files on client computers 74 Viewing user-approved programs and applications 75 Viewing threats detected on the account 76 Viewing unrecognized programs detected on the account 77 Reports for virus and spyware protection 77 Detections report...78 Unrecognized Programs report...79 Detection History report...79 Best practices (virus and spyware protection 80 Frequently asked questions...80 Error messages...81 Using Firewall Protection 82 Connection type and detections of incoming communications 83 Custom connections...83 Firewall protection mode and detections of unknown applications 85 Use learn mode to discover Internet applications 86 The role of IP addresses...86 McAfee Total Protection Service Product Guide 5

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134

McAfee Total Protection Service Product Guide
5
Spyware protection mode and detections
.................................................................................................
64
Use learn mode to discover programs
............................................................................................
65
Types of scans
.......................................................................................................................................
65
On-access (automatic) scans
.........................................................................................................
65
On-demand scans
........................................................................................................................
66
Email scans
.................................................................................................................................
67
Spyware scans
.............................................................................................................................
67
Scanning on client computers
.................................................................................................................
68
Scanning on demand from the console
..........................................................................................
68
Scanning on demand from Windows Explorer
.................................................................................
68
Scanning email on client computers
...............................................................................................
69
Viewing the progress of scheduled scans
.......................................................................................
69
Enabling and disabling on-access scanning
.....................................................................................
69
Configuring scanning policy options
.........................................................................................................
70
Scheduling a scan
........................................................................................................................
70
Enabling optional types of virus scans
............................................................................................
70
Excluding files and folders from virus scans
....................................................................................
71
Selecting spyware scanning options
...............................................................................................
72
Approving and unapproving programs in a policy
............................................................................
72
Managing detections
..............................................................................................................................
73
Viewing scan results on client computers
.......................................................................................
73
Managing potentially unwanted programs on client computers
........................................................
74
Viewing quarantined files on client computers
................................................................................
74
Viewing user-approved programs and applications
..........................................................................
75
Viewing threats detected on the account
.......................................................................................
76
Viewing unrecognized programs detected on the account
................................................................
77
Reports for virus and spyware protection
.................................................................................................
77
Detections report
.........................................................................................................................
78
Unrecognized Programs report
......................................................................................................
79
Detection History report
...............................................................................................................
79
Best practices (virus and spyware protection)
...........................................................................................
80
Frequently asked questions
.....................................................................................................................
80
Error messages
......................................................................................................................................
81
Using Firewall Protection
.........................................................................................
82
Connection type and detections of incoming communications
....................................................................
83
Custom connections
.....................................................................................................................
83
Firewall protection mode and detections of unknown applications
..............................................................
85
Use learn mode to discover Internet applications
............................................................................
86
The role of IP addresses
.........................................................................................................................
86