This file contains important information regarding
this new release. McAfee recommends that you read
the entire document.
Installation and System Requirements
Diagnosing Your Protection Problems
Configuring Your Web Browser
Copyright and License Agreement
McAfee Total Protection includes the following
programs and features:
Simplified protection status
Easily review your computer's protection status,
check for updates, and fix potential protection
Automated updates and upgrades
Automatically download and install updates for
your registered programs. When a new version
of a registered McAfee program is available,
you get it at no charge while your subscription
is valid, ensuring that you always have
Receive notification of emergency virus outbreaks
and security threats. Then remove, neutralize,
or learn more about the threat.
Comprehensive virus protection
Protect your computer from the latest security
threats, including viruses, Trojans, tracking
cookies, spyware, adware, and other potentially
unwanted programs. Protection extends beyond
the files and folders on your desktop, targeting
threats from different points of entry — including
e-mail, instant messages, and the Web. No tedious
Resource-aware scanning options
Use minimal computer resources when scanning so
that higher priority is given to other tasks.
Using minimal computer resources does not reduce
the effectiveness of the scan. VirusScan offers
you the flexibility to customize real-time
and manual scanning options if you want to;
but if you don't, your computer remains
Let VirusScan decide how to repair a threat.
If VirusScan detects security threats while
running a real-time or manual scan, it tries
to handle the threat automatically according
to the threat type. This way, most threats
can be detected and neutralized without your
Standard and custom protection levels
Guard against intrusion and suspicious activity
using Firewall's default or customizable protection
Receive recommendations, dynamically, to help you
determine whether programs should be granted Internet
access or network traffic should be trusted.
Intelligent access management for programs
Manage Internet access for programs, through alerts
and event logs, and configure access permissions
for specific programs.
Prevent alerts regarding intrusion attempts and
suspicious activities from distracting you during
Computer startup protection
Protect your computer from intrusion attempts,
unwanted programs, and network traffic as soon
as Windows starts.
System service port control
Manage open and closed system service ports
required by some programs.
Manage computer connections
Allow and block remote connections between
other computers and your computer.
HackerWatch information integration
Track global hacking and intrusion patterns through
HackerWatch's Web site, which also provides current
security information about programs on your
computer, as well as global security events and
Internet port statistics.
Instantly block all inbound and outbound traffic
between your computer and the Internet.
Instantly restore Firewall's original protection
Advanced Trojan detection
Detect and block potentially malicious
programs, such as Trojans, from relaying
your personal information on the Internet.
Track recent inbound, outbound, and intrusion
Monitor Internet traffic
Review worldwide maps showing the source of hostile
attacks and traffic. You can also locate detailed
owner information and geographical data for
originating IP addresses, analyze inbound and
outbound traffic, and monitor program bandwidth and
Protect your privacy from possible Internet threats.
Using heuristic-like functionality, McAfee provides
a tertiary layer of protection by blocking items
that display symptoms of attacks or characteristics
of hacking attempts.
Sophisticated traffic analysis
Review inbound and outbound Internet traffic and
program connections, including those that are
actively listening for open connections. This allows
you to see and act upon programs that can be
vulnerable to intrusion.
Use various cleaners to delete unnecessary files
safely and efficiently.
Use Shredder to delete (or shred) items from your
computer's hard drive.
View a graphical overview of the protection status
of the computers and components that make up your
home network. When you make changes to your network
(for example, you add a computer), the network map
recognizes those changes. You can refresh the
network map, rename the network, and show or hide
components of the network map to customize your
view. You can also view the details for any of the
components on the network map.
Use Network Manager’s network map to manage the
protection status of the computers that make up
your home network. You can invite a computer to
join the managed network, monitor the managed
computer's protection status, and fix known
security vulnerabilities from a remote computer on
Filter potentially inappropriate images, configure
content rating groups (age groups used to restrict
the Web sites and content that a user can view), and
set Web browsing time limits (the period and duration
of time that a user can access the Web). Parental
Controls also lets you universally restrict access
to specific Web sites, and grant or block access
based on associated keywords.
Personal Information Protection
Block the transmission of sensitive or confidential
information (for example, credit card numbers,
bank account numbers, addresses, and so on) across
Securely store your personal passwords so that no
other user (not even an Administrator) can access
Prevent unsolicited e-mail from entering your
Inbox. Filters are updated automatically for all your
e-mail accounts. You can also create custom filters
to ensure that all spam is filtered, and report spam
to McAfee for analysis.
Receive warnings about potential phishing (fraudulent)
Web sites that solicit personal information.
Customized spam processing
Mark unsolicited e-mail as spam and move it to your
McAfee Anti-Spam folder, or mark legitimate e-mail as
not spam and move it to your Inbox.
Import your friends' e-mail addresses to the friends
list so that their e-mail messages are not filtered.
Sort list items by relevance
Sort your personal filters, friends, address books,
and Webmail accounts, by relevance (simply click
the appropriate column name).
Anti-Spam supports Mozilla(R) Thunderbird(TM) 1.5
and 2.0, and provides Windows Vista(TM) 64-bit
support for Windows(R) Mail. In addition, the
new gaming mode feature stops Anti-Spam background
processes so that your computer does not slow down
while you play video games or watch DVDs. Anti-Spam
also filters Microsoft(R) Outlook(R), Outlook Express,
or Windows Mail accounts on any port, including SSL
(Secure Socket Layer) ports.
DATA BACKUP (LOCAL)
Local scheduled archiving
Protect your data by archiving files and folders
to CD, DVD, USB drive, external hard drive, or network
drive. After you initiate the first archive,
incremental archives occur automatically for you.
Restore files and folders if they are mistakenly
deleted, or become corrupt on your computer
Compression and encryption
Compress your archived files (default), saving space
on your archive media. As an additional security
measure, your archives are encrypted by default.
Share files with other computers on your network.
When you share files, you grant other computers
read-only access to those files. Only computers
that have full or administrative access to your
managed network (members) can share or access
files shared by other members.
Send files to other computers that have full or
administrative access to your managed network
(members). When you receive a file, it appears in
your EasyNetwork inbox. The inbox is a temporary
storage location for all the files other computers
on the network send to you.
Automated printer sharing
Share any local printers attached to your computer
with other members, using the printer's current
name as the shared printer name. It also detects
printers shared by other computers on your network
and allows you to configure and use those printers.
Installation and System Requirements
-Microsoft(R) Windows(R) 2000 Service Pack 4 (SP4)
or later, Windows XP with Service Pack 1 (SP1) or
later, Windows Vista(TM)
-Personal computer with Pentium-compatible processor
500 MHz or later
-256 MB RAM
-100 MB hard disk space
-800 X 600 or higher resolution
-Microsoft .NET(TM) Framework version 1.1.4322
Supported browser programs
-Microsoft Internet Explorer(R) 6.0 or later
-Mozilla(R) Firefox(R) 1.5 or later
Note: To upgrade to the latest version of Internet
Explorer, visit the Microsoft Web site at
Supported e-mail programs
-Outlook(R), Outlook Express, Eudora(TM),
Netscape(R), Thunderbird, IncrediMail
- Becky, PostPet(TM)(Japanese only)
-MSN(R)/Hotmail(R), or e-mail account with POP3
access, Vista 64-bit Windows Mail
Supported instant messaging programs
-AOL(R) Instant Messenger(TM) 2.1 or later
-Yahoo(R) Messenger 4.1 or later
-Microsoft Windows Messenger 3.6 or later
-MSN Messenger 6.0 or later
Anti-Spam toolbar plug-In
-Outlook Express 6.0 or later
-Outlook 2000 or later
-Eudora 6.0 or later
-Thunderbird 1.0 or later
You cannot download SecurityCenter from the McAfee
Web site if the proxy server you are using requires
authentication (user name and password).
If you do not restart your computer after updating
SecurityCenter, and you then try to uninstall
SecurityCenter, an error message appears. To continue
uninstalling, click OK.
If you are using the Download Manager or a CD when
installing SecurityCenter, and after the download
is complete you click Install, an empty window with
two buttons appears. If you click these buttons,
the installation fails. To resolve this, run the
McAfee Consumer Products Removal tool
cust_support_patches/MCPR.exe) and then try
If you are using a remote desktop connection to
connect to your computer, full screen mode does
Tasks scheduled to run when you log in may not
run correctly if you switch Windows users before
the task is completed.
When VirusScan is installed, Windows Defender
is automatically disabled; however, when
VirusScan is removed, Windows Defender is
A computer running MailEnable may slow down
or encounter problems after VirusScan is
installed. To resolve this issue, reconfigure
your product correctly. Information about
configuring the product for optimum performance
is available on the MailEnable Web site.
If an enterprise version of VirusScan has been
uninstalled, restart your computer before
installing VirusScan; otherwise real-time
scanning could be disabled.
A computer running AVG Anti-Spyware or Trojan
Hunter may slow down after VirusScan is installed.
To resolve this issue, uninstall AVG Anti-Spyware
and/or Trojan Hunter.
VirusScan’s SystemGuards options may be missing
from SecurityCenter (under Computer & Files) if
you upgraded your computer from Windows XP or
Windows 2000 (FAT32) to Vista (NTFS). To resolve
this issue, uninstall and reinstall your
Firewall’s default security level is set to
Trusting, with the option to allow programs
outbound-only Internet access enabled. This means
that an unknown program in HackerWatch
(www.hackerwatch.org) is allowed outbound access.
If a known program attempts inbound access,
you are prompted with an alert requesting a
You can forward a port (through System Services) to
another computer that uses Internet Connection
Sharing (ICS) to share its Internet connection.
After you install Firewall for the first time,
the first private network that is detected is
added to the trusted IPs list.
If you are using Windows Vista 64-bit and you add
a rule for a 32-bit system program (for example,
FTP or Telnet), its 64-bit version is added
No known issues.
You cannot shred mapped network drives.
You cannot rename computers on the network map.
The network map does not appear correctly if a
computer has two active network cards that are
connected to the same network, or to different
networks, or if you create a wireless ad-hoc
connection (wireless session without an access
point) between computers.
If you are using a firewall or security
program that is not from McAfee, the network map
does not display correctly.
Only one computer can grant access to another
computer that wants to join the managed network.
If two computers receive a join request, the
computer that has not yet granted access does not
receive notification when access is granted.
By default, new Windows users and Guest users
are added to the Adult group, with no restrictions
on the content available to them. In previous
versions of Privacy Service, new Windows users
and Guest users were added to the Young child
group by default.
If you block a Web site, all Adult and
Administrator users can still access it.
By default, image filtering is disabled.
In previous versions of Privacy Service,
image filtering was enabled by default.
The Password Vault does not appear
if you log in to Windows as a Guest user.
Privacy Service no longer provides
ad, pop-up, Web bug, or cookie blocking.
If you allow a Web site, its content is
not blocked, even if the content
contains keywords that have been blocked.
If your computer shuts down while programs are
running (for example, a power failure occurs), you
may have to reinstall Privacy Service.
If you uninstall Privacy Service, and then use
Windows System Restore to revert to a state before
you uninstalled Privacy Service, Privacy Service
does not open. To resolve this, uninstall Privacy
Service again, and then reinstall it.
The Parental Controls Web browsing time grid
assumes that Sunday is the first day of the week,
regardless of your Windows settings.
When Parental Controls are disabled, the Parental
Controls area on the Parental Controls
Configuration pane may incorrectly state that
Parental Controls are partially disabled.
If a parent allows a child to view only those sites
that are marked Allow in the Filtered Web Sites
list, and the child attempts to view a blocked site,
incorrect safe page text appears. Also, incorrect
safe page text appears for keyword filtering and
Web site blocking.
If you are using Windows users and you change a user
name, the previous Windows user name still appears
on the Users Settings pane.
The event log does not display the blocked Web
browsing times for users that are not allowed to
browse the Web at any time.
All the content in the source file for a Web site
is filtered, even if it does not actually appear
when the Web site is displayed in your browser.
When you remove blocked keywords, you are not
prompted to confirm their removal.
When adding blocked information, the Name and
Address boxes accept special characters, such
You can add invalid Web sites to the Filtered Web
If you are using Web-based e-mail or chat programs,
and you see keywords that have been blocked, you
may be disconnected or receive an error message.
A protected information alert appears every time the
information you protected is sent to a Web site.
Multiple alerts appear when your protected
information is sent to multiple Web sites at the
The default McAfee Administrator password when
you have forgotten your existing password,
is the word Welcome, regardless of your operating
Logs that show Personal Information has been
detected, are listed under Parental Controls.
If you do not type your personal information
correctly, a separate error message appears
for each portion of the personal information
that contains an error.
If you change your default Web browser
(for example, from Microsoft Internet Explorer
to Firefox), you must restart Privacy Service.
If you change your default Web browser to a
browser that is not familiar to McAfee, you must
restart your computer.
If you are using Windows Mail or Outlook Express,
a temporary folder may briefly appear in the Deleted
Items folder when spam messages are processed.
Anti-Spam does not support IMAP (Internet Message
Access Protocol) accounts for all e-mail programs.
Filtered Web mail does not correctly display all
the character sets in the Partial Message Content
Anti-Spam toolbars in Windows Mail, Outlook Express,
and Outlook, cannot be customized.
When upgrading from SpamKiller 7.0 to Anti-Spam 9.0,
personal filters may not be imported correctly.
If you are using NWI (New Technology Wave Inc.)
VirusChaser?, Anti-Spam personal filters may not
If you are using Windows Mail on Microsoft Windows
64-bit, you must close it before installing
Anti-Spam. However, you are not prompted to do so.
If you are using Windows Mail or Outlook Junk Mail,
some messages marked by Anti-Spam are moved
to the McAfee Anti-Spam folder after they are
processed by Windows Mail or Outlook Junk Mail.
DATA BACKUP (LOCAL)
You cannot backup .pst or .ost data files.
Data Backup may take a long time to open after an
If you update Data Backup, and then you create a
Windows Administrator and Limited user, when you
upgrade your operating system from Windows XP to
Vista, Data Backup does not open for the Windows
Administrator and Limited user who were created
before you updated.
If you log in to Windows with a user name that
contains double-byte characters (for example,
Chinese or Japanese languages), Data Backup
does not open.
When compression is enabled, you cannot archive
a single file larger than 2 GB.
Data can be saved to dual layer DVDs.
When a large number of files are transferred, or
shared and unshared, your computer may slow down.
After you join a managed network, the other computers
on the network may not appear on the network map.
To resolve this, open EasyNetwork again or share one
If you uninstall EasyNetwork using the McAfee
uninstaller, current EasyNetwork tasks do not stop.
For example, if you are sending files to another
computer, the files are sent even though EasyNetwork
is being uninstalled.
If the managed network is not trusted by McAfee
Personal Firewall, or a computer is not on the
managed network, the shared printer may not appear
on the Tools menu.
When you specify dates while searching for files
shared with EasyNetwork, invalid dates are accepted.
If you close or interrupt a file transfer while it
is in progress, no files are copied to the computer
you are sending the files to.
Thumbnail images of shared files may not display
correctly when the computer sharing the files is
initially offline and then comes back online. To
resolve this issue, open EasyNetwork again.
Diagnosing Your Protection Problems
Like a personal, technical support representative,
Virtual Technician collects information about your
SecurityCenter programs so that it can help resolve
your computer's protection problems. When you run
Virtual Technician, it checks to make sure your
SecurityCenter programs are working correctly. If it
discovers problems, Virtual Technician offers to fix
them for you or provides you with more detailed
information about them. When finished, Virtual
Technician displays the results of its analysis
and allows you to seek additional technical support
from McAfee, if necessary. To maintain the security
and integrity of your computer and files, Virtual
Technician does not collect personal, identifiable
To open McAfee Virtual Technician, do one of the
In SecurityCenter, click McAfee Virtual Technician
under Common Tasks.
Visit the McAfee Virtual Technician Web site at
Configuring Your Web Browser
VBScript, bring dynamic and interactive features
to Web sites. McAfee uses these scripting technologies
to bring customized content to McAfee Web sites.
Scripting must be enabled before you can use the
programs and services offered by McAfee.
To enable scripting in Internet Explorer:
1. On the Tools menu, click Internet Options.
2. In the Internet Options dialog box, click the
Security tab, and then click Custom Level.
3. In the Security Settings dialog box, select
Enable for Active scripting under Scripting.
4. Click OK, and then click Yes to confirm the
5. Click OK, and then click OK again.
6. Press F5 to refresh the current Web page.
To enable scripting in Netscape:
1. On the Tools menu, click Options.
2. In the Options dialog box, click the Site Controls
tab in the left pane, and then click the
Site List tab in the right pane.
4. Click OK.
5. Press F5 to refresh the current Web page.
6. To enable scripting in Opera:
7. On the Tools menu, click Preferences.
8. In the Preferences dialog box, click the Advanced
tab, and then
10. Click OK.
11. Press F5 to refresh the current Web page.
To enable scripting in Firefox:
1. On the Tools menu, click Options.
2. In the Options dialog box, click the Content tab.
4. Click OK.
5. Press F5 to refresh the current Web page.
Documentation is included with the product and/or is
available from the McAfee download site.
The User Guide introduces the suite, describes the
features and concepts, and provides detailed
instructions for configuring the programs.
The Help file, accessed from within the program,
provides quick access to program procedures and tasks.
It also includes full topic search and indexing.
The License Agreement describes the terms under which
you use the product. Please read it carefully.
Documents the product's release notes and known
Note: Electronic copies of all documentation manuals
are saved as Adobe(R) PDF files. The product CD
includes the latest version of Adobe Reader, or you
can download any version from the Adobe Web site.
Customer Service and Technical Support Home Page
AVERT (Anti-Virus Emergency Response Team) Home Page
Copyright(C) 2007-2008 McAfee, Inc. All Rights
No part of this publication may be reproduced,
transmitted, transcribed, stored in a retrieval
system, or translated into any language in any form
or by any means without the written permission of
McAfee, Inc. McAfee and other trademarks contained
herein are registered trademarks or trademarks of
McAfee, Inc. and/or its affiliates in the US and/or
other countries. McAfee Red in connection with
security is distinctive of McAfee brand products.
All other registered and unregistered trademarks and
copyrighted material herein are the sole property of
their respective owners.
NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE
LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU
PURCHASED, WHICH SETS FORTH THE GENERAL TERMS AND
CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE.
IF YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU HAVE
ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED
LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT
ACCOMPANIES YOUR SOFTWARE PACKAGING OR THAT YOU HAVE
RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A
BOOKLET, A FILE ON THE PRODUCT CD, OR A FILE
AVAILABLE ON THE WEB SITE FROM WHICH YOU DOWNLOADED
THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL
OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT
INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY
RETURN THE PRODUCT TO MCAFEE, INC. OR THE PLACE
OF PURCHASE FOR A FULL REFUND.