Enable mcafee virus protection
Note: If you are unable to see the Configure tab, click the Advanced Menu link. Under the Virus protection is enabled section, click the Advanced button. The new McAfee Internet Security Suite - Special edition from AOL is a proactive, self-updating security bundle that protects your identity and computer from viruses, spyware, email and IM scams, hackers, and online predators.
It also provides backup for important files. You can now surf the web, shop, send e-mails and instant messages, and download files with confidence.
Close all open browser windows. Launch a browser window. Go to get. For detailed instructions on how to install the McAfee software, refer to our help article Installing and Uninstalling McAfee. You can block specific programs from accessing the internet by using firewalls. However, ensure that blocking these programs does not interrupt your network connection or hinder another program from accessing the internet. For more information on how to block access to a program, refer to our help article Using McAfee: Firewalls.
It helps you optimize your computer's performance. You need to have updated security software to protect your computer against the latest threats. If your McAfee software is not receiving updates, then refer to our help article Troubleshooting McAfee.
McAfee QuickClean cleans your internet cache, temporary files, registry keys, deleted email messages, temporary files, and other non-essential files that are taking up space on your computer. Note: If you don't see the McAfee icon next to the clock, click the arrow next to the clock to reveal the hidden icons.
Defragmenter is a Windows program designed to increase the speed of your computer by rearranging files stored on a disk to occupy contiguous storage locations. Scroll down the Navigation Center pane and under Features , click the Defragmenter link. Select the drive you want to defragment and click the Defragment disk button. Click the Use McAfee scan schedule option and then click the drop-down menu to choose a schedule.
Or select Set my own schedule option and choose your preferred scheduled QuickClean. Spyware protection removes spyware, adware, and other potentially unwanted programs from your computer. These programs gather and transmit data from your computer without your permission. You can disable or enable McAfee spyware protection at any time. If you see the message Your computer is at risk as shown in the image below , click Schedule and run scans. Scroll down to the Scan for these threats section, check the box next to Spyware and other potentially unwanted programs , and then click Apply.
Scroll down to the Scan for these threats section, uncheck the box next to Spyware and other potentially unwanted programs , and then click Apply. From the Internet Connections for Programs list, ensure that the application that you are trying to use has Full Access. If the application is blocked, click the application for which you want to grant full access, then click Edit.
Note: If the application that you are using is not being blocked, the issue is not related to the firewall. Click the Access drop-down menu, select Full , and then click Save. The McAfee phishing filter helps protect you from websites that are fraudulent and may solicit you for personal information. If you browse to a known or potentially fraudulent website, you are redirected to the Phishing filter page. The phishing filter is enabled as long as the spam filters are turned on; however, if you would like the filter to ignore certain websites that you trust, you can add those sites to your Allow List.
Click Add in the lower-right hand corner to add a website to your Allow List. This lets the phishing filter know that you trust this site. Repeat steps 5 and 6 to add more websites. Applications on your computer try to send or receive data over the internet, which can become a threat to your computer if those applications come into contact with viruses or are accessed by hackers. With Vulnerability Scanner, you no longer have to wait to be notified when a Windows or program update is available.
Vulnerability Scanner finds them first and then installs them. Vulnerability Scanner first checks for potential security issues in your Windows files and installed programs.
It then scans for software updates to repair any vulnerable Windows files and programs, and provides a detailed scan report that shows the number of updates found, and a description of each update. Depending on the type of scan you run, Vulnerability Scanner can automatically install all updates, or you can select the updates you want installed. Finally, Vulnerability Scanner provides a summary of installed or incomplete updates, and lets you know if there are additional updates that you need to install yourself.
Tip: If you're using Windows 7 and don't see the McAfee icon next to the clock, click the arrow next to the clock to reveal hidden icons. On the Vulnerability Scanner window you have the option to customize the scan or schedule a scan.
Otherwise, click Done to exit Vulnerability Scanner. McAfee Network Manager presents a graphical view of the computers and components that make up your home network.
You can use PC and Home Network Tools to remotely monitor the protection status of each managed computer in your network and to remotely fix reported security vulnerabilities on those managed computers. For instructions on how to use McAfee Network Manager, click on the version of McAfee you currently have installed on yourcomputer. If you've installed McAfee after October 14, you are using version There is also some descriptions about each of the system icons. Graphical network map: PC and Home Network Tools' network map provides a graphical overview of the security status of the computers and components that make up your home network.
When you make changes to your network for example, adding a computer , the network map recognizes those changes. You can refresh the network map, rename the network, and show or hide components of the network map to customize your view. You can also view the details associated with any of the components displayed on the network map. Remote management: Use the PC and Home Network Tools network map to manage the security status of the computers that make up your home network.
You can invite a computer to join the managed network, monitor the managed computer's protection status, and fix known security vulnerabilities from a remote computer on the network.
Given along with them are the descriptions of these icons. Note: The first time you access the network map, you are prompted to trust the other computers on the network, before the network map appears. Select a PC or device on the network map to see its name, its protection status, and other information required to manage it.
You can view detailed information about any trusted PC on your network, and rename PCs that are not trusted. You can also include descriptive information about the PC in its name, to make identifying it easy for other users. For example, when you define a device as a gaming device, the network map represents it with an image of a game controller.
You can use the network map to leave your home network for some reason, such as if you join a home network by mistake. Leaving a network ensures that none of the users connected to that network can view information on your PC or establish a connection with it. Deleted files can be recovered from your computer even after you empty your Recycle Bin. When you delete a file, Windows marks that space on your disk drive as no longer being in use, but the file is still there.
Using computer forensic tools, you can recover tax records, job resumes, or other documents that you deleted. Shredder protects your privacy by safely and permanently deleting unwanted files.
To permanently delete a file, you must repeatedly overwrite the existing file with new data. Microsoft Windows does not securely delete files because every file operation would be very slow. Shredding a document does not always prevent that document from being recovered because some programs make temporary hidden copies of open documents. If you only shred documents that you see in Windows Explorer, you could still have temporary copies of those documents.
Shredder allows you to erase your Recycle Bin contents, temporary internet files, website history, files, folders, and disks. Note: Shredded files are not backed up.
You cannot restore files that Shredder has deleted. Shredder protects your privacy by safely and permanently deleting unwanted files such as your Recycle Bin contents, temporary internet files, and website history. You can select files and folders to shred, or browse to them.
This will allow you to select a specific folder on your computer to shred. If real-time scanning detects a threat, an alert appears. For most viruses, trojans, scripts and worms, real-time scanning automatically tries to clean the file, and alerts you. For potentially unwanted programs and SystemGuards, real-time scanning detects the file or change, and alerts you.
For buffer overflow, tracking cookies, and script activity, real-time scanning automatically blocks the activity, and alerts you. You can then choose how to manage detected files, detected email, suspect scripts, potential worms, potentially unwanted programs, SystemGuards or buffer overflows. McAfee employs an array of alerts to help you manage your security. A red alert requires a response from you. In some cases, McAfee cannot determine how to respond automatically to a particular activity.
In these cases, the red alert describes the activity in question and gives you one or more options to select. A yellow alert is a non-critical notification that usually requires a response from you. The yellow alert describes the activity in question and gives you one or more options to select. In most cases, a green alert provides basic information about an event and does not require a response.
If you choose not to show an alert again and later on you change your mind, you can go back and configure that alert to appear again. For more information about configuring alert options, see your Security Center documentation. Updating the software will keep your computer updated and secure from the latest viral threats. Select Download and install updates automatically and click Done.
Note: Remember to turn automatic updates on at a later point. With automatic updates turned off your computer is vulnerable to the latest security threats. To update the McAfee software, follow some simple steps below.
AOL Help. Using McAfee: Features. Read below about all of the different features McAfee Security Suite has to offer. The instructions given below are for the older version of McAfee.
Disable virus protection Please note that disabling virus protection also disables real-time spyware, e-mail, and instant message protection. On Advanced Menu , click the Configure tab. In the confirmation dialog box, choose one of the following: To restart virus protection after a specified time, click the Select when to re-enable real-time scanning drop-down menu, choose a time, and then click OK.
To stop virus protection from restarting after a specified time, click the Select when to re-enable real-time scanning drop-down menu, click Never , and then click OK. On Advanced Menu, click the Configure tab. Configure Real-Time Protection 1. On the Windows Taskbar, next to the clock double click the Mcafee M icon. On the Advanced Menu link, click the Configure tab. Select or clear the following check boxes: Scan for unknown viruses using heuristics : Files are matched to signatures of known viruses in order to detect signs of unidentified viruses.
This option provides the most thorough scan, but is generally slower than a normal scan. Scan and remove tracking cookies : Cookies that potentially gather and transmit data without your permission are detected and removed. A cookie identifies users when they visit a Web page. Scan network drives : Drives connected to your network are scanned.
Enable buffer overflow protection : If buffer overflow activity is detected, it is blocked and you are alerted. Click one of the following options: All files recommended : Every file type that your computer uses is scanned. Virus protection continuously monitors your computer for virus activity; therefore, it is important that you enable virus protection on your computer.
To enable virus protection 1. Note: If you are using Windows 7 and don't see the McAfee icon next to the clock, click the arrow next to the clock to reveal hidden icons. AOL Help. McAfee: Disable or enable virus protection. The instructions given below are for the older version of McAfee. Disable virus protection Please note that disabling virus protection also disables real-time spyware, e-mail, and instant message protection.
On Advanced Menu , click the Configure tab. In the confirmation dialog box, choose one of the following: To restart virus protection after a specified time, click the Select when to re-enable real-time scanning drop-down menu, choose a time, and then click OK.
To stop virus protection from restarting after a specified time, click the Select when to re-enable real-time scanning drop-down menu, click Never , and then click OK.
On Advanced Menu, click the Configure tab. Yes No.
0コメント