McAfee 5 manual McAfee Firewall Configurations, How to start Visual Trace

Models: 5

1 122
Download 122 pages 48.3 Kb
Page 79
Image 79
How to start Visual Trace

McAfee Firewall

nDetermine the location of sites and their users, uncover the owners of a site, and help track down the origin of unwanted e-mail messages ('spam').

nGet detailed contact information on sites all over the world (where available).

How to start Visual Trace

You can start Visual Trace directly from the Windows start menu. You can also start Visual Trace from the McAfee Firewall Detail Activity screen, the Block IP dialog box, and if you are attacked, from the Windows system tray pop-up notification.

For more information about Visual Trace, please refer to online Help for

Visual Trace.

McAfee Firewall Configurations

The configuration of McAfee Firewall is divided into two classifications – application (program) and system. Upon installation, a base set of rules for system services such as ICMP, DHCP and ARP are installed (these are considered default settings).

On the other hand, the programs classification is personalized. Whenever you run a new program that attempts to communicate over the Internet, McAfee Firewall will prompt and ask you whether you want to trust the program or not.

For example, using Internet Explorer, enter an Internet address or URL (i.e: http://www.mcafee-at-home.com) in the address bar of your browser and press ENTER. Internet Explorer will attempt to connect to that URL over the Internet. The first time you do this, McAfee Firewall prompts if you “trust” Internet Explorer. If you say “Yes,” McAfee Firewall notes Internet Explorer is allowed and whenever you use Internet Explorer in the future, McAfee Firewall will allow its traffic.

As you allow programs to use the Internet, McAfee Firewall “learns” the rules you are creating for the program and saves them for future use. If a Trojan horse program attempts to communicate out from your computer, McAfee Firewall will also prompt you whether you trust them or not, and the decision to block the Trojan horse program from communicating is easy and instantaneous.

Product Guide

79

Page 79
Image 79
McAfee 5 manual McAfee Firewall Configurations, How to start Visual Trace