How to configure the preferences in Internet Security for MacEnvironment
McAfee Internet Security for Mac
OS X 10.7 and later
To access the preferences, click the M in your taskbar and select McAfee Internet Security Preferences. To make changes in any page, you must first click the lock to make changes, then type the credentials for your Administrator profile.
- General - This page allows you to enable or disable the core modules of Internet Security using the on/off bars.
- McAfee does not recommend disabling any of these features, except for testing purposes. If you disable a feature for testing, remember to re-enable it as soon as your testing is complete.
- The following is a complete list of all features available for modification on this page:
- Real-Time Scan: Provides protection in real time, as programs write to the drive.
- Spyware Scan: Protects your computer against potentially malicious and exploitative programs.
- Application Protection: Protects important system files and folders on your computer so malware cannot alter the data.
- Desktop Firewall: Filters your Internet traffic, preventing port exploration and blocking unwanted connections.
- Automatic Update: Allows Internet Security to keep itself up-to-date with the latest available patches, engines, and DAT files.
- Anti-malware - This page allows you specify various scanning options. The available options are:
- Real-Time Scan: The options on this page allow you to specify when to scan in real-time (Read, Write, or Read & Write), defines what to do when an infected or suspicious file is found (Clean, Quarantine, Delete, or Notify), and allows you to enable scanning for Archives & Compressed Files, Apple Mail Messages, and Network Volumes (disabled by default to improve the speed of scanning).
- Scheduled & Manual Scans: The options on this page allow you to set up custom scans to be run when you manually start them. You can also define what the manual scan will do when an infected or suspicious file is found (Clean, Quarantine, Delete, or Notify), and enable scanning for Archives & Compressed Files and Apple Mail Messages (disabled by default to improve the speed of scanning).
- Exclusions: This page allows you to specify locations, files, and folders you want to exclude from a Real-Time, Scheduled, or Manual Scan. You can add items to the exclusions list by clicking the + sign and navigating to the location, file, or folder you want to exclude. You can use the - sign to remove items from this list, and press Reset to clear the list.
- Application Protection - This page allows you to specify how Internet Security protects application files and folders. The available options are:
- Rules: This page allows you to specify how running applications are allowed to access files, and how Internet Security responds to them. Apple signed binary files are allowed by default, and Unknown/Modified Applications can be Allowed, Blocked, or set to Prompt you for attention. You can exclude specific applications by clicking the + sign and typing the name of the Application into the Find box. You can then select one of the following options:
- Allow Execution With Full Network Access
- Allow Execution Without Network Access
- Allow Execution With Restricted Network Access
- Block Execution
After making this selection you can specify the network Protocol, IP/Subnet Address, Port/Range, Direction, and Action to be performed. You can use the - sign to remove items from this list, and the checkmark to apply rules to your modifications.
- Exclusions: This page allows you to specify locations, files, and folders you wish to exclude from the Application Protection rules. You can add items to the exclusions list by clicking the + sign and navigating to the location, file, or folder you want to exclude. You can use the - sign to remove items from this list.
- Desktop Firewall - This page allows you to specify Firewall preferences including the advanced options for Firewall Logging (Provides information on Firewall activity), Stealth Mode (Tells your MAC to not respond or acknowledge traffic from uninvited sources), and Block Unknown Traffic (Blocks all incoming traffic from computers not in the trusted list or specified by rule). The options are:
- Rules: You can set rules defining how the firewall handles certain network traffic, and which communication is not allowed.
- Allow all connections - Allows all traffic from trusted connections.
- Deny - Allows you to block communication that is incoming, outgoing, or both.
- Custom - Allows you to allow or block communication for specific IP Addresses.
- Trusted Networks: This page allows you to create groups and add trusted networks and computers to them by IP Address, Subnet, or Host Name.
After changing your preferences you should click the padlock to secure your changes.