Go to page of
Similar user manuals
-
External Hard Drive
McAfee USB-HDDK-250I
22 pages -
External Hard Drive
McAfee USB-HDDK-500GBFG
22 pages -
External Hard Drive
McAfee USB-HDDK-160I
22 pages -
Computer Monitor
McAfee 107P
100 pages 0.84 mb -
Water System
McAfee 5
122 pages 1.98 mb -
External Hard Drive
McAfee USB-HD02-120A
22 pages -
External Hard Drive
McAfee USB-HDDK-160GBFI
22 pages -
Microscope & Magnifier
McAfee Version 7.0
40 pages 1.17 mb
A good user manual
The rules should oblige the seller to give the purchaser an operating instrucion of McAfee 8.7I, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.
What is an instruction?
The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of McAfee 8.7I one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.
Unfortunately, only a few customers devote their time to read an instruction of McAfee 8.7I. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.
What should a perfect user manual contain?
First and foremost, an user manual of McAfee 8.7I should contain:
- informations concerning technical data of McAfee 8.7I
- name of the manufacturer and a year of construction of the McAfee 8.7I item
- rules of operation, control and maintenance of the McAfee 8.7I item
- safety signs and mark certificates which confirm compatibility with appropriate standards
Why don't we read the manuals?
Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of McAfee 8.7I alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of McAfee 8.7I, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the McAfee service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of McAfee 8.7I.
Why one should read the manuals?
It is mostly in the manuals where we will find the details concerning construction and possibility of the McAfee 8.7I item, and its use of respective accessory, as well as information concerning all the functions and facilities.
After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.
Table of contents for the manual
-
Page 1
Installation Guide revision 1. 0 VirusScan ® Enterprise Draft for Beta 1 version 8.7 i McAfee ® Proven Security Industry-leading intrusion preven tion solutions[...]
-
Page 2
[...]
-
Page 3
Installation Guide revision 1. 0 VirusScan ® Enterprise ®™ version 8.7 i McAfee ® Proven Security Industry-leading intrusion preven tion solutions[...]
-
Page 4
COPYRIGHT Copyright © 2008 McAfee, Inc. All Rights Reserv ed. No part of this publication may be reproduced, transmitted, transcribed, stored in a re trieval system, or translated into any l anguag e in any form or by any means without the written permission of McAfee, Inc., or its supplier s or affiliate companies. TRADEMARK ATTRIBUTIONS ACTIVE F[...]
-
Page 5
5 Contents 1 Introducing Vir usScan Enter prise 6 Using this guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 2 Pr e-Installation Inf or mation 8 Get ting product sof t ware and documentatio n . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Re view ing release notes . . . . . . [...]
-
Page 6
6 1 Introducing VirusScan Enterprise McAfee ® VirusScan Enterprise 8.7 i offers easily scalable protection, fast performance, and mobile desig n to protect yo u from viru ses, worms, Trojan horses, as well as potentially unwanted code an d programs. This guide provides information about inst alling, modifying, and re moving VirusScan Enterprise so[...]
-
Page 7
7 VirusScan ® Enterprise software version 8.7 i Installation Guide Introducing Vir usScan Enterp rise Using this guide 1 Conventions This guide us es the following con ventions: Bold Condensed All words from the interf ace, including options, menus, buttons, and dialog box names. Example: Type the User name and Password of the ap propriate account[...]
-
Page 8
8 2 Pre-Installation Information McAfee recommends that you review these topics before installin g the VirusScan Enterprise 8.7 i software: Getting product software and docu mentation . Reviewing release notes . Verifying installation rights . Preserving settings during product upgrade on page 9 . Meeting system requirements on [...]
-
Page 9
9 VirusScan ® Enterprise software version 8.7 i Installation Guide Pre- Installation Information Getting product software and documentation 2 Getting product software and documentation Get the VirusScan Enterprise software and documentation from one of these locations: The product CD. The McAfee download site at: https://secure.nai.com/us/[...]
-
Page 10
10 VirusScan ® Enterprise software version 8.7 i Installation Guide Pre- Installation Information Meeting system requirements 2 Detection definition ( DAT ) file version, if the previous version is later than the version in the installation package. Scanning engine version, if the previous version is later than the version in the installat[...]
-
Page 11
11 VirusScan ® Enterprise software version 8.7 i Installation Guide Pre- Installation Information Deploying, updating, and managing opti ons 2 Browser — Microsoft Internet Explorer, version 5.0 or later. Windows Installer — Microsoft Windows Installer (MSI), version 3.1 or later. Memory — <to be determine d> MB RAM mi nimum[...]
-
Page 12
12 VirusScan ® Enterprise software version 8.7 i Installation Guide Pre- Installation Information Deploying, updating, and managing opti ons 2 For example, if you are using the Setup utili ty to install the VirusScan Enterprise software where Windows 2003 wi th Terminal Services is installe d, the installation stops and you are notified that you m[...]
-
Page 13
13 VirusScan ® Enterprise software version 8.7 i Installation Guide Pre- Installation Information Upgrading the produ ct license 2 Upgrading the product license If you are installing the product for the first time, the product is licensed during the installation process. Skip this section and go to Installing VirusScan Enterprise on page 14 . If y[...]
-
Page 14
14 3 Installing VirusScan Enterprise VirusScan Enterprise 8.7 i installs on workstations and servers . Install the product software using one of these methods: Using the Setup utility to install program files . Using the command line to install program files on page 18 . Using the Setup utility to install program files Use the Setup utility[...]
-
Page 15
15 VirusScan ® Enterprise software version 8.7 i Installation Guide Installi ng VirusScan En terprise Using the Setup util ity to install program files 3 2 McAfee VirusScan Enterprise Setup — Review the release notes. 3 McAfee Licensing — Choose and read the product license. 4 Select Setup Type — Choose the i nstallation type and location. O[...]
-
Page 16
16 VirusScan ® Enterprise software version 8.7 i Installation Guide Installi ng VirusScan En terprise Using the Setup util ity to install program files 3 5 Select Access Protection Level — Choose which access protection rules are enabled by default when this feature is installed . Go to the next step that applies to the installation type you sel[...]
-
Page 17
17 VirusScan ® Enterprise software version 8.7 i Installation Guide Installi ng VirusScan En terprise Using the Setup util ity to install program files 3 7 Feature action options — For each selected featur e, you can also select a corresponding action from the drop-list next to the feature name : This feature will be installed on local hard [...]
-
Page 18
18 VirusScan ® Enterprise software version 8.7 i Installation Guide Installi ng VirusScan En terprise Using the command line to in stall program files 3 10 Ready to install — Start the installation process. 11 McAfee VirusScan Enterprise set up has completed successfully — Choose whether to perform an update task and/or an on-demand scan when [...]
-
Page 19
19 VirusScan ® Enterprise software version 8.7 i Installation Guide Installi ng VirusScan En terprise Using the command line to in stall program files 3 Command-line syntax To install the product from the command line: 1 Open the Windows command-line comp onent usin g one of these methods: Select Command Prompt from the Start menu. Select [...]
-
Page 20
20 VirusScan ® Enterprise software version 8.7 i Installation Guide Installi ng VirusScan En terprise Using the command line to in stall program files 3 Installation scenarios Use these scenarios to custom ize your installation: Installation options and properties Use a combination of options and prope rties to customize th e software installation[...]
-
Page 21
21 VirusScan ® Enterprise software version 8.7 i Installation Guide Installi ng VirusScan En terprise Using the command line to in stall program files 3 Selecting features When you run Setup from the command line to install specific program fe atures, the utility installs those features according to a pre-existing hi erarchy. For example, if you s[...]
-
Page 22
22 VirusScan ® Enterprise software version 8.7 i Installation Guide Installi ng VirusScan En terprise Using the command line to in stall program files 3 Restart options You can force a restart if one is required, prevent the destinatio n computer from restarting during the installation or always perform a restart. To do this, add the REBOOT proper[...]
-
Page 23
23 VirusScan ® Enterprise software version 8.7 i Installation Guide Installi ng VirusScan En terprise Using the command line to in stall program files 3 Installation properties Use these properties to customiz e the command-line installation : Property Description ADDLOCAL Installs specific features to the local computer. CMASOURCEDIR Set the sour[...]
-
Page 24
24 VirusScan ® Enterprise software version 8.7 i Installation Guide Installi ng VirusScan En terprise Using the command line to in stall program files 3 REBOOT Restart your computer. Notes and Tips You can force the computer to re start if it is required, or prevent it fro m restar ting. REMOVE Removes one or more program features. You can specify[...]
-
Page 25
25 VirusScan ® Enterprise software version 8.7 i Installation Guide Installi ng VirusScan En terprise Using the command line to in stall program files 3 Command-line examples Option Command & Description Complete silent installation setup.exe AD DLOCAL=ALL /q Silently inst alls all f eatures. Installing more than one feature. Use a comma. For [...]
-
Page 26
26 4 Modifying, Repairing & Removing VirusScan Enterprise Use the Program Maintenance feature to modify, repair, or reinstal l the VirusScan Enterprise program files. This section describes: Modifying installed features . Reinstalling or repairing p rogram files on page 28 . Removing prog ram files on page 31 . Modifying installed f[...]
-
Page 27
27 VirusScan ® Enterprise software version 8.7 i Installation Guide Modifying, Repai ring & Removi ng VirusScan En terprise Modifying installed features 4 Using the Setup utility to modify installed features 1 Start the Setup utility. See Using the Setup utility to install prog ram files o n page 14 for details 2 Program Maintenance — Select[...]
-
Page 28
28 VirusScan ® Enterprise software version 8.7 i Installation Guide Modifying, Repai ring & Removi ng VirusScan En terprise Reinstalling or repairin g program files 4 Using the command line to modify installed features Open the Windows command-line component. See Command-line syntax on page 19 for details. Install or remove features individual[...]
-
Page 29
29 VirusScan ® Enterprise software version 8.7 i Installation Guide Modifying, Repai ring & Removi ng VirusScan En terprise Reinstalling or repairin g program files 4 Using the Setup utility to rein stall or repair program files 1 Start the Setup utility. See Using the Setup utility to install p rogram files on page 14 . 2 Program Maintenance [...]
-
Page 30
30 VirusScan ® Enterprise software version 8.7 i Installation Guide Modifying, Repai ring & Removi ng VirusScan En terprise Reinstalling or repairin g program files 4 Using the command line to rein stall or repair program files Open the Windows command-line component. Topic Description Command-line Syntax Use this syntax to: Reinstall the [...]
-
Page 31
31 VirusScan ® Enterprise software version 8.7 i Installation Guide Modifying, Repai ring & Removi ng VirusScan En terprise Removing program files 4 Removing program files Use one of thes e methods to remove th e software. Using the Setup utility to remove program files 1 Start the Setup utility to ope n the Program Maintenance dialog box: 2 S[...]
-
Page 32
32 5 Post-Installation Tasks This section describes: Testing your installation . Locating installed files on page 33 . Testing your installation Once installed, the software can scan your system for potentially unwanted files. You can test whether it is installed correctly and can properly scan for potentially unwanted programs by implement[...]
-
Page 33
33 VirusScan ® Enterprise software version 8.7 i Installation Guide Post-Installation Tasks Locating installed files 5 Locating installed files During installation, files are installed in vario us locations. Two types of files are installed: Product files . System files on page 34 . Product files Product files are installed in the installa[...]
-
Page 34
34 VirusScan ® Enterprise software version 8.7 i Installation Guide Post-Installation Tasks Locating installed files 5 Resources folders The resources folder name depends on the la nguage being installed. For examp le, the English resources folder is named Res0 900. These files are installed to the resources folder in the installation path: The de[...]
-
Page 35
35 6 Getting information This section describes: Product documentation on page 3 5 . Contact information on page 36 . Product documentation Unless otherwise noted, product documentati on comes as Adobe Acrobat .PDF files, available on the product CD or from the McAfee download site. Installation Guide — System requirements and instruction[...]
-
Page 36
VirusScan ® Ente rprise software version 8.7 i I nstallation Guide Getting information Contact information 36 6 Contact information Threat Center: McAfee Avert ® Labs http://www.mcafee.com/us/threat_center/d efault.asp Avert Labs Threat Library http://vil.nai.com Avert Labs WebImmune & Submit a Sample (Logon credentials required) https://www.[...]
-
Page 37
37 Index A access protection, defaul t levels of protection 16 audience for this guide 6 Avert Labs Threat Center 36 Avert Labs Thr eat Library 36 B beta program website 36 C command line installing program files 18 logging installa tion progress progress installation log 20 modifying features 28 properties 23 properties, in stallation 23 reinstall[...]
-
Page 38
38 VirusScan ® Ente rprise software version 8.7 i I nstallati on Guide Index submit a sample, Avert Labs WebImmune 36 system requirements, server and workstation 10 T technical support, contacting 36 Terminal Server, installation recommendations. 11 testing your installation 32 third party products 11 Threat Center ( See Avert Labs) threat library[...]