Use one of the following process to access and configure the
Access Protection Policies properties:
For option descriptions, click
? or
Help on each tab.
Refer to the section,
Accessing the policy configuration interface to display the
Access Protection Policy configuration page.
From the Access
Protection Policy page, click the
Access Protection tab and configure the
access protection settings and rules used to protect your system access points
and prevent termination of
McAfee
processes. See the table,
Minimum access protection rule settings.
CAUTION:
Failure to enable access protection and
prevent
McAfee services from
being stopped leaves your system unprotected from numerous malware attacks.
Table 1. Minimum access protection rule settings
Categories
Block
Report
Rules
Common Standard Protection
Enable
Enable
Prevent modification of
McAfee files
and settings.
Enable
Enable
Prevent modification of
McAfee Common
Management Agent files and settings.
Enable
Enable
Prevent modification of
McAfee Scan
Engine files and settings.
Enable
Enable
Prevent termination of
McAfee
processes.
Click the
Reports tab and enable the scanning activity
log files, where they are stored, their size, and format. Use these log files
to help diagnose security threats and determine what actions to take against
these threats.