Configuring access protection settings

Use one of the following process to access and configure the Access Protection Policies properties:

For option descriptions, click ? or Help on each tab.
  1. Refer to the section, Accessing the policy configuration interface to display the Access Protection Policy configuration page.
  2. From the Access Protection Policy page, click the Access Protection tab and configure the access protection settings and rules used to protect your system access points and prevent termination of McAfee processes. See the table, Minimum access protection rule settings.
    CAUTION:
    Failure to enable access protection and prevent McAfee services from being stopped leaves your system unprotected from numerous malware attacks.
    Table 1. Minimum access protection rule settings
    Categories Block Report Rules
    Common Standard Protection Enable Enable Prevent modification of McAfee files and settings.
    Enable Enable Prevent modification of McAfee Common Management Agent files and settings.
    Enable Enable Prevent modification of McAfee Scan Engine files and settings.
    Enable Enable Prevent termination of McAfee processes.
  3. Click the Reports tab and enable the scanning activity log files, where they are stored, their size, and format. Use these log files to help diagnose security threats and determine what actions to take against these threats.