MacScan. MacScan User Guide. Detect, Isolate and Remove Spyware



Similar documents
Software. Webroot. Spy Sweeper. User Guide. for. Webroot Software, Inc. PO Box Boulder, CO Version 6.

Aventail Connect Client with Smart Tunneling

MiraCosta College now offers two ways to access your student virtual desktop.

CONNECT-TO-CHOP USER GUIDE

Instructions for Connecting to PACS outside of a Regional Facility

Installing Novell Client Software (Windows 95/98)

Remote Access - Mac OS X

Sophos Anti-Virus standalone startup guide. For Windows and Mac OS X

Contents. McAfee Internet Security 3

Virtual Office Remote Installation Guide

Airtel PC Secure Trouble Shooting Guide

Sophos Endpoint Security and Control standalone startup guide

FTP Over SSL (FTPS) Core FTP LE. Installing Core FTP LE"

How to install and use the File Sharing Outlook Plugin

User's Manual. Intego Remote Management Console User's Manual Page 1

Immotec Systems, Inc. SQL Server 2005 Installation Document

Installing Microsoft Outlook on a Macintosh. This document explains how to download, install and configure Microsoft Outlook on a Macintosh.

How To Use Secureanything On A Mac Or Ipad (For A Mac)

Using Remote Web Workplace Version 1.01

Bloomfield Hills Schools VPN and Viewconnect Instructions

Protecting Your Computer from Viruses and Spyware

INSTALLING MÜSE UPDATES FOR ISTAN

Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0

ESET NOD32 Antivirus 4 for Linux Desktop. Quick Start Guide

User's Manual. Intego VirusBarrier Server 2 / VirusBarrier Mail Gateway 2 User's Manual Page 1

QUANTIFY INSTALLATION GUIDE

Accessing the Media General SSL VPN

Linko Software Express Edition Typical Installation Guide

educ Office Remove & create new Outlook profile

TxEIS on Internet Explorer 7

Using SSH Secure Shell Client for FTP

Sophos Anti-Virus for Mac OS X: Home Edition Help

Mapping ITS s File Server Folder to Mosaic Windows to Publish a Website

Instructions for Connecting to PACS outside of a Regional Facility

Installation Guide for Kurzweil 3000 Web License (Visual Walkthrough) Macintosh Version 14

Using Spy Sweeper for Windows Author: Jocelyn Kasamoto

Learning Management System (LMS) Quick Tips. Contents LMS REFERENCE GUIDE

Windows 7 Hula POS Server Installation Guide

How to easily clean an infected computer (Malware Removal Guide)

extranet.airproducts.com Windows XP Client Configuration

Installing the Microsoft Network Driver Interface

Welcome to EMP Monitor (Employee monitoring system):

Installation and Troubleshooting Guide for SSL-VPN CONNECTIONS Access

NAS 253 Introduction to Backup Plan

User Guide for the Identity Shield

Windows Server 2003 x64 with Symantec AntiVirus 10 Corporate Edition

How to Install Windows 7 software

McAfee Internet Security Suite Quick-Start Guide

Student ANGEL FAQs. General Issues: System Requirements:

ViRobot Desktop 5.5. User s Guide

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012

The Peer Reviewer s Guide to Editorial Manager

Hallpass Instructions for Connecting to Mac with a Mac

Sophos Anti-Virus for Mac OS X Help

Steps for using MagicConnect

Portal Instructions for Mac

Citrix Receiver 11.8 for Macintosh OS X

Microsoft Security Essentials Installation and Configuration Guide

Introduction and Overview

Adding Outlook to a Blackberry, Downloading, Installing and Configuring Blackberry Desktop Manager

Sophos Anti-Virus for Windows, version 7 user manual. For Windows 2000 and later

Cox Business Premium Security Service FAQs

ONLINE BANKING - INTERNET BROWSER SETTINGS: COOKIES

VIVIDESK Desktops can be accessed with a Macintosh Computer by one of two methods:

Citrix Client Install Instructions

Configuring VPN Using Windows XP

Chapter7 Setting the Receiving PC for Direct Upload. Setting the Receiving PC for Direct Upload For Windows For Macintosh...

System Administrator Guide

Windows XP with Symantec AntiVirus 10 Corporate Edition

IIS, FTP Server and Windows

Contents. VPN Instructions. VPN Instructions... 1

How to remotely access your Virtual Desktop from outside the college using VMware View Client. How to guide

Those who wish to remotely log on to a Pepperdine Windows desktop computer will also need to have these instructions with them when they connect.

1. Open the preferences screen by opening the Mail menu and selecting Preferences...

Configuring Thunderbird for Flinders Mail at home.

Automatic Setup... 1 Manual Setup... 2 Installing the Wireless Certificates... 18

Mercy s Remote Access Instructions

iprint For Apple Computers

Lab: Data Backup and Recovery in Windows XP

Installing TestNav Mac with Apple Remote Desktop

NS Financials. Client Platform Guide for Mac Using Safari Incl Citrix Setup As A Local Client

ACCOUNT SERVICES HELP

Sophos Anti-Virus for Mac OS X Help

Introduction to Computer Security Table of Contents

Computer Science and Engineering MacOS Cisco VPN Client Installation and Setup Guide

Dial Up Config & Connecting Instructions with Graphics

How to Configure Sophos Anti-Virus for Home Systems

Computing Guide. How to set up McAfee virus scanning software and become computer virus savvy

Important Notes for WinConnect Server ES Software Installation:

TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:

Setting up a Virtual Private Network (VPN) connection Windows 8

MyNetFone Virtual Fax. Virtual Fax Installation

Connecting to LRDC Fileserver Remotely Using Windows Vista/7 & SRemote VPN

IsItUp Quick Start Manual

Florida Atlantic University VPN Client Installation Guide

Virtual Owl. Guide for Windows. University Information Technology Services. Training, Outreach, Learning Technologies & Video Production

Table of Contents. 1. Overview Materials Required System Requirements User Mode Installation Instructions..

Team Foundation Server 2013 Installation Guide

SOS SO S O n O lin n e lin e Bac Ba kup cku ck p u USER MANUAL

Transcription:

MacScan MacScan User Guide Detect, Isolate and Remove Spyware

Part 1 1.1 Introduction MacScan is a spyware detection utility for Macintosh OS X that finds and removes spyware and other Internet files that may compromise your privacy from your computer. MacScan uses advanced detection methods to detect, isolate, and remove Spyware, keystroke loggers, and Trojan horses from your system. It alerts you to remote administration programs that may have been maliciously installed on your Macintosh. When MacScan detects spyware, it generates a report which allows the user to isolate the components. MacScan will move all selected spyware programs, extensions, preferences, and log files to a single and secured location. Page 3 of 16

Part 2 2.1 Preferences This section highlights the options that are found on the Preferences screen in MacScan. To change the preferences, select Preferences under the MacScan menu, or click the Prefs icon in the MacScan toolbar. 2.1.1 Detect Remote Administration Programs This option enables additional auditing of files for remote administration programs during a spyware scan. Remote administration programs can be found in shareware, freeware, and commercial applications and allow complete remote control of a computer. In the hands of a malicious user, these programs could be used to access personal information, passwords, and private files. 2.1.2 Automatically check for updated Spyware Definition* This option will enable MacScan to automatically check for updated Spyware Definitions. If an update is available, MacScan will notify you of the update and allow you to download it. * This feature requires an active Internet connection. Page 4 of 16

Part 3 3.1 Getting Started To get started with MacScan, double-click on the MacScan icon. The MacScan Mode Selection screen will appear. No Click the No button if you do not want to run MacScan in authenticated mode. Yes Click the Yes button if you want to run MacScan in authenticated mode. 3.1.1 MacScan Mode Selection Running MacScan in normal mode does not require a username or password. In order to run MacScan in authenticated mode, you will need to provide your OS X username and password. You may be required to authenticate as administrator by entering your username and password before running the scan to complete a full level or custom scan. This will grant MacScan full scanning privileges to your computer. Page 5 of 16

Name Enter the username of the Administrator account in the Name field. By default, the account created after installing OS X is an administrator account. Password Enter the password for the account in the password field. OK Click the OK button to proceed after entering the username and password of an Administrator account. Cancel Click the Cancel button to close the Authenticate screen if you choose not to run MacScan in authenticated mode. After successfully authenticating, or if running MacScan in Normal Mode, MacScan will display the main window: Page 6 of 16

MacScan's intuitive interface makes it easy to start scanning your computer for spyware. When MacScan starts up, the status screen displays statistics about spyware scans performed by MacScan as well as information about the version of MacScan currently running. The spyware statistics are automatically updated after each spyware scan and include the date and time of the last spyware scan, the number of spyware components detected on the last scan, the total number spyware scans that have been run, and the number of spyware components detected overall. Below the scan statistics are internal details about the current version of MacScan, which includes the scan engine version, the Spyware Definitions version, and the creation date of the current definitions. The status screen also includes information on the Cookie Blacklist, a list of known cookies that can track your internet surfing habits. The Cookie Blacklist Version and creation date are also displayed. Page 7 of 16

Part 4 4.1 Scanning for Spyware To view the different types of scans, click on the scan icon located in the MacScan toolbar, or click on the scan button located on the status screen. The scan screen contains information on each type of scan. To choose a scan type, select the appropriate tab. MacScan offers three different types of spyware scans: quick scan, full scan, and custom scan. 4.1.1 Quick Scan The Quick Scan checks the files in your home folder for known spyware applications. MacScan will also scan your running processes for the presence of spyware. If spyware is detected in the current processes but does not appear for isolation after Quick Scan is finished, it may be running from a folder not accessible with your current permissions. If this is the case, try running a Full Scan. If a full scan fails to isolate the spyware file, restart MacScan in Authenticated Mode. Page 8 of 16

4.1.1.1 Running a Quick Scan To perform a Quick Scan, click the Quick Scan tab on the Scan Screen, and then click on the Scan button in the lower right corner. You can then view the scan status as MacScan scans your hard drive. Quick Scans should be performed frequently (daily or weekly). The scans are short but ensure protection of your computer and your privacy. However, running a Full Scan upon installation of MacScan is strongly recommended. Page 9 of 16

4.1.2 Full Scan MacScan's Full Scan function will scan your startup disk for spyware and check for actively running spyware applications. It will search thoroughly for spyware by scanning all accessible files on your start up disk. If you would like to scan a specific folder on your computer such as an external hard drive or removable media such as CDs or DVDs, use Custom Scan instead. 4.1.2.1 Running a Full Scan Click on the Scan button to run a Full Scan on your hard drive. Note: Running MacScan in authenticated mode allows Full Scan to run at full capability. Page 10 of 16

4.1.3 Custom Scan Custom Scan allows you to scan a specific folder or drive for spyware. You can specify a folder, data CD, DVD, or other hard drives by selecting those locations for a Custom Scan. Custom Scan will scan for spyware in all accessible files in the specified location. Note: Spyware detected on a locked volume such as a data CD or DVD cannot be isolated. 4.1.3.1 Running a Custom Scan To configure and perform a Custom Scan, click on the Scan button and choose Custom Scan from the tabbed items. Select the folder or drive to be scanned from the window that appears, and click Select. MacScan will start scanning the specified folder or drive for spyware. Page 11 of 16

If no spyware is found, the following window will be displayed: Done Click the Done button when the scan is over. Cancel Click the Cancel button at any time during a scan to end the current scan. Any spyware detected by that point will be displayed. Threat Each piece of spyware detected by MacScan is assigned a threat level to indicate the impact on your operating system. Trojan horses and keystroke loggers are the biggest threats to your system security and are visually represented by a red triangle. Tracking cookies are medium level threats and are represented by a yellow triangle. Remote administration programs that are not necessarily spyware but can be used to compromise your system security are represented by a green triangle. Spyware Name The spyware applications that have been detected will be displayed in the column labeled Spyware Name. Page 12 of 16

Spyware Type The classification of spyware applications that have been detected (Trojan horse, Keylogger, or Remote Administration Program) will be displayed in the column labeled Spyware Type. As with all of the scan types, Custom Scan will only be able to scan folders and files that you can access with your user account. If you are unable to scan a specific location with Custom Scan, run MacScan in Authenticated Mode. If you do not have administrator access to run in Authenticated Mode, contact the administrator and ask for assistance. If spyware is found, the following screen will be displayed: Select which spyware to isolate, and click the "Isolate" button. Spyware such as Trojan horses and Keyloggers will be isolated to the folder MacScan Isolated Spyware on the Desktop. Tracking cookies will be removed immediately. Page 13 of 16

Part 5 5.1 Cleaning Internet/Web Files Cookies are messages given to a web browser by a web server. The browser stores messages in text files. The message is sent back to the server whenever the browser requests a page from that particular server. MacScan can remove these cookies from your system. After clicking on the Web Files icon, the following screen will appear: You can select specific web browsers and specific files you want to clean. To clean Internet/Web files, you must select at least one browser and at least one file type to clean. Web Browsers to clean: Indicate the web browsers to be cleaned by clicking on the Select box next to the name of the desired browser. Web browsers not installed on the computer will be grayed out and not selectable. You can select more than one web browser to clean at a time. Files to clean: Indicate the files to be cleaned by clicking on the Select box next to the name of the file you want to clean. Page 14 of 16

You can select more than one file to clean at a time. Cookies History Select this box to clear cookies from your computer. Select this box to clear History files. Downloaded Files List Temporary Cache Files Select this box to clear the Downloaded Files list. Select this box to clear Temporary Cache files. Page 15 of 16

Part 6 6.1 Spyware Information Database MacScan comes bundled with spyware information. This section provides you with information about spyware, Keyloggers, Trojan Horses and Remote Administration Programs. 6.1.1 Display Spyware Information Select a Spyware Information entry in the popup menu to display detailed information about that particular topic. 6.1.1.1 Keyloggers Select Keyloggers to get information about Keyloggers. 6.1.1.2 Trojan Horses Select Trojan Horses to get information about Trojan Horses. 6.1.1.3 Spyware Select Spyware to get information about Spyware. 6.1.1.4 Remote Administration Programs Select Remote Administration Programs to get information about Remote Administration programs. Page 16 of 16