Introduction Once installed, Threat Prevention immediately begins protecting your system from threats. This software offers easy to use, scalable protection, and fast performance to protect your environment from the following: Viruses, worms, and trojan horses Access point violations Buffer overflow exploits Potentially unwanted code and programs Security content updates are delivered automatically to target specific vulnerabilities and block emerging threats from executing. Threat Prevention detects threats based on security content files, then acts, based on settings that you configured. You can configure the software as a standalone product on the client system. Or, you can use McAfee ePO software to manage and enforce policies, then use queries and dashboards to track activity and detections. Note: For information about McAfee ePO software, see the product documentation. Component interactionAs an administrator and user, you must be familiar with the components and how they interact. The following figure shows these components for a basic environment. Using Threat Prevention features to protect your systemProtecting your client systems from viruses, worms, and trojans requires defining threat prevention and detection policies, responding to threats, and ongoing analyzing and tuning. McAfee ePO features leveraged by Threat Prevention Threat Prevention leverages these features in the McAfee ePO environment. What to do firstOnce installed, Threat Prevention uses the content files packaged with the product to provide general security for your environment. McAfee recommends that you download the latest content files and customize the configuration to meet your requirements before deploying to client systems.