Product ManualCare for our Environment, ‘It's the right thing to do’.Symantec has removed the cover from this manual to reduce the Environmental
About Vulnerability Protection ... . . . 194About the types of security risks ... . . . ... 197About configuring POP3 and SMTPports
5In the Message Protection section, move the On/Offswitch to the left to the On position, click Configure,and check all options for the following feat
Norton AntiVirus automatically performs differenttypes of scans to secure your computer from latestthreats. It also lets you run different types of sc
Reputation Scan displays thereputation information of thefiles on your computer. Itdisplays the reputationinformation such as trust level,prevalence,
Scan Facebook Wall lets youscan the links and URLs that areavailable on your Facebookprofile.When you click the ScanFacebook Wall option, NortonAntiVi
the options in the network settings let you configurehow you want Norton AntiVirus to scan your computerfor viruses and other security threats. You ca
2In the window that appears, do one of the following:1 In the Computer Scan pane, click the scan thatyou want to run.1 Click Reputation Scan, and then
of the Computer Scan displays the threat as Trojan.Foo.You can click the Scan Now option available in theNorton AntiVirus main window to access the di
Scans a particular file,removable drives, any of yourcomputer's drives, or any foldersor files on your computer.You can create a custom scan ifyo
2In the Computer Scan pane, click Full System Scan.You can use the following options to suspend a FullSystem Scan:Suspends a Full System Scantemporari
2In the Computer Scan pane, click Quick Scan.You can use the following options to suspend aQuick Scan:Suspends a Quick Scantemporarily.Click Resume to
This chapter includes the following topics:1 Activation protects you1 About your Norton Account1 About Norton AntiVirus main window1 About Norton Comm
3In the Scans window, do one of the following:1 To scan specific drives, click Run next to DriveScan, select the drives that you want to scan,and then
computer. Viruses, spyware, and other risks oftentarget these areas.If your most recent scan was a Full System Scan, thiswindow shows the results of a
About custom scansYou can create a custom scan if you regularly scan aparticular segment of your computer. This custom scanlets you scan the segment f
6On the Scan Schedule tab, set the frequency andtime at which you want to perform the scan. See“Scheduling a scan” on page 117.7On the Scan Options ta
4In the window that appears, on the Scan Items tab,do the following:1 To add drives, click Add Drives, in the ScanDrives dialog box, select the drives
4In the Edit Scan window, on the Scan Options tab,configure the scan options as required.5Click Save.Editing a custom scanYou can edit a custom scan t
2In the Computer Scan pane, click Custom Scan.3In the Scans window, click Run next to the customscan that you want to run.You can use the following op
About scheduling scansNorton AntiVirus uses Idle Time Scans to automaticallydetect the idle state of your computer and runs a FullSystem Scan when the
To schedule a custom scan1In the Norton AntiVirus main window, click ScanNow.2In the Computer Scan pane, click Custom Scan.3In the Scans window, in th
Scheduling a Full System ScanNorton AntiVirus uses Idle TimeScans to automaticallydetect the idle state of your computer. NortonAntiVirus runs a weekl
If you are connected to the Internet, product activationtakes place automatically when you start the productfor the first time after installation. Aft
loaded programs. Quick Scan takes less time to scanthan a Full System Scan because this scan does notscan your entire computer.Norton AntiVirus lets y
Running a scan at the command promptYou can scan with Norton AntiVirus from the commandprompt without opening the Norton AntiVirus mainwindow. You typ
Uses a task file as inputto the list of items toscanTask file path shouldfollow the ':' (forexample,TASK:C:\Documentsand Settings\AllUsers\A
Performs Quick Scan inthe background.wNorton AntiVirusdisplays the scanswindow only when athreat is detected./SESCANTo run a scan from the command pro
Cloud, apart from the definitions that are availablelocally on your computer.Norton AntiVirus performs an Insight Network scanonly when the Insight Pr
1 Insight Network Single File ScanNorton AntiVirus simultaneously performs atraditional Single File Scan and an Insight NetworkSingle File Scan to sca
4In the Insight Protection row, do one of thefollowing:1 To turn off Insight Protection, move the On/Offswitch to the right to the Off position.1 To t
using the reputation-based threat detection. TheInsight Network Scan uses the Cloud technologywherein a remote Symantec server on the Web storesthe la
This category includesWindows Installer Packagefiles (.msi) and resource-onlyDLL files (.loc).Miscellaneous filesNorton AntiVirus lets you scan specif
Symantec rates a file based on the statistical evaluationthat is done on the file using the Norton CommunityWatch data and Symantec’s analysis. Symant
window, the product is activated, but the product keyis not saved in the Norton Account. You can print theproduct key to reinstall your product in the
Running a Reputation Full System ScanWhen you perform a Full System Scan, NortonAntiVirus scans all the Files of Interest that areavailable on your co
3In the Reputation Scan pane, click Quick Scan.In the Norton Reputation Scan window, you cananalyze the trust level, prevalence, resource usage,and st
6In the Quarantine File window, click Quarantinethis file.7In the Manual Quarantine window, click Add.8Click Close.9In the Norton Reputation Scan wind
1 The Trust Level graph displays the average trustlevel of files on your computer. It also displays theaverage trust level of the files that Symanteca
Trust LevelProtecting your files and dataAbout the Norton AntiVirus scans134
Indicates the trust level thatis assigned to a file.Symantec analyzes specificinformation about a file suchas the digital signature andthe hash value
file.Indicates the communityusage level of the file.The search results aregrouped in to the followingcategories:1 Very Few Users: Showsthe files that
Indicates the system resourceusage level of the file.The usage levels are asfollows:1 Low: Indicates that thefile consumes minimumsystem resources.1 M
Indicates the stability ratingof the file.The stability rating dependson how frequently theprogram crashes. Thedifferent stability ratings areas follo
are not only protected from unsafe sites but you alsolet other Facebook users know the security status ofany Web site.However, Norton Safe Web require
that is shown in five groups of five characters each,separated by hyphens. The location of the product keyvaries depending on how you acquired the pro
The following are the safety states that Norton SafeWeb provides after it scans the links on your FacebookWall:Indicates that the site is safe tovisit
To scan your Facebook Wall1In the Norton AntiVirus main window, click ScanNow.2In the window that appears, click Scan FacebookWall.3In the Norton Safe
The following list provides details on the settings thatyou can make and the predefined parameters:You can set the duration afterwhich Norton AntiViru
Norton AntiVirus discontinues any Idle Time Scansthat it started during idle time if you begin to use yourcomputer again. However, it resumes the scan
4Click Apply.Specifying Idle Time Out durationYou can set the duration after which Norton AntiVirusshould identify your computer as idle. You can sele
and proactively detects unknown security risks on yourcomputer. SONAR identifies emerging threats basedon the behavior of applications. SONAR identifi
2In the Settings window, in the left pane, click RealTime Protection.3In the SONAR Protection row, do one of thefollowing:1 To turn off SONAR Protecti
wExclude a program from Norton AntiVirus scans onlyif you are confident that the program is safe. Forexample, if another program relies on a security
About Signature ExclusionsNorton AntiVirus lets you select specific knownsecurity risks and exclude them from Norton AntiVirusscans. Exclude a risk fr
To add a signature to the Signature Exclusions1In the Norton AntiVirus main window, clickSettings.2In the Settings window, in the left pane, clickAnti
To recover or access yourproduct key log on tohttps://www.mynortonaccount.com.If you are not registered,register for Norton Account.You can find the p
Microsoft Projectwinproj.exeNorton AntiVirus scans the Office documents andprotect against threats, including virus macros andinfected embedded object
and resolved. When you perform important tasks onyour computer, you likely prefer not to receive anyalert messages. Norton AntiVirus suppresses alerts
of the taskbar. The icon changes to acrescent-patterned icon when Silent Mode is turnedon. Norton AntiVirus also notifies you after Silent Modeis turn
when Silent Mode is turned on, run after Silent Modeis turned off.Turning on or turning off Silent Mode manuallyYou can manually turn on Silent Mode f
4In the Silent Mode row, move the On/Off switch tothe right to the Off position.5In the Settings window, click Apply.6Click OK.To turn on Silent Mode
About the Silent Mode that turns on automaticallyWhen you watch a movie, play games, or make apresentation, you run the application in the full-screen
2In the Settings window, click the General tab.3In the left pane, click Silent Mode Settings.4In the Full Screen Detection row, move the On/Offswitch
The following table explains about the various options:When you use a Media Centerapplication to burn a CD or aDVD, Norton AntiVirusautomatically enab
When you use a Media Centerapplication to record a TVprogram, Norton AntiVirusautomatically enables QuietMode, if the Media Center TVRecording option
Norton AntiVirus automaticallyturns on Quiet Mode when itdetects a TV program recordingsession or a disk-burningsession. In addition, you canmanually
moments to create your Norton Account. You must beconnected to the Internet to create a Norton Account.After you create a Norton Account, you can acce
during the sessions by using the options in the Settingswindow.To turn off or turn on IMAPI 2.0 Disk Burn1In the Norton AntiVirus main window, clickSe
About User-Specified ProgramsNorton AntiVirus automatically turns on Quiet Modewhen it detects a TV program recording session or adisk-burning session
Norton AntiVirus turns on Quiet Mode the next timewhen you execute the program.You can only add the programs that have .exe fileextension to the Quiet
4Under Quiet Mode on Detection of, in theUser-Specified Programs row, click Configure.5In the Quiet Mode Programs window, select theprogram that you w
Turns off boot time protection.If you turn off the Enable Boot Time Protectionoption, the protection level of your computerreduces.Configuring boot ti
This chapter includes the following topics:1 What to do if a security risk is foundWhat to do if a security risk is foundYour product provides many so
In some cases, Norton AntiVirus might not identify anitem as a security threat, but you might suspect thatthe item is infected. In such cases, you can
Security History also includes information aboutspyware, adware, and other security risks.Reviewing Auto-Protect notificationsAuto-Protect scans files
3In the Show drop-down list, select the category forwhich you want to review Auto-Protect alerts.Your options are:Review Auto-Protectnotifications tha
4In the right pane, click the Options link.The option name appears as Restore & Options forfew items.If one or more security risks such as spyware
After you log in to your Norton Account, you canmanage your product information with the followingoptions:Saves the information for all ofthe Norton p
5In the Threat Detected window, select theappropriate action on the risk.The following are some of the options that areavailable in the Threat Detecte
Removes the selectedsecurity risk from thecomputer andquarantines it.This option is availablefor the security risks thatrequire your attention formanu
Sends the security risk toSymantec.In some cases, NortonAntiVirus might notidentify an item as asecurity threat, but youmight suspect that theitem is
To respond to Worm Blocking alerts4In the alert window, select the action that you wantto take. Your options are:Permanently stops theworm by putting
2After the worm has been quarantined, perform thefollowing tasks:1 Run LiveUpdate to ensure that you have thelatest definition updates.See “About Prog
If that does not work, read the information on theThreats Detected window to identify the types of files175Responding to security issuesWhat to do if
that cannot be repaired. You can take one of thefollowing actions, depending on the file type:Infected filesResponding to security issuesWhat to do if
You canview thefile typeof thedetectedrisk. Thisinformationhelps youto decidetheactionthat canbe takendependingon thefile type.Forexample,you canview
Replaceusingyouroperatingsystemdisks.Hard disk master boot record, boot record, orsystem files (such as IO.SYS or MSDOS.SYS) andfloppy disk boot recor
This chapter includes the following topics:1 About Download Insight1 About Intrusion Prevention1 About Vulnerability Protection1 About the types of se
Saves your account informationand your billing details.The Profile options are:1 Account InformationYou can update your NortonAccount information andy
1 AOL (Browser)1 Safari (Browser)1 Yahoo (Browser)1 MSN Explorer (Browser, E-mail & Chat)1 QQ (Chat)1 ICQ (Chat)1 Skype (Chat)1 MSN Messenger (Cha
and poor. Based on the reputation levels, the files canbe broadly classified as follows:Includes the files that are eitherNorton trusted or User trust
By default, Download Insight lets you install safe files.For files of unknown reputation levels, DownloadInsight prompts you to select an action that
When Silent Mode is turned on, Norton AntiVirussuppresses the Download Insight notifications.Turning off or turning on Download IntelligenceDownload I
2In the Settings window, click the Network tab.3In the left pane, click Download Intelligence.4In the Download Intelligence row, move the On/Offswitch
2In the Settings window, click the Network tab.3In the left pane, click Download Intelligence.4Under Download Intelligence, in the DownloadInsight Not
You can use the following options to configure ShowReport on Launch of Files:When you set the Show Reporton Launch of Files option toAlways, Download
When you set the Show Reporton Launch of Files option toUnproven Files Only, DownloadInsight prompts you to select asuitable action for unknown fileso
When you set the Show Reporton Launch of Files option toNever, Download Insight doesnot prompt you to select asuitable action for any type offile that
4Under Download Intelligence, in the Show Reporton Launch of Files row, do one of the following:1 If you want Download Insight to prompt you fora suit
Norton Online Backupprovides a secure andeasy-to-use online backupsolution that safeguards yourimportant data againstsystem crash, accidentaldeleting,
To turn on or turn off Alert on Poor Stability1In the Norton AntiVirus main window, clickSettings.2In the Settings window, click the Network tab.3In t
Turning off or turning on Intrusion PreventionnotificationsYou can choose whether you want to receivenotifications when Intrusion Prevention blockssus
6In the Signature Properties window, uncheck orcheck Notify me when this signature is detected.7Click OK.8In the Intrusion Signatures window, click OK
5In the Intrusion Signatures window, check theattack signatures that you want to include.6Click OK.Turning off or turning on AutoBlockWhen an attack a
Unblocking AutoBlocked computersIn some cases, AutoBlock may recognize normalactivity as an attack. The list of computers thatAutoBlock has currently
Vulnerabilities are flaws in your programs or youroperating system that can create weaknesses in overallsecurity of your system. Improper computerconf
vulnerabilities that the program contains. You can alsoview more details about the vulnerabilities by clickingon the program name.To view the list of
To view details about a vulnerable application1In the Norton AntiVirus main window, clickAdvanced.2In the NetworkProtection pane, click VulnerabilityP
Tracking cookies are the small files that programs canplace on your computer to track your computingactivities. Tracking cookies can then report thati
protocols. Norton AntiVirus also scans all incomingand outgoing email messages.Norton AntiVirus lets you manually configure yourPOP3 and SMTP email po
Norton AntiVirus™Product ManualThe software described in this book is furnished under a licenseagreement and may be used only in accordance with the t
Creating a Norton AccountYour Norton Account stores the product key and thebilling information of your product. You can alsoregister your product with
To add POP3 and SMTP ports to Protected Ports1In the Norton AntiVirus main window, clickSettings.2In the Settings window, click the Network tab.3In th
6Click Apply and then click OK.7In the Settings window, click OK.About the Network Security MapA home network typically consists of the computersand o
Turning off or turning on Network Security OverviewThe Network Security Overview window provides abrief summary about the following features:1 Wireles
4In the WelcomeScreen row, move the On/Off switchto the left to the On position.5Click Apply.6Click OK.Viewing devices on the Network Security MapThe
2Under NetworkProtection, click Network SecurityMap.3If the Product Configuration panel appears, clickContinue.The Product Configuration panel appears
To view the details of a device on the Network SecurityMap205Protecting Internet activitiesAbout the Network Security Map
4In the Network Security Map window, click a deviceicon.You can use the scroll arrows to view the devicesthat are listed in the network map.The device
Shows the category to which thedevice belongsThe device category iconprovides details on theconnection status and securitystatus. Norton AntiVirus lab
Shows the status of theconnectionThe statuses are:1 ONLINE1 OFFLINEConnectionShows the physical address (alsoknown as the Media AccessControl address
To set up Remote Monitoring1In the Norton AntiVirus main window, clickAdvanced.2Under NetworkProtection, click Network SecurityMap.3On the left side o
To create a Norton Account from the Norton AccountWeb page1In the Norton AntiVirus main window, clickAccount.2In the Norton Account Web page that appe
wYou can turn off Remote Monitoring only after youcomplete the Remote Monitoring Setup process.To turn off Remote Monitoring for all computers1In the
Norton AntiVirus adds to the Trust Control networkall the devices that you manually add to NetworkSecurity Map. You can select the Trust Control netwo
Finding a computer's IP addressYou can find a computer's IP address in various ways.On Windows 2000/XP, Windows Vista, and Windows7 computer
Editing device detailsYou can change the name and category of a device thatis available on the Network Security Map. You canselect the categories such
6In the Category drop-down list, click one of thefollowing device categories:1 GENERIC DEVICE1 DESKTOP PC1 LAPTOP1 SERVER PC1 NETWORK PRINTER1 ROUTER/
To edit network details1In the Norton AntiVirus main window, clickAdvanced.2Under NetworkProtection, click Network SecurityMap.3In the Network Securit
3In the Network Security Map window, do one ofthe following:1 To remove a device that is on your network, inthe network map, click the device.1 To rem
To view the status of your wireless network1In the Norton AntiVirus main window, clickAdvanced.2Under NetworkProtection, click Network SecurityMap.3On
3In the Network Security Map window, in thenetwork map, click the device for which you wantto see the details.You can view the details of only the com
3In the Communication Port box, type a newcommunication port number.You must use the same port number for each of thedevice that is connected to your
if required. Your computer must be connected to theInternet to access your Norton Account.wSymantec products that are older than the 2006product year
Lets Norton AntiVirus access the Internet only toreceive critical product updates or virus definitions.If you have a limited Internet connection, you
2In the Settings window, click the Network tab.3In the left pane, click Network Security Settings.4In the Metered Broadband Mode row, move theOn/Off s
7Select one of the following:1 No LimitLets Norton AntiVirus use the networkbandwidth that is required to ensure completeprotection.1 Critical Updates
This chapter includes the following topics:1 About Security HistoryAbout Security HistorySecurity History window lets you do the following:1 View the
window displays details of each item in the Detailspane.Based on their functionalities, Security History broadlyorganizes all categories into the All
option to open the page. The maximum number ofitems that appear per page is 100.1 Restore and exclude a quarantined item.1 Remove an item from Securit
2In the Computer Protection pane, click History.Viewing items in Security HistorySecurity History provides a record of all the activitiesthat Norton A
3In Security History window, in the Show drop-downlist, select the category of items that you want toview. Your options are:The Recent History view in
The security risks include thesuspicious programs that cancompromise the security ofyour computer.The Resolved Security Risksview in the Security Hist
The Security HistoryQuarantine provides a safelocation on your computerwhere you can isolate itemswhile you decide an action totake on them.The Quaran
Lets you access the Performancewindow.The Performance windowdisplays a chroniclerepresentation of all the installs,downloads, optimizations,detections
Intrusion Prevention scans allthe network traffic thatenters and exits yourcomputer for known threats.The Intrusion Preventionview in the Security His
Norton Product TamperProtection lets you protectyour Norton product from anyattack or modification byunknown, suspicious, ormalicious applications.The
Metered Broadband Modelets you set up policies andrestrict the Internet usage ofNorton AntiVirus. You candefine the amount of networkbandwidth that No
Email errors include anyfailure that occurs whenNorton AntiVirus tries tosend, download, or scan anemail message that you sendor receive.The Email Err
Silent Mode suppresses alertsand notifications andtemporarily suspends mostof the background activities.The Silent Mode view in theSecurity History wi
4Click a row to view details for that item.If you want to view additional information about anitem, click the More Details option in the Detailspane.
The following table lists the categories that providethe advanced details about the Security History items:Displays the followinginformation about the
Displays the actions that areavailable for the selected itemThe options in the Actions viewvary depending on the optionsthat are available in the Show
Displays the links that providethe information that is relatedto the selected itemFor some Security History items,this view lets you access therelevan
The File Insight window lets you view more details ofevents that belong to some of the following categoriesin the Security History window:Lets you vie
Lets you access the NortonAutofix window that providesyou various support options.You can also access the onlineHelp from the Supportdrop-down menu. H
Lets you view the detailedinformation about quarantinedsecurity risks in an organizedway.The Quarantine categoryincludes the infected files thatare is
You can select a tab to view more details about it. TheFile Insight window provides details about a file in thefollowing tabs:Displays the information
Provides the details about theactions performed by the file onyour computer. It also providesinformation about the resourceusage of a process and the
You can use this window to view details about the riskand select an action for the risk. Sometimes, you maywant to access the Threat Detected window f
Removes the security risk fromyour computer and quarantinesitRemove this fileExcludes the security risk fromfuture scanExclude this programRemoves the
To search in Security History1In the Security History window, in the QuickSearch text box, type the name of the item that youwant to search.2Click Go.
This list replaces the current security events list. Youcan select an option in the Show drop-down list to viewthe option-specific details that are sa
Managing items in the QuarantineThe Security History Quarantine provides a safelocation on your computer where you can isolate itemswhile you decide o
2In the Details pane, click Actions.You can use the More Details link to view moredetails about the item before you select an actionfor it. The link o
3In the Threat Detected window, select the actionthat you want to perform. Some of the options are:Returns the selectedQuarantine item to itsRestore &
You can use the following options to perform theimportant tasks in Norton AntiVirus:Lets you access different typesof scans to protect yourcomputer an
You can also navigate to this window by using theOptions link in the File Insight window for somerisks.4Follow the on-screen instructions.Adding an it
Restoring an item from the QuarantineSome programs rely on other programs that areclassified as security risks to function. The programmay not functio
5In the Browsefor Folder dialog, select the folder ordrive where you want to restore the file and thenclick OK.6Click Close.Manually submitting an ite
This chapter includes the following topics:1 Feature summary1 About turning off automatic features1 About customizing settings and optionsFeature summ
downloads, and other files are scanned for viruses andother potential risks. In addition, the definition updatesthat Automatic LiveUpdate downloads wh
Detects viruses, spyware, andother security risks incompressed files during manualscans.See “What to do if a security riskis found” on page 165.Compre
Scans for and detects viruses ininstant messenger attachments.Scans the instant messengerattachments for the supportedinstant messenger programsthat w
About spyware and other security risk protectionfeaturesSpyware and other security risk protection featuresprovide protection against the latest secur
If you are unsure how tohandle a program that isclassified as a security risk,you can view the security riskassessment. The security riskassessment de
See “Turning offAuto-Protecttemporarily andturning it on again”on page 259.See “Turning off orturning on NortonCommunity Watch”on page 260.Turning off
Lets you access the NortonAntiVirus advanced window.By using the Norton AntiVirusadvanced window, you can dothe following:1 Run different scans.1 View
5In the dialog box that appears, in the Select theduration drop-down list, select how long you wantto turn off Auto-Protect, and then click OK.To turn
4In the Norton Community Watch row, do one ofthe following:1 To turn off Norton Community Watch, move theOn/Off switch to the right to the Off positio
4Click Configure for the feature that you want tochange.5In the window that appears, make the necessarychanges, and then click OK.6To apply the defaul
2In the Settings window, configure your settings inthe following tabs:Lets you configure howyou want NortonComputerAntiVirus to scan yourcomputer for
Lets you configure howyou want NortonAntiVirus to monitor yournetwork activities.You can protect yourcomputer against thethreats that you mightreceive
Lets you configure theappearance and securityof your product.In addition, you canconfigure how NortonAntiVirus submits riskdetails to Symantec. Youcan
About Computer settingsThe various options in the Computer tab let youconfigure how you want Norton AntiVirus to scan yourcomputer for viruses and oth
Norton AntiVirus lets you rundifferent types of scans to detectand prevent any virus infectionon your computer.You can use the variousComputer Scan op
Real Time ProtectionCustomizing protection featuresAbout customizing settings and options268
Real Time Protection optionprotects your computer bycontinuously checking forviruses and other security risks.You can use the Real TimeProtection opti
The bottom section of the Norton AntiVirus mainwindow helps you do the following:Lets you access the worldmap with hotspots ofcybercrimes and the late
SONAR Protection1Symantec Online Network forAdvanced Response (SONAR)provides you with real-timeprotection against threats byproactively detectingunkn
Updates271Customizing protection featuresAbout customizing settings and options
Norton AntiVirus protects yourcomputer from vulnerabilitiesthrough the latest program anddefinition updates. Definitionupdates contain the information
latest available version andprompts you for freeinstallation. To get the latestversion, this option must beturned on.1 Smart DefinitionsActivates the
Your options are:The Browser Protection featurechecks for browservulnerabilities in InternetExplorer 6 and Internet Explorer7.You must turn on the Bro
Intrusion Prevention scans allthe network traffic to and fromyour computer and comparesthis information against a set ofattack signatures. Attacksigna
Message ProtectionCustomizing protection featuresAbout customizing settings and options276
Email Protection protects yourcomputer against the threatsthat you may receive throughemail attachments. You can usethe Email Antivirus Scan optionand
default SMTP port 25 and thedefault POP3 port 110. If youremail program is not configuredwith the default ports, you canmanually configure NortonAntiV
Network SecuritySettings279Customizing protection featuresAbout customizing settings and options
Lets you access NortonManagement.Norton Management lets youmanage your Norton productson all of your devices fromone location. Click theManage icon at
The Metered Broadband Modeoption lets you set up policiesand restrict the Internet usageof Norton AntiVirus. You candefine the amount of networkbandwi
devices that are on yournetwork.1 Grant or deny permissions tothe networked devices toaccess your computer.1 Add or Remove any device inthe Network Se
Your options are:Norton TasksCustomizing protection featuresAbout customizing settings and options282
Lets you configure yourNorton Tasks settings.Your options are:1 Automatic Resume DelayThis option delays theautomatic backgroundtasks for a specificdu
When the option is turnedon, Norton AntiVirusautomatically schedulesthe optimization after youinstall an application onyour computer.Optimization impr
Other Settings285Customizing protection featuresAbout customizing settings and options
Lets you configure themiscellaneous settings.Your options are:1 Power Saving ModeLets you save your batterypower by suspending theNorton Tasks when yo
definitions.1 Norton CommunityWatchLets you submit selectedsecurity and applicationdata to Symantec foranalysis. Symantecanalyses the data todetermine
Performance MonitoringCustomizing protection featuresAbout customizing settings and options288
Lets you monitor theperformance of yourcomputer.1 Performance MonitoringWhen you turn on thePerformance Monitoringoption, Norton AntiVirusmonitors the
Lets you set up the NortonOnline Backup account oraccess your online backupstatus.wNorton Online Backupmay not be available in someversions of Norton
Details & Settings linkin the notificationalert lets you viewadditional detailsabout the resourceconsumption by theprogram in the FileInsight wind
2 Alert for High-Usageof:2 CPUWhen this optionis turned on,Norton AntiVirusdetects andnotifies you withthe details ofincreased usage ofthe CPU resourc
by any program orprocess.2 Program ExclusionsLets you selectspecific programs toexclude fromappearing inperformance alerts.Customizing protection feat
Product Security293Customizing protection featuresAbout customizing settings and options
Lets you protect NortonAntiVirus from unauthorizedchanges.Your options are:1 Non-Admins Access toSettingsLets you access andconfigure all the optionsi
product settings.However, if you forgetyour settings password,you can reset thepassword in the windowthat appears when youchoose to uninstallNorton An
Silent Mode SettingsCustomizing protection featuresAbout customizing settings and options296
Lets you turn on or turn offSilent Mode.Your options are:1 Silent ModeWhen you turn on theSilent Mode option, SilentMode is enabled for aspecified dur
Quiet Mode. WhenQuiet Mode is turnedon, Norton AntiVirussuppresses thebackground activitiesbut continues todisplay alerts andnotifications.2 Media Cen
2 User-SpecifiedProgramsWhen you run anapplication that islisted in theUser-SpecifiedPrograms list, NortonAntiVirus detects theactivity, andautomatica
Norton License AgreementNorton AntiVirus™IMPORTANT: PLEASE READ THE TERMSAND CONDITIONS OF THIS LICENSEAGREEMENT (“LICENSE AGREEMENT”)CAREFULLY BEFORE
Safe Web LiteGetting startedAbout Norton AntiVirus main window30
wYou cannot run System Restore on your computer whenNorton Product Tamper Protection is turned on. Youmust temporarily turn off Norton Product TamperP
To turn on Norton Product Tamper Protection1In the Norton AntiVirus main window, clickSettings.2In the Settings window, click the General tab.3In the
wThe reset settings password option appears in theSelect your Uninstall Preference window only whenthe SettingsPassword Protection option is turned on
6In the dialog box that appears, in the Password box,type a password.7In the Confirm Password box, type the passwordagain.8Click OK.9In the Settings w
password option in the Select Uninstall Preferencewindow.To access the SelectUninstallPreference window, youmust choose to uninstall Norton AntiVirus.
7In the Confirm New Password box, type the newpassword again.8Click OK.305Customizing protection featuresAbout customizing settings and options
Customizing protection featuresAbout customizing settings and options306
This chapter includes the following topics:1 Finding the version number of your product1 Finding the End-User License Agreement1 About upgrading your
Finding the End-User License AgreementEnd-User License Agreement (EULA) is a legaldocument that you agree to while installing theproduct. EULA contain
Automatic Download of New Version option, go theNorton AntiVirus main window, and then click Settings> Updates > Automatic Download of New Versi
Lets you download NortonSafe Web Lite.Norton Safe Web Liteprotects your computer whileyou search, browse, and shoponline using your Webbrowser. Norton
updates. You can use LiveUpdate to obtain the latestupdates.The upgrade process might not work if your Webbrowser is incompatible to communicate with
wYour product must be activated and you need anInternet connection to check if a new version isavailable and install new version of the product.To che
that your computer is connected to the Internet. If youuse a proxy server to connect to the Internet, you mustconfigure the proxy settings of Norton A
3Follow the on-screen instructions in the CheckingYourConnection window to attempt to correct yourconnection issue.4In the Checking Your Connection wi
To stay informed about protection issues1Open your Web browser, and go to the followingURL:http://www.symantec.com2In the Symantec Web site, click Nor
wSupport offerings may vary based on the language orproduct.About Norton Support Web siteThe Norton Support Web site provides a full range ofself-help
contact the technical support team in the followingways:Chat in real time with asupport representative.For more complex technicalissues, chat offers t
also use the SearchSupport box to find solution usinga keyword.Norton Support Web site also contains useful links tothe product manual, the Norton Acc
You can also use the click here link at the bottom ofthe Norton Autofix window to contact a supportrepresentative.wAvailability of support varies by r
About keeping your subscription currentSubscription period lengths vary by Symantec product.To maintain uninterrupted protection, you must keepyour su
browser.Your activation status or subscription status appearsat the bottom of the main window. You can use theActivate Now option to activate or subsc
The ClubNorton Web page includes a regularly updatedarticle library, a glossary, the Norton Forums, and theNorton Update Center. You can also find the
Web site or from the CD. To reinstall Norton AntiVirus,follow the installation procedures that are available inthe User's guide.To uninstall Nort
5To uninstall Norton AntiVirus, click Next.6Do one of the following:1 Click RestartNow (recommended) to restart thecomputer.1 Click Restart Later to r
4Do one of the following:1 Click RestartNow (recommended) to restart thecomputer.1 Click RestartLater to restart the computer later.Norton AntiVirus i
Finding additional solutionsAbout uninstalling324
Aabout customer support 315accessingFacebook Scan 104accessing Norton AntiVirus scansComputer Scan 104Reputation Scan 104Actions windowdeleting securi
Bandwidthdefining usage 221managing 219Boot Time Protection 163configure 164Cchangingscan schedules 120cloud technologyCloud 123ClubNortonsecurity tip
EULAchecking 308Events graphmonitoring activities 64Ffeatures 253security risk protection 257file extensionsof infected files 174Full Screen Detection
maintaining protectionabout 97avoiding security risks 97Manual Repairreviewing remaining risksin 174Manual Repair windowreviewing remaining risksin 10
Norton AntiVirus (continued)uninstalling 320upgrading 308version number 307Norton AntiVirus scanabout 100accessing Norton AntiVirusscans 104command li
Provides you the essentialnetwork protection options.It also contains links to thelist of vulnerable programsand Network Security Map.Network Protecti
performance alerts (continued)removing programs fromexclusion list 73turning off 68turning off low resourceprofile 71turning on 68turning on low resou
Results Summaryabout 110resolved risks 110total items scanned 110Running custom scansscanning required files 115scanning required folders 115running F
security risksabout 197, 257adding to Quarantine 250assessment 257found by Auto-Protect 165, 167managing protection using themain window 197other prog
System Insight (continued)monitoring activities 64Performance graph 61system status graphactivity details 66System Status indicatorsresponding 33Ttech
fooNorton from Symantec products protect consumers from traditional threats with antivirus, antispam, and Spyware Protection.They also protect against
Indicates that your computer andactivities are at risk.Take immediate action to improveyour protection status.At RiskYou can respond to the System Sta
1 Antispyware1 SONAR Protection1 Intrusion Prevention1 Email Protection1 Browser ProtectionTo monitor the protection status of a feature1In the Norton
1 All the Web site URLs that you visited before thedetection of a risk1 The applications and processes that run on yourcomputer regularly and during a
Community Watch. You can also review the data,which Norton Community Watch collects and submitsto Symantec, in the Security History window.About Norto
Norton Bootable Recovery Tool detects and resolvesthe following security threats:Programs that infect anotherprogram, boot sector,partition sector, or
Programs that track systemactivity, gather systeminformation, or track userhabits, and relay thisinformation to third-partyorganizations. Theinformati
Software in accordance with suchspecifications;B. make one copy of the Software for back-upor archival purposes, or copy the Softwareonto the hard dis
You can download Norton Bootable Recovery ToolWizard in one of the following ways:1 From the Start menu.1 From the Norton Support Web site.To download
Using the Norton Bootable Recovery ToolIf the installation of your Norton product fails, you canuse the Norton Bootable Recovery Tool to scan andremov
Starting Norton AntiVirus from thecommand promptIf you work from the command line (for example,writing a script or code), you can start Norton AntiVir
most cases, you can click the link available in the alertto view the details and fix the problems.The Norton AntiVirus icon represents the current sta
About Norton AntiVirus shortcut menuNorton AntiVirus performs background activities tokeep your computer secure. The icon in the notificationarea reas
Lets you turn on or turn offSilent Mode.Turn on/Turn off SilentModeLets you turn off or turn onAntivirus Auto-Protect.Disable/Enable AntivirusAuto-Pro
main window, and then click Settings > Network >NetworkSecuritySettings > ProxyServer > Configure.LiveUpdate does not download the latest
The type of definition updates that each of theSymantec products receive are as follows:Users of these productsreceive the latest virusdefinitions fro
Users of these productsreceive the latest virusdefinitions fromSymantec that protectsyour computer from alltypes of security threats.In addition, user
Contains the most importantvirus definitions that arerequired for latest securitythreats as viewed by Symantec.The Core Set is a subset of theComplete
by the Software, the Software will cease tofunction until activation is complete; atwhich time the Software functionality willbe restored. In the even
As the Smart Definitions are of considerably smallersize, it results in lesser download time, lesserinstallation time, lesser boot time, and lesser me
Updates are lighter and faster than AutomaticLiveUpdate. It keeps your computer secure from theongoing threats on the World Wide Web.When Pulse Update
product. Program updates are usually created to fixprogram errors, improve the performance of theprogram, or, to extend the operating system orhardwar
you can acquire the product and maintain your statusare as follows:The product includes a limited-timesubscription to definition updates. Whenthe subs
run LiveUpdate manually to obtain updates if you haveturned off the Automatic LiveUpdate option.wIf you are connected to the Internet, AutomaticLiveUp
About Pulse UpdatesIn addition to the definition updates that AutomaticLiveUpdate downloads, Norton AntiVirus usesstreaming technology to download the
turn on or turn off Pulse Updates only if AutomaticLiveUpdate is turned on.To turn off or turn on Pulse Updates1In the Norton AntiVirus main window, c
the Internet. It also contains the words which you wantto filter and block while you access the Internet. Youcan also choose the option that lets your
Lets you provide the details ofyour Proxy Settings.Under Proxy Settings, check Usea proxy server for your HTTPconnections, and do thefollowing:1 In th
5In the Network Proxy Settings window, do thefollowing:1 If you want your browser to automatically detectnetwork connection settings, under AutomaticC
be subject to the import and export laws ofthe United States, specifically the U.S. ExportAdministration Regulations (EAR), and thelaws of any country
Getting startedAbout Network Proxy settings60
This chapter includes the following topics:1 About System InsightAbout System InsightNorton AntiVirus continuously monitors yourcomputer to keep it fr
disk optimizations, threat detections, performancealerts, or Quick Scans. The graph displays theactivities as icon or stripe, and the description fore
The NortonTasks window provides the details suchas the timestamp, the duration, and the status ofthe background jobs. The details also include thetype
About monitoring system activitiesSystem Insight provides information about theimportant system activities that you performed or thatoccurred over a p
Indicates the optimizationactivities that you performed onyour system over a period of thelast three monthsOptimizedProvides the details about thethre
Provides the details about QuickScans that Norton AntiVirusperformed on your system overa period of the last three monthsThe details include the date
2In the Performance window, at the top of the Eventsgraph, click the tab for a month to view the details.3In the Events graph, move the mouse pointer
access the Resource Threshold Profile for Alertingoption, go to the Norton AntiVirus main window, andthen click Settings > General > Performance
Turns on performance alerts.Select this option if you wantNorton AntiVirus to notify youwith performance alerts whena program or process exceedsthe sy
The name given to the Device during theinitial setup of such Device. If collected, thename will be used by Symantec as an accountname for the Device u
4Under Performance Monitoring, in thePerformanceAlerting row, do one of the following:1 To turn off performance alerts, move thePerformanceAlerting sw
4Under Performance Monitoring, in the ResourceThreshold Profile for Alerting row, select one ofthe following options:Configures a low thresholdlimit f
your computer gains longer battery life and becomesmore energy efficient.You can configure a low threshold profile and ensurethat all programs consume
Excluding programs from appearing in performance alertsNorton AntiVirus lets you exclude programs fromappearing in performance alerts. You can add the
2In the Settings window, click the General tab.3In the left pane, click Performance Monitoring.4Under Performance Monitoring, in the ProgramExclusions
When you click at any point on the CPU graph ormemory graph, Norton AntiVirus displays a list of theprocesses that consume maximum resources at thatpo
wBy default, the graphs display performance time forthe last 90 minutes.To view CPU graph and memory graph1In the Norton AntiVirus main window, clickP
Identifying resource-consuming processesYou can click at any point on the CPU graph or memorygraph to obtain a list of the processes that consumemaxim
track of all of the fragments of the file. If free space isalso fragmented, the drive head might have to trackadequate free space to store temporary f
When you use the Optimize option in Windows XP,Norton AntiVirus optimizes only the boot volume (forexample, C:\Windows). Therefore, it requires less t
may collect, transmit, store, disclose andanalyze such information for these purposes.CPS / S 5.0 / USE
application on your computer and your computer isidle. If you start using your computer again, NortonAntiVirus stops the optimization task, and starts
To turn on Idle Time Optimizer1In the Norton AntiVirus main window, clickSettings.2In the Settings window, click the General tab.3In the left pane, cl
1 The status of the Norton taskYou can view details about the completion of thetask.1 The power source that the Norton Task uses.You can specify the t
3In the Norton Tasks window, view the details ofbackground jobs.4Do one of the following:1 To run a background job, click the Play icon thatappears be
Allows the Norton Tasks torun irrespective if thecomputer uses externalpower or battery power.If you choose this option,Norton AntiVirus performsthe N
4In the Power Source window, select one of thefollowing:1 ExternalAllows the Norton Task to run only when yourcomputer uses external power.1 External
Norton AntiVirus obtains specificinformation about the Files ofInterest and submits theinformation to Symantec duringidle time. The informationinclude
Symantec assigns the following confidence levels toFiles of Interest:Symantec analyzes the file asgood based on the statisticalevaluation that is done
technique to scan your computer. It scans all of thefiles on your computer against the signatures that itobtained during definition updates. When you
Lists the Files of InterestAll FilesLists the programs that startwhen you start yourcomputerStartup ItemsLists all the files andprograms that are curr
Chapter 1 Getting started ... . . . ... . . . 11Activation protects you ... 11About your Norton Ac
Lists the Files of Interest thatyou manually trusted in theFile Insight windowThis category does not listthe files that do not belongto the File of In
To view the files using Norton Insight1In the Norton AntiVirus main window, clickAdvanced.2In the Computer Protection pane, click ApplicationRatings.3
Insight - Application Ratings window. However, youcan use the CheckTrust Now option in the File Insightwindow to update the trust value of a file. You
To find the location of the file4In the File Insight window, click Locate.To refresh the trust level of the file4In the File Insight window, click Che
The complete scan includes a scan of all files onyour computer irrespective of the confidence levelor digital signature of the files.1 Configure to St
To configure Scan Performance Profiles from the NortonInsight - Application Ratings window1In the Norton AntiVirus main window, clickAdvanced.2In the
Norton AntiVirus provides reports based on thefollowing categories:Lets you view the details of thevarious attacks your computeris protected fromFor e
This chapter includes the following topics:1 About maintaining protection1 About the Norton AntiVirus scansAbout maintaining protectionAfter you have
1 Run LiveUpdate regularly to receive new programupdates.1 Keep Auto-Protect turned on at all times to preventviruses from infecting your computer.1 W
2In the Settings window, in the Computer tab, movethe On/Off switch to the left to the On position forthe following settings:Computer Scan providesthe
Comments to this Manuals