Symantec ™ Internet Security 2012 Manual

Browse online or download Manual for Antivirus security software Symantec ™ Internet Security 2012. Symantec Internet Security 2012 User Manual

  • Download
  • Add to my manuals
  • Print
  • Page
    / 334
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews

Summary of Contents

Page 1 - Product Manual

Product ManualCare for our Environment, ‘It's the right thing to do’.Symantec has removed the cover from this manual to reduce the Environmental

Page 2 - Norton AntiVirus™

About Vulnerability Protection ... . . . 194About the types of security risks ... . . . ... 197About configuring POP3 and SMTPports

Page 3

5In the Message Protection section, move the On/Offswitch to the left to the On position, click Configure,and check all options for the following feat

Page 4

Norton AntiVirus automatically performs differenttypes of scans to secure your computer from latestthreats. It also lets you run different types of sc

Page 5

Reputation Scan displays thereputation information of thefiles on your computer. Itdisplays the reputationinformation such as trust level,prevalence,

Page 6 - 11. Privacy; Data Protection:

Scan Facebook Wall lets youscan the links and URLs that areavailable on your Facebookprofile.When you click the ScanFacebook Wall option, NortonAntiVi

Page 7

the options in the network settings let you configurehow you want Norton AntiVirus to scan your computerfor viruses and other security threats. You ca

Page 8 - CPS / S 5.0 / USE

2In the window that appears, do one of the following:1 In the Computer Scan pane, click the scan thatyou want to run.1 Click Reputation Scan, and then

Page 9 - Contents

of the Computer Scan displays the threat as Trojan.Foo.You can click the Scan Now option available in theNorton AntiVirus main window to access the di

Page 10 - Contents10

Scans a particular file,removable drives, any of yourcomputer's drives, or any foldersor files on your computer.You can create a custom scan ifyo

Page 11 - Getting started

2In the Computer Scan pane, click Full System Scan.You can use the following options to suspend a FullSystem Scan:Suspends a Full System Scantemporari

Page 12 - Activating your product

2In the Computer Scan pane, click Quick Scan.You can use the following options to suspend aQuick Scan:Suspends a Quick Scantemporarily.Click Resume to

Page 13

This chapter includes the following topics:1 Activation protects you1 About your Norton Account1 About Norton AntiVirus main window1 About Norton Comm

Page 14

3In the Scans window, do one of the following:1 To scan specific drives, click Run next to DriveScan, select the drives that you want to scan,and then

Page 15 - About your Norton Account

computer. Viruses, spyware, and other risks oftentarget these areas.If your most recent scan was a Full System Scan, thiswindow shows the results of a

Page 16 - 1 Any time after activation

About custom scansYou can create a custom scan if you regularly scan aparticular segment of your computer. This custom scanlets you scan the segment f

Page 17 - 17Getting started

6On the Scan Schedule tab, set the frequency andtime at which you want to perform the scan. See“Scheduling a scan” on page 117.7On the Scan Options ta

Page 18

4In the window that appears, on the Scan Items tab,do the following:1 To add drives, click Add Drives, in the ScanDrives dialog box, select the drives

Page 19

4In the Edit Scan window, on the Scan Options tab,configure the scan options as required.5Click Save.Editing a custom scanYou can edit a custom scan t

Page 20 - Creating a Norton Account

2In the Computer Scan pane, click Custom Scan.3In the Scans window, click Run next to the customscan that you want to run.You can use the following op

Page 21 - Accessing your Norton Account

About scheduling scansNorton AntiVirus uses Idle Time Scans to automaticallydetect the idle state of your computer and runs a FullSystem Scan when the

Page 22

To schedule a custom scan1In the Norton AntiVirus main window, click ScanNow.2In the Computer Scan pane, click Custom Scan.3In the Scans window, in th

Page 23 - 23Getting started

Scheduling a Full System ScanNorton AntiVirus uses Idle TimeScans to automaticallydetect the idle state of your computer. NortonAntiVirus runs a weekl

Page 24

If you are connected to the Internet, product activationtakes place automatically when you start the productfor the first time after installation. Aft

Page 25 - 25Getting started

loaded programs. Quick Scan takes less time to scanthan a Full System Scan because this scan does notscan your entire computer.Norton AntiVirus lets y

Page 26

Running a scan at the command promptYou can scan with Norton AntiVirus from the commandprompt without opening the Norton AntiVirus mainwindow. You typ

Page 27

Uses a task file as inputto the list of items toscanTask file path shouldfollow the ':' (forexample,TASK:C:\Documentsand Settings\AllUsers\A

Page 28

Performs Quick Scan inthe background.wNorton AntiVirusdisplays the scanswindow only when athreat is detected./SESCANTo run a scan from the command pro

Page 29

Cloud, apart from the definitions that are availablelocally on your computer.Norton AntiVirus performs an Insight Network scanonly when the Insight Pr

Page 30

1 Insight Network Single File ScanNorton AntiVirus simultaneously performs atraditional Single File Scan and an Insight NetworkSingle File Scan to sca

Page 31 - 31Getting started

4In the Insight Protection row, do one of thefollowing:1 To turn off Insight Protection, move the On/Offswitch to the right to the Off position.1 To t

Page 32

using the reputation-based threat detection. TheInsight Network Scan uses the Cloud technologywherein a remote Symantec server on the Web storesthe la

Page 33

This category includesWindows Installer Packagefiles (.msi) and resource-onlyDLL files (.loc).Miscellaneous filesNorton AntiVirus lets you scan specif

Page 34 - 1 Antivirus

Symantec rates a file based on the statistical evaluationthat is done on the file using the Norton CommunityWatch data and Symantec’s analysis. Symant

Page 35

window, the product is activated, but the product keyis not saved in the Norton Account. You can print theproduct key to reinstall your product in the

Page 36

Running a Reputation Full System ScanWhen you perform a Full System Scan, NortonAntiVirus scans all the Files of Interest that areavailable on your co

Page 37

3In the Reputation Scan pane, click Quick Scan.In the Norton Reputation Scan window, you cananalyze the trust level, prevalence, resource usage,and st

Page 38

6In the Quarantine File window, click Quarantinethis file.7In the Manual Quarantine window, click Add.8Click Close.9In the Norton Reputation Scan wind

Page 39

1 The Trust Level graph displays the average trustlevel of files on your computer. It also displays theaverage trust level of the files that Symanteca

Page 40

Trust LevelProtecting your files and dataAbout the Norton AntiVirus scans134

Page 41

Indicates the trust level thatis assigned to a file.Symantec analyzes specificinformation about a file suchas the digital signature andthe hash value

Page 42

file.Indicates the communityusage level of the file.The search results aregrouped in to the followingcategories:1 Very Few Users: Showsthe files that

Page 43

Indicates the system resourceusage level of the file.The usage levels are asfollows:1 Low: Indicates that thefile consumes minimumsystem resources.1 M

Page 44

Indicates the stability ratingof the file.The stability rating dependson how frequently theprogram crashes. Thedifferent stability ratings areas follo

Page 45 - About LiveUpdate

are not only protected from unsafe sites but you alsolet other Facebook users know the security status ofany Web site.However, Norton Safe Web require

Page 46

that is shown in five groups of five characters each,separated by hyphens. The location of the product keyvaries depending on how you acquired the pro

Page 47 - 47Getting started

The following are the safety states that Norton SafeWeb provides after it scans the links on your FacebookWall:Indicates that the site is safe tovisit

Page 48 - About Smart Definitions

To scan your Facebook Wall1In the Norton AntiVirus main window, click ScanNow.2In the window that appears, click Scan FacebookWall.3In the Norton Safe

Page 49

The following list provides details on the settings thatyou can make and the predefined parameters:You can set the duration afterwhich Norton AntiViru

Page 50 - About running LiveUpdate

Norton AntiVirus discontinues any Idle Time Scansthat it started during idle time if you begin to use yourcomputer again. However, it resumes the scan

Page 51 - Checking for updates manually

4Click Apply.Specifying Idle Time Out durationYou can set the duration after which Norton AntiVirusshould identify your computer as idle. You can sele

Page 52

and proactively detects unknown security risks on yourcomputer. SONAR identifies emerging threats basedon the behavior of applications. SONAR identifi

Page 53

2In the Settings window, in the left pane, click RealTime Protection.3In the SONAR Protection row, do one of thefollowing:1 To turn off SONAR Protecti

Page 54

wExclude a program from Norton AntiVirus scans onlyif you are confident that the program is safe. Forexample, if another program relies on a security

Page 55 - About Pulse Updates

About Signature ExclusionsNorton AntiVirus lets you select specific knownsecurity risks and exclude them from Norton AntiVirusscans. Exclude a risk fr

Page 56 - About Network Proxy settings

To add a signature to the Signature Exclusions1In the Norton AntiVirus main window, clickSettings.2In the Settings window, in the left pane, clickAnti

Page 57 - 1 Use automatic configuration

To recover or access yourproduct key log on tohttps://www.mynortonaccount.com.If you are not registered,register for Norton Account.You can find the p

Page 58

Microsoft Projectwinproj.exeNorton AntiVirus scans the Office documents andprotect against threats, including virus macros andinfected embedded object

Page 59

and resolved. When you perform important tasks onyour computer, you likely prefer not to receive anyalert messages. Norton AntiVirus suppresses alerts

Page 60

of the taskbar. The icon changes to acrescent-patterned icon when Silent Mode is turnedon. Norton AntiVirus also notifies you after Silent Modeis turn

Page 61 - Monitoring your

when Silent Mode is turned on, run after Silent Modeis turned off.Turning on or turning off Silent Mode manuallyYou can manually turn on Silent Mode f

Page 62

4In the Silent Mode row, move the On/Off switch tothe right to the Off position.5In the Settings window, click Apply.6Click OK.To turn on Silent Mode

Page 63

About the Silent Mode that turns on automaticallyWhen you watch a movie, play games, or make apresentation, you run the application in the full-screen

Page 64

2In the Settings window, click the General tab.3In the left pane, click Silent Mode Settings.4In the Full Screen Detection row, move the On/Offswitch

Page 65 - About System Insight

The following table explains about the various options:When you use a Media Centerapplication to burn a CD or aDVD, Norton AntiVirusautomatically enab

Page 66

When you use a Media Centerapplication to record a TVprogram, Norton AntiVirusautomatically enables QuietMode, if the Media Center TVRecording option

Page 67 - About performance alerting

Norton AntiVirus automaticallyturns on Quiet Mode when itdetects a TV program recordingsession or a disk-burningsession. In addition, you canmanually

Page 68

moments to create your Norton Account. You must beconnected to the Internet to create a Norton Account.After you create a Norton Account, you can acce

Page 69

during the sessions by using the options in the Settingswindow.To turn off or turn on IMAPI 2.0 Disk Burn1In the Norton AntiVirus main window, clickSe

Page 70

About User-Specified ProgramsNorton AntiVirus automatically turns on Quiet Modewhen it detects a TV program recording session or adisk-burning session

Page 71 - Battery Power option

Norton AntiVirus turns on Quiet Mode the next timewhen you execute the program.You can only add the programs that have .exe fileextension to the Quiet

Page 72

4Under Quiet Mode on Detection of, in theUser-Specified Programs row, click Configure.5In the Quiet Mode Programs window, select theprogram that you w

Page 73

Turns off boot time protection.If you turn off the Enable Boot Time Protectionoption, the protection level of your computerreduces.Configuring boot ti

Page 74

This chapter includes the following topics:1 What to do if a security risk is foundWhat to do if a security risk is foundYour product provides many so

Page 75

In some cases, Norton AntiVirus might not identify anitem as a security threat, but you might suspect thatthe item is infected. In such cases, you can

Page 76

Security History also includes information aboutspyware, adware, and other security risks.Reviewing Auto-Protect notificationsAuto-Protect scans files

Page 77 - About optimization

3In the Show drop-down list, select the category forwhich you want to review Auto-Protect alerts.Your options are:Review Auto-Protectnotifications tha

Page 78 - Optimizing your boot volume

4In the right pane, click the Options link.The option name appears as Restore & Options forfew items.If one or more security risks such as spyware

Page 79 - About the Idle Time Optimizer

After you log in to your Norton Account, you canmanage your product information with the followingoptions:Saves the information for all ofthe Norton p

Page 80

5In the Threat Detected window, select theappropriate action on the risk.The following are some of the options that areavailable in the Threat Detecte

Page 81 - About the Norton Tasks

Removes the selectedsecurity risk from thecomputer andquarantines it.This option is availablefor the security risks thatrequire your attention formanu

Page 82

Sends the security risk toSymantec.In some cases, NortonAntiVirus might notidentify an item as asecurity threat, but youmight suspect that theitem is

Page 83 - About Power Source

To respond to Worm Blocking alerts4In the alert window, select the action that you wantto take. Your options are:Permanently stops theworm by putting

Page 84 - Configuring the Power Source

2After the worm has been quarantined, perform thefollowing tasks:1 Run LiveUpdate to ensure that you have thelatest definition updates.See “About Prog

Page 85 - About Norton Insight

If that does not work, read the information on theThreats Detected window to identify the types of files175Responding to security issuesWhat to do if

Page 86

that cannot be repaired. You can take one of thefollowing actions, depending on the file type:Infected filesResponding to security issuesWhat to do if

Page 87 - 1 If the file has three green

You canview thefile typeof thedetectedrisk. Thisinformationhelps youto decidetheactionthat canbe takendependingon thefile type.Forexample,you canview

Page 88

Replaceusingyouroperatingsystemdisks.Hard disk master boot record, boot record, orsystem files (such as IO.SYS or MSDOS.SYS) andfloppy disk boot recor

Page 89

This chapter includes the following topics:1 About Download Insight1 About Intrusion Prevention1 About Vulnerability Protection1 About the types of se

Page 90

Saves your account informationand your billing details.The Profile options are:1 Account InformationYou can update your NortonAccount information andy

Page 91

1 AOL (Browser)1 Safari (Browser)1 Yahoo (Browser)1 MSN Explorer (Browser, E-mail & Chat)1 QQ (Chat)1 ICQ (Chat)1 Skype (Chat)1 MSN Messenger (Cha

Page 92

and poor. Based on the reputation levels, the files canbe broadly classified as follows:Includes the files that are eitherNorton trusted or User trust

Page 93

By default, Download Insight lets you install safe files.For files of unknown reputation levels, DownloadInsight prompts you to select an action that

Page 94 - 1 High Trust

When Silent Mode is turned on, Norton AntiVirussuppresses the Download Insight notifications.Turning off or turning on Download IntelligenceDownload I

Page 95

2In the Settings window, click the Network tab.3In the left pane, click Download Intelligence.4In the Download Intelligence row, move the On/Offswitch

Page 96 - Viewing the Monthly Report

2In the Settings window, click the Network tab.3In the left pane, click Download Intelligence.4Under Download Intelligence, in the DownloadInsight Not

Page 97 - Protecting your

You can use the following options to configure ShowReport on Launch of Files:When you set the Show Reporton Launch of Files option toAlways, Download

Page 98

When you set the Show Reporton Launch of Files option toUnproven Files Only, DownloadInsight prompts you to select asuitable action for unknown fileso

Page 99

When you set the Show Reporton Launch of Files option toNever, Download Insight doesnot prompt you to select asuitable action for any type offile that

Page 100

4Under Download Intelligence, in the Show Reporton Launch of Files row, do one of the following:1 If you want Download Insight to prompt you fora suit

Page 101

Norton Online Backupprovides a secure andeasy-to-use online backupsolution that safeguards yourimportant data againstsystem crash, accidentaldeleting,

Page 102

To turn on or turn off Alert on Poor Stability1In the Norton AntiVirus main window, clickSettings.2In the Settings window, click the Network tab.3In t

Page 103

Turning off or turning on Intrusion PreventionnotificationsYou can choose whether you want to receivenotifications when Intrusion Prevention blockssus

Page 104

6In the Signature Properties window, uncheck orcheck Notify me when this signature is detected.7Click OK.8In the Intrusion Signatures window, click OK

Page 105 - About Computer Scan

5In the Intrusion Signatures window, check theattack signatures that you want to include.6Click OK.Turning off or turning on AutoBlockWhen an attack a

Page 106

Unblocking AutoBlocked computersIn some cases, AutoBlock may recognize normalactivity as an attack. The list of computers thatAutoBlock has currently

Page 107 - Running a Full System Scan

Vulnerabilities are flaws in your programs or youroperating system that can create weaknesses in overallsecurity of your system. Improper computerconf

Page 108 - Running a Quick Scan

vulnerabilities that the program contains. You can alsoview more details about the vulnerabilities by clickingon the program name.To view the list of

Page 109

To view details about a vulnerable application1In the Norton AntiVirus main window, clickAdvanced.2In the NetworkProtection pane, click VulnerabilityP

Page 110

Tracking cookies are the small files that programs canplace on your computer to track your computingactivities. Tracking cookies can then report thati

Page 111 - 1 Total items scanned

protocols. Norton AntiVirus also scans all incomingand outgoing email messages.Norton AntiVirus lets you manually configure yourPOP3 and SMTP email po

Page 112

Norton AntiVirus™Product ManualThe software described in this book is furnished under a licenseagreement and may be used only in accordance with the t

Page 113 - Selecting the scan items

Creating a Norton AccountYour Norton Account stores the product key and thebilling information of your product. You can alsoregister your product with

Page 114 - Configuring the scan options

To add POP3 and SMTP ports to Protected Ports1In the Norton AntiVirus main window, clickSettings.2In the Settings window, click the Network tab.3In th

Page 115 - Running a custom scan

6Click Apply and then click OK.7In the Settings window, click OK.About the Network Security MapA home network typically consists of the computersand o

Page 116 - Deleting a custom scan

Turning off or turning on Network Security OverviewThe Network Security Overview window provides abrief summary about the following features:1 Wireles

Page 117 - About scheduling scans

4In the WelcomeScreen row, move the On/Off switchto the left to the On position.5Click Apply.6Click OK.Viewing devices on the Network Security MapThe

Page 118

2Under NetworkProtection, click Network SecurityMap.3If the Product Configuration panel appears, clickContinue.The Product Configuration panel appears

Page 119 - Scheduling a Quick Scan

To view the details of a device on the Network SecurityMap205Protecting Internet activitiesAbout the Network Security Map

Page 120 - Editing a scheduled scan

4In the Network Security Map window, click a deviceicon.You can use the scroll arrows to view the devicesthat are listed in the network map.The device

Page 121

Shows the category to which thedevice belongsThe device category iconprovides details on theconnection status and securitystatus. Norton AntiVirus lab

Page 122

Shows the status of theconnectionThe statuses are:1 ONLINE1 OFFLINEConnectionShows the physical address (alsoknown as the Media AccessControl address

Page 123 - About Insight Network scan

To set up Remote Monitoring1In the Norton AntiVirus main window, clickAdvanced.2Under NetworkProtection, click Network SecurityMap.3On the left side o

Page 124 - 1 Insight Network Quick Scan

To create a Norton Account from the Norton AccountWeb page1In the Norton AntiVirus main window, clickAccount.2In the Norton Account Web page that appe

Page 125

wYou can turn off Remote Monitoring only after youcomplete the Remote Monitoring Setup process.To turn off Remote Monitoring for all computers1In the

Page 126 - About Reputation Scan

Norton AntiVirus adds to the Trust Control networkall the devices that you manually add to NetworkSecurity Map. You can select the Trust Control netwo

Page 127

Finding a computer's IP addressYou can find a computer's IP address in various ways.On Windows 2000/XP, Windows Vista, and Windows7 computer

Page 128

Editing device detailsYou can change the name and category of a device thatis available on the Network Security Map. You canselect the categories such

Page 129

6In the Category drop-down list, click one of thefollowing device categories:1 GENERIC DEVICE1 DESKTOP PC1 LAPTOP1 SERVER PC1 NETWORK PRINTER1 ROUTER/

Page 130

To edit network details1In the Norton AntiVirus main window, clickAdvanced.2Under NetworkProtection, click Network SecurityMap.3In the Network Securit

Page 131

3In the Network Security Map window, do one ofthe following:1 To remove a device that is on your network, inthe network map, click the device.1 To rem

Page 132 - 1 Reputation custom scan

To view the status of your wireless network1In the Norton AntiVirus main window, clickAdvanced.2Under NetworkProtection, click Network SecurityMap.3On

Page 133

3In the Network Security Map window, in thenetwork map, click the device for which you wantto see the details.You can view the details of only the com

Page 134 - Trust Level

3In the Communication Port box, type a newcommunication port number.You must use the same port number for each of thedevice that is connected to your

Page 135 - 1 Bad: Symantec has a high

if required. Your computer must be connected to theInternet to access your Norton Account.wSymantec products that are older than the 2006product year

Page 136

Lets Norton AntiVirus access the Internet only toreceive critical product updates or virus definitions.If you have a limited Internet connection, you

Page 137 - 1 Unknown: Indicates that

2In the Settings window, click the Network tab.3In the left pane, click Network Security Settings.4In the Metered Broadband Mode row, move theOn/Off s

Page 138

7Select one of the following:1 No LimitLets Norton AntiVirus use the networkbandwidth that is required to ensure completeprotection.1 Critical Updates

Page 139

This chapter includes the following topics:1 About Security HistoryAbout Security HistorySecurity History window lets you do the following:1 View the

Page 140 - Scanning your Facebook Wall

window displays details of each item in the Detailspane.Based on their functionalities, Security History broadlyorganizes all categories into the All

Page 141 - About Idle Time Scans

option to open the page. The maximum number ofitems that appear per page is 100.1 Restore and exclude a quarantined item.1 Remove an item from Securit

Page 142

2In the Computer Protection pane, click History.Viewing items in Security HistorySecurity History provides a record of all the activitiesthat Norton A

Page 143 - 1 Quarterly

3In Security History window, in the Show drop-downlist, select the category of items that you want toview. Your options are:The Recent History view in

Page 144

The security risks include thesuspicious programs that cancompromise the security ofyour computer.The Resolved Security Risksview in the Security Hist

Page 145

The Security HistoryQuarantine provides a safelocation on your computerwhere you can isolate itemswhile you decide an action totake on them.The Quaran

Page 146 - About Real Time Exclusions

Lets you access the Performancewindow.The Performance windowdisplays a chroniclerepresentation of all the installs,downloads, optimizations,detections

Page 147

Intrusion Prevention scans allthe network traffic thatenters and exits yourcomputer for known threats.The Intrusion Preventionview in the Security His

Page 148 - About Signature Exclusions

Norton Product TamperProtection lets you protectyour Norton product from anyattack or modification byunknown, suspicious, ormalicious applications.The

Page 149 - Microsoft Accessmsaccess.exe

Metered Broadband Modelets you set up policies andrestrict the Internet usage ofNorton AntiVirus. You candefine the amount of networkbandwidth that No

Page 150 - About Silent Mode

Email errors include anyfailure that occurs whenNorton AntiVirus tries tosend, download, or scan anemail message that you sendor receive.The Email Err

Page 151

Silent Mode suppresses alertsand notifications andtemporarily suspends mostof the background activities.The Silent Mode view in theSecurity History wi

Page 152

4Click a row to view details for that item.If you want to view additional information about anitem, click the More Details option in the Detailspane.

Page 153

The following table lists the categories that providethe advanced details about the Security History items:Displays the followinginformation about the

Page 154

Displays the actions that areavailable for the selected itemThe options in the Actions viewvary depending on the optionsthat are available in the Show

Page 155

Displays the links that providethe information that is relatedto the selected itemFor some Security History items,this view lets you access therelevan

Page 156 - About Quiet Mode

The File Insight window lets you view more details ofevents that belong to some of the following categoriesin the Security History window:Lets you vie

Page 157 - 1 J. River MEDIA CENTER

Lets you access the NortonAutofix window that providesyou various support options.You can also access the onlineHelp from the Supportdrop-down menu. H

Page 158

Lets you view the detailedinformation about quarantinedsecurity risks in an organizedway.The Quarantine categoryincludes the infected files thatare is

Page 159

You can select a tab to view more details about it. TheFile Insight window provides details about a file in thefollowing tabs:Displays the information

Page 160

Provides the details about theactions performed by the file onyour computer. It also providesinformation about the resourceusage of a process and the

Page 161 - About User-Specified Programs

You can use this window to view details about the riskand select an action for the risk. Sometimes, you maywant to access the Threat Detected window f

Page 162

Removes the security risk fromyour computer and quarantinesitRemove this fileExcludes the security risk fromfuture scanExclude this programRemoves the

Page 163 - About boot time protection

To search in Security History1In the Security History window, in the QuickSearch text box, type the name of the item that youwant to search.2Click Go.

Page 164 - 1 Normal

This list replaces the current security events list. Youcan select an option in the Show drop-down list to viewthe option-specific details that are sa

Page 165

Managing items in the QuarantineThe Security History Quarantine provides a safelocation on your computer where you can isolate itemswhile you decide o

Page 166

2In the Details pane, click Actions.You can use the More Details link to view moredetails about the item before you select an actionfor it. The link o

Page 167

3In the Threat Detected window, select the actionthat you want to perform. Some of the options are:Returns the selectedQuarantine item to itsRestore &

Page 168

You can use the following options to perform theimportant tasks in Norton AntiVirus:Lets you access different typesof scans to protect yourcomputer an

Page 169

You can also navigate to this window by using theOptions link in the File Insight window for somerisks.4Follow the on-screen instructions.Adding an it

Page 170

Restoring an item from the QuarantineSome programs rely on other programs that areclassified as security risks to function. The programmay not functio

Page 171

5In the Browsefor Folder dialog, select the folder ordrive where you want to restore the file and thenclick OK.6Click Close.Manually submitting an ite

Page 172

This chapter includes the following topics:1 Feature summary1 About turning off automatic features1 About customizing settings and optionsFeature summ

Page 173

downloads, and other files are scanned for viruses andother potential risks. In addition, the definition updatesthat Automatic LiveUpdate downloads wh

Page 174 - 1 Scan your computer

Detects viruses, spyware, andother security risks incompressed files during manualscans.See “What to do if a security riskis found” on page 165.Compre

Page 175

Scans for and detects viruses ininstant messenger attachments.Scans the instant messengerattachments for the supportedinstant messenger programsthat w

Page 176 - Responding to security issues

About spyware and other security risk protectionfeaturesSpyware and other security risk protection featuresprovide protection against the latest secur

Page 177

If you are unsure how tohandle a program that isclassified as a security risk,you can view the security riskassessment. The security riskassessment de

Page 178

See “Turning offAuto-Protecttemporarily andturning it on again”on page 259.See “Turning off orturning on NortonCommunity Watch”on page 260.Turning off

Page 179 - Protecting Internet

Lets you access the NortonAntiVirus advanced window.By using the Norton AntiVirusadvanced window, you can dothe following:1 Run different scans.1 View

Page 180

5In the dialog box that appears, in the Select theduration drop-down list, select how long you wantto turn off Auto-Protect, and then click OK.To turn

Page 181 - About Download Insight

4In the Norton Community Watch row, do one ofthe following:1 To turn off Norton Community Watch, move theOn/Off switch to the right to the Off positio

Page 182

4Click Configure for the feature that you want tochange.5In the window that appears, make the necessarychanges, and then click OK.6To apply the defaul

Page 183

2In the Settings window, configure your settings inthe following tabs:Lets you configure howyou want NortonComputerAntiVirus to scan yourcomputer for

Page 184

Lets you configure howyou want NortonAntiVirus to monitor yournetwork activities.You can protect yourcomputer against thethreats that you mightreceive

Page 185

Lets you configure theappearance and securityof your product.In addition, you canconfigure how NortonAntiVirus submits riskdetails to Symantec. Youcan

Page 186 - Report on Launch of Files:

About Computer settingsThe various options in the Computer tab let youconfigure how you want Norton AntiVirus to scan yourcomputer for viruses and oth

Page 187

Norton AntiVirus lets you rundifferent types of scans to detectand prevent any virus infectionon your computer.You can use the variousComputer Scan op

Page 188

Real Time ProtectionCustomizing protection featuresAbout customizing settings and options268

Page 189

Real Time Protection optionprotects your computer bycontinuously checking forviruses and other security risks.You can use the Real TimeProtection opti

Page 190 - About Intrusion Prevention

The bottom section of the Norton AntiVirus mainwindow helps you do the following:Lets you access the worldmap with hotspots ofcybercrimes and the late

Page 191

SONAR Protection1Symantec Online Network forAdvanced Response (SONAR)provides you with real-timeprotection against threats byproactively detectingunkn

Page 192

Updates271Customizing protection featuresAbout customizing settings and options

Page 193

Norton AntiVirus protects yourcomputer from vulnerabilitiesthrough the latest program anddefinition updates. Definitionupdates contain the information

Page 194

latest available version andprompts you for freeinstallation. To get the latestversion, this option must beturned on.1 Smart DefinitionsActivates the

Page 195

Your options are:The Browser Protection featurechecks for browservulnerabilities in InternetExplorer 6 and Internet Explorer7.You must turn on the Bro

Page 196

Intrusion Prevention scans allthe network traffic to and fromyour computer and comparesthis information against a set ofattack signatures. Attacksigna

Page 197

Message ProtectionCustomizing protection featuresAbout customizing settings and options276

Page 198 - Checking Antispyware settings

Email Protection protects yourcomputer against the threatsthat you may receive throughemail attachments. You can usethe Email Antivirus Scan optionand

Page 199

default SMTP port 25 and thedefault POP3 port 110. If youremail program is not configuredwith the default ports, you canmanually configure NortonAntiV

Page 200

Network SecuritySettings279Customizing protection featuresAbout customizing settings and options

Page 201

Lets you access NortonManagement.Norton Management lets youmanage your Norton productson all of your devices fromone location. Click theManage icon at

Page 202 - 1 Trust Controls

The Metered Broadband Modeoption lets you set up policiesand restrict the Internet usageof Norton AntiVirus. You candefine the amount of networkbandwi

Page 203

devices that are on yournetwork.1 Grant or deny permissions tothe networked devices toaccess your computer.1 Add or Remove any device inthe Network Se

Page 204

Your options are:Norton TasksCustomizing protection featuresAbout customizing settings and options282

Page 205

Lets you configure yourNorton Tasks settings.Your options are:1 Automatic Resume DelayThis option delays theautomatic backgroundtasks for a specificdu

Page 206 - 1 The device does not have a

When the option is turnedon, Norton AntiVirusautomatically schedulesthe optimization after youinstall an application onyour computer.Optimization impr

Page 207

Other Settings285Customizing protection featuresAbout customizing settings and options

Page 208 - Setting up Remote Monitoring

Lets you configure themiscellaneous settings.Your options are:1 Power Saving ModeLets you save your batterypower by suspending theNorton Tasks when yo

Page 209 - Turning off Remote Monitoring

definitions.1 Norton CommunityWatchLets you submit selectedsecurity and applicationdata to Symantec foranalysis. Symantecanalyses the data todetermine

Page 210 - 1 The name or description

Performance MonitoringCustomizing protection featuresAbout customizing settings and options288

Page 211

Lets you monitor theperformance of yourcomputer.1 Performance MonitoringWhen you turn on thePerformance Monitoringoption, Norton AntiVirusmonitors the

Page 212

Lets you set up the NortonOnline Backup account oraccess your online backupstatus.wNorton Online Backupmay not be available in someversions of Norton

Page 213 - Editing device details

Details & Settings linkin the notificationalert lets you viewadditional detailsabout the resourceconsumption by theprogram in the FileInsight wind

Page 214 - Editing network details

2 Alert for High-Usageof:2 CPUWhen this optionis turned on,Norton AntiVirusdetects andnotifies you withthe details ofincreased usage ofthe CPU resourc

Page 215

by any program orprocess.2 Program ExclusionsLets you selectspecific programs toexclude fromappearing inperformance alerts.Customizing protection feat

Page 216

Product Security293Customizing protection featuresAbout customizing settings and options

Page 217 - Viewing the device details

Lets you protect NortonAntiVirus from unauthorizedchanges.Your options are:1 Non-Admins Access toSettingsLets you access andconfigure all the optionsi

Page 218 - Security Map

product settings.However, if you forgetyour settings password,you can reset thepassword in the windowthat appears when youchoose to uninstallNorton An

Page 219 - About Metered Broadband Mode

Silent Mode SettingsCustomizing protection featuresAbout customizing settings and options296

Page 220 - 1 No Traffic

Lets you turn on or turn offSilent Mode.Your options are:1 Silent ModeWhen you turn on theSilent Mode option, SilentMode is enabled for aspecified dur

Page 221

Quiet Mode. WhenQuiet Mode is turnedon, Norton AntiVirussuppresses thebackground activitiesbut continues todisplay alerts andnotifications.2 Media Cen

Page 222 - 1 Critical Updates Only

2 User-SpecifiedProgramsWhen you run anapplication that islisted in theUser-SpecifiedPrograms list, NortonAntiVirus detects theactivity, andautomatica

Page 223

Norton License AgreementNorton AntiVirus™IMPORTANT: PLEASE READ THE TERMSAND CONDITIONS OF THIS LICENSEAGREEMENT (“LICENSE AGREEMENT”)CAREFULLY BEFORE

Page 224

Safe Web LiteGetting startedAbout Norton AntiVirus main window30

Page 225 - Opening Security History

wYou cannot run System Restore on your computer whenNorton Product Tamper Protection is turned on. Youmust temporarily turn off Norton Product TamperP

Page 226 - 1 Quarantined items

To turn on Norton Product Tamper Protection1In the Norton AntiVirus main window, clickSettings.2In the Settings window, click the General tab.3In the

Page 227

wThe reset settings password option appears in theSelect your Uninstall Preference window only whenthe SettingsPassword Protection option is turned on

Page 228 - About Security History

6In the dialog box that appears, in the Password box,type a password.7In the Confirm Password box, type the passwordagain.8Click OK.9In the Settings w

Page 229

password option in the Select Uninstall Preferencewindow.To access the SelectUninstallPreference window, youmust choose to uninstall Norton AntiVirus.

Page 230

7In the Confirm New Password box, type the newpassword again.8Click OK.305Customizing protection featuresAbout customizing settings and options

Page 231

Customizing protection featuresAbout customizing settings and options306

Page 232

This chapter includes the following topics:1 Finding the version number of your product1 Finding the End-User License Agreement1 About upgrading your

Page 233

Finding the End-User License AgreementEnd-User License Agreement (EULA) is a legaldocument that you agree to while installing theproduct. EULA contain

Page 234

Automatic Download of New Version option, go theNorton AntiVirus main window, and then click Settings> Updates > Automatic Download of New Versi

Page 235

Lets you download NortonSafe Web Lite.Norton Safe Web Liteprotects your computer whileyou search, browse, and shoponline using your Webbrowser. Norton

Page 236

updates. You can use LiveUpdate to obtain the latestupdates.The upgrade process might not work if your Webbrowser is incompatible to communicate with

Page 237

wYour product must be activated and you need anInternet connection to check if a new version isavailable and install new version of the product.To che

Page 238 - About the File Insight window

that your computer is connected to the Internet. If youuse a proxy server to connect to the Internet, you mustconfigure the proxy settings of Norton A

Page 239

3Follow the on-screen instructions in the CheckingYourConnection window to attempt to correct yourconnection issue.4In the Checking Your Connection wi

Page 240

To stay informed about protection issues1Open your Web browser, and go to the followingURL:http://www.symantec.com2In the Symantec Web site, click Nor

Page 241

wSupport offerings may vary based on the language orproduct.About Norton Support Web siteThe Norton Support Web site provides a full range ofself-help

Page 242

contact the technical support team in the followingways:Chat in real time with asupport representative.For more complex technicalissues, chat offers t

Page 243

also use the SearchSupport box to find solution usinga keyword.Norton Support Web site also contains useful links tothe product manual, the Norton Acc

Page 244 - Searching in Security History

You can also use the click here link at the bottom ofthe Norton Autofix window to contact a supportrepresentative.wAvailability of support varies by r

Page 245 - 1 Text Files (.txt)

About keeping your subscription currentSubscription period lengths vary by Symantec product.To maintain uninterrupted protection, you must keepyour su

Page 246

browser.Your activation status or subscription status appearsat the bottom of the main window. You can use theActivate Now option to activate or subsc

Page 247

The ClubNorton Web page includes a regularly updatedarticle library, a glossary, the Norton Forums, and theNorton Update Center. You can also find the

Page 248

Web site or from the CD. To reinstall Norton AntiVirus,follow the installation procedures that are available inthe User's guide.To uninstall Nort

Page 249

5To uninstall Norton AntiVirus, click Next.6Do one of the following:1 Click RestartNow (recommended) to restart thecomputer.1 Click Restart Later to r

Page 250

4Do one of the following:1 Click RestartNow (recommended) to restart thecomputer.1 Click RestartLater to restart the computer later.Norton AntiVirus i

Page 251

Finding additional solutionsAbout uninstalling324

Page 252

Aabout customer support 315accessingFacebook Scan 104accessing Norton AntiVirus scansComputer Scan 104Reputation Scan 104Actions windowdeleting securi

Page 253 - Customizing

Bandwidthdefining usage 221managing 219Boot Time Protection 163configure 164Cchangingscan schedules 120cloud technologyCloud 123ClubNortonsecurity tip

Page 254 - 1 Monitors your computer for

EULAchecking 308Events graphmonitoring activities 64Ffeatures 253security risk protection 257file extensionsof infected files 174Full Screen Detection

Page 255

maintaining protectionabout 97avoiding security risks 97Manual Repairreviewing remaining risksin 174Manual Repair windowreviewing remaining risksin 10

Page 256 - Feature summary

Norton AntiVirus (continued)uninstalling 320upgrading 308version number 307Norton AntiVirus scanabout 100accessing Norton AntiVirusscans 104command li

Page 257

Provides you the essentialnetwork protection options.It also contains links to thelist of vulnerable programsand Network Security Map.Network Protecti

Page 258

performance alerts (continued)removing programs fromexclusion list 73turning off 68turning off low resourceprofile 71turning on 68turning on low resou

Page 259

Results Summaryabout 110resolved risks 110total items scanned 110Running custom scansscanning required files 115scanning required folders 115running F

Page 260

security risksabout 197, 257adding to Quarantine 250assessment 257found by Auto-Protect 165, 167managing protection using themain window 197other prog

Page 261

System Insight (continued)monitoring activities 64Performance graph 61system status graphactivity details 66System Status indicatorsresponding 33Ttech

Page 262

fooNorton from Symantec products protect consumers from traditional threats with antivirus, antispam, and Spyware Protection.They also protect against

Page 263 - 1 Real Time Protection

Indicates that your computer andactivities are at risk.Take immediate action to improveyour protection status.At RiskYou can respond to the System Sta

Page 264

1 Antispyware1 SONAR Protection1 Intrusion Prevention1 Email Protection1 Browser ProtectionTo monitor the protection status of a feature1In the Norton

Page 265 - 1 Silent Mode Settings

1 All the Web site URLs that you visited before thedetection of a risk1 The applications and processes that run on yourcomputer regularly and during a

Page 266

Community Watch. You can also review the data,which Norton Community Watch collects and submitsto Symantec, in the Security History window.About Norto

Page 267

Norton Bootable Recovery Tool detects and resolvesthe following security threats:Programs that infect anotherprogram, boot sector,partition sector, or

Page 268 - Real Time Protection

Programs that track systemactivity, gather systeminformation, or track userhabits, and relay thisinformation to third-partyorganizations. Theinformati

Page 269 - 1 Auto-Protect

Software in accordance with suchspecifications;B. make one copy of the Software for back-upor archival purposes, or copy the Softwareonto the hard dis

Page 270 - 1 Enable Boot Time Protection

You can download Norton Bootable Recovery ToolWizard in one of the following ways:1 From the Start menu.1 From the Norton Support Web site.To download

Page 271

Using the Norton Bootable Recovery ToolIf the installation of your Norton product fails, you canuse the Norton Bootable Recovery Tool to scan andremov

Page 272 - 1 Automatic Download of New

Starting Norton AntiVirus from thecommand promptIf you work from the command line (for example,writing a script or code), you can start Norton AntiVir

Page 273

most cases, you can click the link available in the alertto view the details and fix the problems.The Norton AntiVirus icon represents the current sta

Page 274 - Your options are:

About Norton AntiVirus shortcut menuNorton AntiVirus performs background activities tokeep your computer secure. The icon in the notificationarea reas

Page 275

Lets you turn on or turn offSilent Mode.Turn on/Turn off SilentModeLets you turn off or turn onAntivirus Auto-Protect.Disable/Enable AntivirusAuto-Pro

Page 276 - Message Protection

main window, and then click Settings > Network >NetworkSecuritySettings > ProxyServer > Configure.LiveUpdate does not download the latest

Page 277

The type of definition updates that each of theSymantec products receive are as follows:Users of these productsreceive the latest virusdefinitions fro

Page 278

Users of these productsreceive the latest virusdefinitions fromSymantec that protectsyour computer from alltypes of security threats.In addition, user

Page 279 - Settings

Contains the most importantvirus definitions that arerequired for latest securitythreats as viewed by Symantec.The Core Set is a subset of theComplete

Page 280 - 1 View or modify details

by the Software, the Software will cease tofunction until activation is complete; atwhich time the Software functionality willbe restored. In the even

Page 281

As the Smart Definitions are of considerably smallersize, it results in lesser download time, lesserinstallation time, lesser boot time, and lesser me

Page 282

Updates are lighter and faster than AutomaticLiveUpdate. It keeps your computer secure from theongoing threats on the World Wide Web.When Pulse Update

Page 283 - 1 Idle Time Optimizer

product. Program updates are usually created to fixprogram errors, improve the performance of theprogram, or, to extend the operating system orhardwar

Page 284

you can acquire the product and maintain your statusare as follows:The product includes a limited-timesubscription to definition updates. Whenthe subs

Page 285 - Other Settings

run LiveUpdate manually to obtain updates if you haveturned off the Automatic LiveUpdate option.wIf you are connected to the Internet, AutomaticLiveUp

Page 286 - 1 Insight Protection

About Pulse UpdatesIn addition to the definition updates that AutomaticLiveUpdate downloads, Norton AntiVirus usesstreaming technology to download the

Page 287

turn on or turn off Pulse Updates only if AutomaticLiveUpdate is turned on.To turn off or turn on Pulse Updates1In the Norton AntiVirus main window, c

Page 288 - Performance Monitoring

the Internet. It also contains the words which you wantto filter and block while you access the Internet. Youcan also choose the option that lets your

Page 289 - 2 Performance Alerting

Lets you provide the details ofyour Proxy Settings.Under Proxy Settings, check Usea proxy server for your HTTPconnections, and do thefollowing:1 In th

Page 290 - 2 Use Low Resource

5In the Network Proxy Settings window, do thefollowing:1 If you want your browser to automatically detectnetwork connection settings, under AutomaticC

Page 291

be subject to the import and export laws ofthe United States, specifically the U.S. ExportAdministration Regulations (EAR), and thelaws of any country

Page 292 - 2 Program Exclusions

Getting startedAbout Network Proxy settings60

Page 293

This chapter includes the following topics:1 About System InsightAbout System InsightNorton AntiVirus continuously monitors yourcomputer to keep it fr

Page 294 - 1 Settings Password

disk optimizations, threat detections, performancealerts, or Quick Scans. The graph displays theactivities as icon or stripe, and the description fore

Page 295

The NortonTasks window provides the details suchas the timestamp, the duration, and the status ofthe background jobs. The details also include thetype

Page 296 - Silent Mode Settings

About monitoring system activitiesSystem Insight provides information about theimportant system activities that you performed or thatoccurred over a p

Page 297 - 2 IMAPI 2.0 Disk Burn

Indicates the optimizationactivities that you performed onyour system over a period of thelast three monthsOptimizedProvides the details about thethre

Page 298

Provides the details about QuickScans that Norton AntiVirusperformed on your system overa period of the last three monthsThe details include the date

Page 299 - 2 User-Specified

2In the Performance window, at the top of the Eventsgraph, click the tab for a month to view the details.3In the Events graph, move the mouse pointer

Page 300

access the Resource Threshold Profile for Alertingoption, go to the Norton AntiVirus main window, andthen click Settings > General > Performance

Page 301

Turns on performance alerts.Select this option if you wantNorton AntiVirus to notify youwith performance alerts whena program or process exceedsthe sy

Page 302

The name given to the Device during theinitial setup of such Device. If collected, thename will be used by Symantec as an accountname for the Device u

Page 303

4Under Performance Monitoring, in thePerformanceAlerting row, do one of the following:1 To turn off performance alerts, move thePerformanceAlerting sw

Page 304

4Under Performance Monitoring, in the ResourceThreshold Profile for Alerting row, select one ofthe following options:Configures a low thresholdlimit f

Page 305

your computer gains longer battery life and becomesmore energy efficient.You can configure a low threshold profile and ensurethat all programs consume

Page 306

Excluding programs from appearing in performance alertsNorton AntiVirus lets you exclude programs fromappearing in performance alerts. You can add the

Page 307 - Finding additional

2In the Settings window, click the General tab.3In the left pane, click Performance Monitoring.4Under Performance Monitoring, in the ProgramExclusions

Page 308 - About upgrading your product

When you click at any point on the CPU graph ormemory graph, Norton AntiVirus displays a list of theprocesses that consume maximum resources at thatpo

Page 309

wBy default, the graphs display performance time forthe last 90 minutes.To view CPU graph and memory graph1In the Norton AntiVirus main window, clickP

Page 310

Identifying resource-consuming processesYou can click at any point on the CPU graph or memorygraph to obtain a list of the processes that consumemaxim

Page 311 - About Norton Autofix

track of all of the fragments of the file. If free space isalso fragmented, the drive head might have to trackadequate free space to store temporary f

Page 312

When you use the Optimize option in Windows XP,Norton AntiVirus optimizes only the boot volume (forexample, C:\Windows). Therefore, it requires less t

Page 313

may collect, transmit, store, disclose andanalyze such information for these purposes.CPS / S 5.0 / USE

Page 314 - About Support

application on your computer and your computer isidle. If you start using your computer again, NortonAntiVirus stops the optimization task, and starts

Page 315 - About Norton Support Web site

To turn on Idle Time Optimizer1In the Norton AntiVirus main window, clickSettings.2In the Settings window, click the General tab.3In the left pane, cl

Page 316

1 The status of the Norton taskYou can view details about the completion of thetask.1 The power source that the Norton Task uses.You can specify the t

Page 317 - About phone support

3In the Norton Tasks window, view the details ofbackground jobs.4Do one of the following:1 To run a background job, click the Play icon thatappears be

Page 318 - Support policy

Allows the Norton Tasks torun irrespective if thecomputer uses externalpower or battery power.If you choose this option,Norton AntiVirus performsthe N

Page 319 - ClubNorton

4In the Power Source window, select one of thefollowing:1 ExternalAllows the Norton Task to run only when yourcomputer uses external power.1 External

Page 320 - About uninstalling

Norton AntiVirus obtains specificinformation about the Files ofInterest and submits theinformation to Symantec duringidle time. The informationinclude

Page 321

Symantec assigns the following confidence levels toFiles of Interest:Symantec analyzes the file asgood based on the statisticalevaluation that is done

Page 322

technique to scan your computer. It scans all of thefiles on your computer against the signatures that itobtained during definition updates. When you

Page 323

Lists the Files of InterestAll FilesLists the programs that startwhen you start yourcomputerStartup ItemsLists all the files andprograms that are curr

Page 324 - Finding additional solutions

Chapter 1 Getting started ... . . . ... . . . 11Activation protects you ... 11About your Norton Ac

Page 325

Lists the Files of Interest thatyou manually trusted in theFile Insight windowThis category does not listthe files that do not belongto the File of In

Page 326

To view the files using Norton Insight1In the Norton AntiVirus main window, clickAdvanced.2In the Computer Protection pane, click ApplicationRatings.3

Page 327

Insight - Application Ratings window. However, youcan use the CheckTrust Now option in the File Insightwindow to update the trust value of a file. You

Page 328

To find the location of the file4In the File Insight window, click Locate.To refresh the trust level of the file4In the File Insight window, click Che

Page 329

The complete scan includes a scan of all files onyour computer irrespective of the confidence levelor digital signature of the files.1 Configure to St

Page 330

To configure Scan Performance Profiles from the NortonInsight - Application Ratings window1In the Norton AntiVirus main window, clickAdvanced.2In the

Page 331

Norton AntiVirus provides reports based on thefollowing categories:Lets you view the details of thevarious attacks your computeris protected fromFor e

Page 332

This chapter includes the following topics:1 About maintaining protection1 About the Norton AntiVirus scansAbout maintaining protectionAfter you have

Page 333

1 Run LiveUpdate regularly to receive new programupdates.1 Keep Auto-Protect turned on at all times to preventviruses from infecting your computer.1 W

Page 334

2In the Settings window, in the Computer tab, movethe On/Off switch to the left to the On position forthe following settings:Computer Scan providesthe

Comments to this Manuals

No comments