Norton 360TMProduct ManualCare for our Environment; ‘It's the right thing to do.’Symantec has removed the cover from this manual to reduce the En
Lets you open thePerformance window inNorton 360.The Performance windowchronicles all installs,downloads, optimizations,detections, alerts, andinstanc
Performs backgroundmaintenance tasks related tolicensing.Licensing MaintenancePerforms backgroundmaintenance tasks related toNorton Insight. Tasks inc
To monitor background jobs1In the Norton 360 main window, click Performance.2In the Performance window, click Norton Tasks.3In the Norton Tasks window
You can select one of the following options:Allows the Norton Tasks torun only when your computeruses external power.If you choose this option,Norton
3In the Norton Tasks window, under the PowerSource column, click the Configure link for theNorton Task that you want to configure the powersource.4In
A Norton 360 scan can identify threats on yourcomputer in the following ways:At regular intervals, Norton 360obtains definition updates fromSymantec.
Norton 360 obtains specificinformation about the Files ofInterest and submits theinformation to Symantec duringidle time. The informationincludes thin
Symantec assigns the following confidence levels toFiles of Interest:Symantec analyzes the file astrusted based on the statisticalevaluation that is d
Norton 360 also provides different profiles to configureyour scan performance. When you use the Full Scanprofile, Norton 360 follows the Blacklist tec
The drop-down list that is available in the NortonInsight - Application Ratings window provides youthe following options:Lists the processes that runo
Lists the Files of Interest thatyou manually trusted in theFile Insight window.This category does not listthe files that do not belongto the File of I
When your system status is At Risk or Attention, thissection automatically provides you the FixNow optionto fix all the issues at once.The right side
To view the files using Norton Insight1In the Norton 360 main window, click Security, andthen click Run Norton Insight.2In the Norton Insight - Applic
window to update the trust value of a file. You can alsomanually trust any well-known files. You can changethe trust level of any file to User Trusted
To manually trust the file4In the File Insight window, in the Details tab, clickTrust Now.You can manually trust the files that are poor,unproven, or
Norton 360 scans the files that have a confidencelevel other than Norton Trusted.1 Configure to High Trust to perform a scan thatexcludes the files th
2In the Norton Insight - Application Ratingswindow, move the ScanPerformance Profiles sliderto one of the settings. Your options are:1 Full Scan1 Stan
Norton 360 provides reports based on the followingcategories:Lets you view the details ofthe various attacks your PCis protected from.For example, you
Viewing the Monthly ReportThe Monthly Report lets you view how Norton 360protected you for the past 30 days. This report includesdifferent activities
This chapter includes the following topics:1 About total protection1 About keeping your computer secure1 About solving connection problems1 About resp
Norton 360 is grouped into the following fourcategories of protection:Blocks and removes virusesand spyware from email anddownloaded sites, protectsag
1 Delete all unwanted messages without openingthem.1 Do not respond to email that you suspect is spam.Delete it.1 Be wary of any email that requests c
Lets you access NortonManagement.Norton Management lets youmanage your Norton productsinstalled on all of yourdevices from one location. Tosign up or
About solving connection problemsNorton 360 uses an Internet connection to supportseveral of its protection features. If you use a proxyserver to conn
Checks all boot records, files,and running programs to protectyour computer from viruses andspywareIt also runs other tasks (such asLiveUpdate, Regist
When you right-click a folder, the shortcut menudisplays Norton 360 and then Scan Now option. Youcan use this command to scan any particular folder.Wh
window. For example, the security items that arerelated to the Quarantine feature appear under theQuarantine category. In addition, the Security Histo
1 Email Errors1 Norton Community Watch1 Registry Cleanup1 File Cleanup1 Disk Optimization1 Silent Mode1 LiveUpdateYou can view the security items base
History logs for that day. You can later import the fileinto Security History and analyze the data.Viewing items in Security HistorySecurity History p
2In the Tasks window, under General Tasks, clickCheck Security History.Maintaining total protectionAbout monitoring protection features126
3In Security History window, in the Show drop-downlist, select the category of items that you want toview. Your options are:The Recent History view in
The security risks include thesuspicious programs that cancompromise the security ofyour computer.The Resolved Security Risksview in the Security Hist
The Security HistoryQuarantine provides a safelocation on your computerwhere you can isolate itemswhile you decide an action totake on them.The Quaran
Lets you download theNorton Mobile Security forAndroid.Norton Mobile Security helpsprotect your mobile devicesagainst loss, theft, viruses,and other m
The firewall monitors thecommunications betweenyour computer and othercomputers on the Internet.The Firewall - Network andConnections category in theS
The firewall monitors thecommunications betweenyour computer and othercomputers on the Internet.The firewall maintains rulesto control Internet access
Download Insight processesany executable file that youdownload for analysis of itsreputation level. It theninforms you about theprocessing results bas
Norton Product TamperProtection lets you protectyour Norton product from anyattack or modification byunknown, suspicious, ormalicious applications.The
Network Cost Awareness letsyou set up policies andrestrict the Internet usage ofNorton 360. You can definethe amount of networkbandwidth that Norton 3
Norton 360 may generateerrors in some cases. Forexample, an error can occurwhen you run LiveUpdate orscan a folder. Engine errors,timeout errors, and
The Norton CommunityWatch feature lets yousubmit any suspicioussecurity or suspiciousapplication data to Symantecfor analysis. Symantecassesses the da
The File Cleanup featureremoves unwanted temporaryfiles including leftoverInternet browser files,Internet search words, andother temporary files.The F
Silent Mode suppresses alertsand notifications andtemporarily suspends mostof the background activities.The Silent Mode view in theSecurity History wi
4Click a row to view details for that item.If you want to view additional information about anitem, click the More Details option in the Detailspane o
Online FamilyGetting StartedAbout Norton 36014
The following table lists the categories that providethe advanced details about the Security History items:Displays the followinginformation about the
Actions141Maintaining total protectionAbout monitoring protection features
Displays the actions that areavailable for the selected itemThe options in the Actions viewvary depending on the optionsthat are available in the Show
This action removes therestricted status from theselected computer or fromall of the unclassifiedcomputers on the selectednetwork.This option is avail
1 Stop Notifying MeThis action prevents Norton360 from notifying you whenit blocks the selected attacksignature in the future.This option is available
events that are related to Security Risks, DownloadInsight, and Performance.The File Insight window lets you view more details ofevents that belong to
Lets you view the detailedinformation about theunresolved security risks in anorganized way.The Unresolved Security Riskscategory includes the infecte
Lets you view the performancedetails of any File of Interest thatis available on your computer.The information includes thegeneral details, the origin
Provides the lineage details of afile.You can view the file name andthe URL of the source fromwhere the file was downloaded.The lineage details of a f
Let you return the securityrisk that is quarantined to theoriginal location on yourcomputer.Returns the selectedQuarantine item to itsoriginal locatio
Lets you monitor your child’sactivities on the Internet.wNorton Online Familymay not be available withsome versions of Norton 360.In such case, you ma
This category includes thesecurity risks or the infectedfiles that Norton 360 was notable to repair, remove, orquarantine.Unresolved SecurityRisksThis
Takes you to the SymantecSecurity Response Web siteGet helpSends the security risk toSymantecSubmit to SymantecSearching in Security HistoryYou can se
option to save the list in the Security History log. Youcan later import the log file and analyze the data.Security History stores the information in
5In the Save As dialog box that appears, navigate toa location and specify the name for the file.The category name in the Show drop-down listappears a
The Security History Quarantine includes the followinggroups of items:Includes the items suchas spyware and adwarethat are generally low riskand that
3In the Threat Detected window, select the actionthat you want to perform. Some of the options are:Returns the security risk thatis quarantined to the
Adding an item to the QuarantineSecurity History Quarantine provides a safe locationon your computer in which you can isolate items whileyou decide on
functionality of a program that requires the riskprogram to run.For example, a shareware or freeware program thatyou download may use adware to keep i
to remove the security risk and places it in the SecurityHistory Quarantine. Some programs may rely on thesecurity risk item that you quarantine to fu
volume. These items appear as Not Submitted inSecurity History.To manually submit an item to Symantec1In the Security History window, in the Quarantin
Details option in the Norton360 main window to viewmore details on the NortonOnline Family Web site.Getting StartedAbout Norton 36016
attacks. It also provides information about the knownattacks that they are protected from.Vulnerabilities are flaws in your programs or youroperating
For each program, you can view details such as thename of the program, its vendor, and the number ofvulnerabilities that the program contains. You can
To view details about a vulnerable application1In the Norton 360 main window, click Tasks.2In the Tasks window, under General Tasks, clickCheck Vulner
This chapter includes the following topics:1 About the Norton 360 scans1 About Computer Scan1 About Insight Network scan1 About Reputation Scan1 About
Norton 360 automatically performs different types ofscans to secure your computer from latest threats. Italso lets you run different types of scans ma
Reputation Scan displays thereputation information of thefiles on your computer. Itdisplays the reputationinformation such as trust level,prevalence,
Scan Facebook Wall lets youscan the links and URLs that areavailable on your Facebookprofile.When you click the ScanFacebook Wall option, Norton360 ta
of the Computer Scan displays the threat as Trojan.Foo.You can click the Run Scans option available in theTasks window to access the different types o
Runs LiveUpdate, backup, anddisk optimization tasks.Runs LiveUpdate, backs up yourdata, frees disk space, andoptimizes your disk volume.Custom TaskCom
3Click Go.You can use the following options:Suspends the scan temporarily.Click Resume to continue thescan.PauseSkips the current scan.SkipTerminates
Lets you check the safety ofa Web site.You can also perform a safesearch.wThis option may not beavailable with some versionsof Norton 360. In such cas
3Click Go.4After the scan is complete, in the Scans window,click Close.Scanning selected drives, folders, or filesOccasionally, you might want to scan
4In the Scans window, do one of the following:1 To scan specific drives, click Run next to DriveScan, select the drives that you want to scan,and then
computer. Viruses, spyware, and other risks oftentarget these areas.If your most recent scan was a Full System Scan, thiswindow shows the results of a
About custom scansYou can create a custom scan if you regularly scan aparticular segment of your computer. This custom scanlets you scan the segment f
5In the New Scan window, in the Scan Name box,type a name for the scan.You cannot specify a scan name that is already inuse.6On the Scan Items tab, ad
5In the window that appears, on the Scan Items tab,do the following:1 To add drives, click Add Drives, in the ScanDrives dialog box, select the drives
5In the Edit Scan window, on the Scan Options tab,configure the scan options as required.6Click Save.Editing a custom scanYou can edit a custom scan t
To run a custom scan1In the Norton 360 main window, click Security, andthen click Run Scans.2In the Scans window, under Computer Scans, clickCustom Sc
4In the Scans window, in the Delete column, clickthe delete icon next to the custom scan that youwant to delete.5Click Yes to confirm that you want to
wNorton 360 lets you select multiple dates if youschedule a monthly scan.To schedule a custom scan1In the Norton 360 main window, click Security, andt
Lets you access NortonStudio.Norton Studio is a Windows8 app that lets you manageyour Norton products andNorton product keys from onelocation. You can
7Under After scan completion:, select the state atwhich your computer should be after the scan iscomplete. Your options are:1 Stay On1 Turn Off1 Sleep
5In the Edit Scan window, under When do you wantthe scan to run?, set the frequency and time atwhich you want the scan to run.Most of the frequency op
Editing a scheduled scanYou can change the schedule of any scheduled customscan, Quick Scan, or Full System Scan from the Scanswindow.To edit a schedu
When the Insight Protection option is turned on,Norton 360 performs a traditional scan and an InsightNetwork scan simultaneously. The traditional scan
When you right-click a file, the shortcut menudisplays Norton 360 and then Insight NetworkScan. You can use this command to scan a file usingboth loca
4In the Insight Protection row, do one of thefollowing:1 To turn off Insight Protection, move the On/Offswitch to the right to the Off position.1 To t
Computer Scan. Norton 360 uses the Computer Scanto perform the signature-based threat detection. Itcompares the signature of the filtered reputation f
This category includesWindows System files (.sys),dynamic link library files(.dll), and device driver files(.drv).System filesThis category includesAc
Scans all the Files of Interestthat are available on yourcomputer.When you perform a FullSystem Scan, Norton 360searches for Files of Intereston all t
Symantec has a fewindications that the file is nottrusted.This file is suspicious and canharm your computer.PoorSymantec has a highindication that the
If you are not connected to the Internet, you can clickTry Later in the Activation not complete window tostart your product. The Activation window rea
4If there is a file with Poor or Bad trust level, underthe Trust Level column, click the red cross (x) icon.5In the Quarantine File window, click Quar
check the trust level of a specific file, you can scan theparticular file.To run a Reputation custom scan1In the Norton 360 main window, click Securit
When you run a Reputation Quick Scan, Norton 360considers the Files of Interest which include runningprocesses and loaded programs. When you run aRepu
You can view the number of trusted files that areon your computer. You can also view the totalnumber of files that Symantec analyzes within theNorton
Indicates the trust level thatis assigned to a file.Symantec analyzes specificinformation about a file suchas the digital signature andthe hash value
Indicates the communityusage level of the file.The search results aregrouped in to the followingcategories:1 Very Few Users: Showsthe files that have
Indicates the system resourceusage level of the file.The usage levels are asfollows:1 Low: Indicates that thefile consumes minimumsystem resources.1 M
Indicates the stability ratingof the file.The stability rating dependson how frequently theprogram crashes. Thedifferent stability ratings areas follo
you are not only protected from unsafe sites but youcan also let other Facebook users know the securitystatus of any Web site.However, Norton Safe Web
The following are the safety states that Norton SafeWeb provides after it scans the links on your FacebookWall:Indicates that the site is safe tovisit
Norton 360™ Product ManualThe software described in this book is furnished under a licenseagreement and may be used only in accordance with the terms
You can activate your product directly from theactivation alert. You can also activate your productfrom the Trial Period Status link in the main windo
To enable your Facebook Wall1In the Norton 360 main window, click Security, andthen click Run Scans.2In the Scans window, under Scan Facebook Wall,cli
suppress the SONAR notifications by disabling theShow SONAR Block Notifications option.The View Details link in the notification alert lets youview th
and proactively detects unknown security risks on yourcomputer. SONAR identifies emerging threats basedon the behavior of applications. SONAR identifi
To exclude high-risk security threats from scanning1In the Norton 360 main window, click Settings.2In the Settings window, under Detailed Settings,cli
window. The Signature Exclusions window containsthe list of all security risks that can be excluded fromNorton 360 scans. For each security risk, you
About clearing file IDs that are excluded during scansWhen you run a Reputation Scan, Norton 360 providesinformation on the trust-worthiness of all pr
again. This can improve the scan performance ofNorton 360 on your computer.However, if you want Norton 360 to scan all the filesin your computer, you
Microsoft Excelexcel.exeMicrosoft PowerPointpowerpnt.exeMicrosoft Visiovisio.exeMicrosoft Accessmsaccess.exeMicrosoft Projectwinproj.exeNorton 360 sca
4In the Microsoft Office Automatic Scan row, do oneof the following:1 To turn on Microsoft Office Automatic Scan,move the On/Off switch to the left to
Norton 360 turns on this optionautomatically when it detects adisk burning task or a MediaCenter TV recording task. Norton360 also turns on Quiet Mode
To activate your product from the main window1In the Norton 360 main window, do one of thefollowing:1 If you purchased a subscription version of areta
About the Silent Mode that you turn on manuallyNorton 360 lets you manually turn on Silent Mode fora specified duration. When Silent Mode is turned on
To turn on Silent Mode from the Administrative Settingswindow1In the Norton 360 main window, click Settings.2In the Settings window, under Detailed Se
2In the Performance window, click Norton Tasks.3In the Norton Tasks window, under Silent Mode,move the On/Off switch to the right to the Offposition.4
ensure high performance of your computer. Theactivities that are suspended run after you finish usingthe application in the full-screen mode.Silent Mo
3In the Full Screen Detection row, move the On/Offswitch to the left to the On position.4In the Settings window, click Apply.5Click Close.About Quiet
The following table explains about the various options:When you use a Media Centerapplication to burn a CD or aDVD, Norton 360 automaticallyenables Qu
When you use a Media Centerapplication to record a TVprogram, Norton 360automatically enables QuietMode, if the Media Center TVRecording option is tur
Norton 360 automatically turnson Quiet Mode when it detects aTV program recording session ora disk-burning session. Inaddition, you can manually addth
To turn off or turn on IMAPI 2.0 Disk Burn1In the Norton 360 main window, click Settings.2In the Settings window, under Detailed Settings,click Admini
turn on Quiet Mode to the Quiet Mode Programs list.When Norton 360 detects a running instance of aprogram that you added in the list, it automatically
The product key is providedas part of the activationprocess. Be sure to save yourproduct key by creating orsigning in to your NortonAccount, or by pri
To add a program1In the Norton 360 main window, click Settings.2In the Settings window, under Detailed Settings,click Administrative Settings.3In the
5In the confirmation dialog box, click Yes.6In the Quiet Mode Programs window, click Applyand then click OK.About boot time protectionThe boot time pr
Configuring boot time protectionThe boot time protection feature provides enhancedsecurity level from the time you start your computer.As soon as you
Turning on or turning off Early Launch Anti-MalwareProtectionThe Early Launch Anti-Malware Protection featureprovides enhanced security level during t
to scan or customize the scan by adding a specificcommand. The following commands are available:NAVW32 launches helpand terminates./?Scans all drives/
Scans the specifieddrive, folder, or file[drive|folder|file]Performs Quick Scan inthe background.wNorton 360displays the scanswindow only when athreat
Scanning your computerRunning a scan at the command prompt226
This chapter includes the following topics:1 What to do if a security risk is foundWhat to do if a security risk is foundYour product provides many so
In some cases, Norton 360 might not identify an itemas a security threat, but you might suspect that theitem is infected. In such cases, you can submi
Security History also includes information aboutspyware, adware, and other security risks.Reviewing Auto-Protect notificationsAuto-Protect scans files
activation procedure. You need to log in to yourparental control software or to the Internet throughyour ISP as an administrator to change yourconfigu
3In the Show drop-down list, select the category forwhich you want to review Auto-Protect alerts.Your options are:Review Auto-Protectnotifications tha
4In the right pane, click the Options link.The option name appears as Restore & Options forfew items.If one or more security risks such as spyware
5In the Threat Detected window, select theappropriate action on the risk.The following are some of the options that areavailable in the Threat Detecte
Removes the selectedsecurity risk from thecomputer andquarantines it.This option is availablefor the security risks thatrequire your attention formanu
Sends the security risk toSymantec.In some cases, Norton360 might not identify anitem as a security threat,but you might suspectthat the item is infec
checks for the infections that have processes runningin memory. It also checks for the infections that thestart-up files and folders refer.If that doe
Responding to security issuesWhat to do if a security risk is found236
This chapter includes the following topics:1 About Norton 360 alerts and messages1 About managing messages and alerts1 Types of risks1 Types of threat
You might see messages in the following locations:Several types of Norton 360messages appear in thenotification area, at the farright of the taskbar.
Norton 360 displaysindividual status areas foreach protection feature, suchas Security, Identity, Backup,and Tuneup. The status areasshow how many iss
After you log in to your Norton Account, you canmanage your product information with the followingoptions:Saves the information for all ofthe Norton p
These risks consist of flawsin legitimate software thatcan be exploited, either tocause damage, block data, orsteal information.Vulnerabilities are us
Types of virusesA virus is a small program that is designed to alter theway your PC operates, without your knowledge orpermission.To be a virus, a pro
These viruses use thetechniques of both boot andfile infector viruses. Norton360 scans for such virusesand eliminates them.Multipartite virusesThese v
This chapter includes the following topics:1 Turning on or turning off automatic tasks1 About custom task1 About scheduling automatic tasks1 About sch
see the results of the latest Norton 360 activities thenext time you open the Norton 360 main window. Tosee a current report of Norton 360 activities,
Deletes the temporary filesthat are left behind on yourPC's hard disk after Internetbrowsing.Internet Explorer TemporaryFilesDeletes the unnecess
Norton 360 lets you choose your own combination oftasks for a one-time scan. You can run LiveUpdate,back up your data, free disk space by cleaning up
Examine your PC one or moretimes each week for securityand performance issues.You can pick the days of theweek and the time of day onwhich the scan pe
3On the Scheduling tab, under Schedule, select anoption.When you click Weekly or Monthly, you must selectthe time and day to run the automatic tasks.
Does not perform anyscheduled backups ofchanged filesIf you choose this option, youshould manually back up yourchanged files regularly.Manual Schedule
Saves your account informationand your billing details.The Profile options are:1 Account InformationYou can update your NortonAccount information andy
Doing routine tasksSpecifying Idle Time Out duration250
This chapter includes the following topics:1 About the Smart Firewall1 About Intrusion Prevention1 About Download Insight1 About Norton AntiSpam1 Abou
Cloaks the inactive portson your computer therebyproviding protectionagainst attacks throughhacking techniques suchas port scanningPort scansMonitors
3On the General Settings tab, in the Smart Firewallrow, move the On/Off switch to the right to the Offposition.4Click Apply.5In the Security Request w
To turn on Smart Firewall from the notification area4In the notification area on the taskbar, right-clickthe Norton 360 icon, and then click Enable Sm
pcAnywhere with that specific computer. It thenprocesses the original rule and prevents its use withany other computer.About Traffic rulesNorton 360 i
Permit the use of theNetBIOS name serviceand the NetBIOSdatagram service that theMicrosoft Network usesin file and printer sharing.NetBIOS is an acron
You can add a new Traffic rule on this tab. You can alsodo the following activities:You can change the settings ofa Traffic rule that does notfunction
1 Rename a program.1 Modify the rules for a program.1 Add a rule for a program.1 Modify the access settings of a program rule.1 Modify the priority of
Lets the firewall notifyyou when a programattempts to access theInternet. You can thenallow or block Internetaccess for the program.In some instances,
Norton Online Backupprovides a secure andeasy-to-use online backupsolution that safeguards yourimportant data againstsystem crash, accidentaldeleting,
To add a program to Firewall settings1In the Norton 360 main window, click Settings.2In the Settings window, under Detailed Settings,click Firewall.3O
7In the Options drop-down list, select the access levelthat you want this program to have.Your options are:Allow all access attemptsby this program.Al
3On the Program Rules tab, in the Program column,select the program that you want to change.4In the drop-down list next to the program that youwant to
6Click Apply.Adding Traffic rules and Program rulesFirewall settings automatically create most of thefirewall rules that you need. You can add custom
To use the Add Rule Wizard1Open the Add Rule Wizard by creating a Trafficrule or a Program rule.Keeping secure on the InternetAbout the Smart Firewall
2In the first panel of the AddRule Wizard, select theaction that you want for this rule. Your options are:Allow communication ofthis type.AllowFor exa
MonitorKeeping secure on the InternetAbout the Smart Firewall266
Update the Firewall –Activities category in theevent log each time thatcommunication of thistype takes place. Thisoption lets you monitorhow often thi
Security History logentry option in the AddRule Wizard or theModify Rule Wizard.3Click Next.4Select the type of connection for the rule. Youroptions a
5Click Next, and then select the computers that applyto the rule. Your options are:The rule applies to allcomputers.Any computerThis rule applies only
Creating a Norton AccountYour Norton Account stores the product key and thebilling information of your product. You can alsoregister your product with
The rule applies only tothe computers, sites, ordomains that you specify.You can specify thenames and addresses ofcomputers that apply tothe rule. The
6Click Next, and then select the protocols for therule. Your options are:The rule applies to TCP(Transmission ControlTCPProtocol)communications.The ru
The rule applies to allsupported protocols.When you select thisoption, you cannotspecify the types ofcommunications or portsthat apply to the rule.All
8Click Next.9Check Create a Security History log entry if youwant Norton 360 to create an entry in the firewallevent log.Norton 360 creates an entry w
5In the Modify Rule window, make the necessarychanges to modify any aspect of the rule.6When you have finished changing the rule, clickOK.To modify a
3On the Traffic Rules tab, select the rule that youwant to move.4Do one of the following:1 To move this rule before the rule above it, clickMove Up.1
To turn off a Traffic rule temporarily1In the Norton 360 main window, click Settings.2In the Settings window, under Detailed Settings,click Firewall.3
6In the SecurityHistory-Advanced Details window,under Actions, click Allow.Removing a firewall ruleYou can remove some of the firewall rules if necess
About Norton Firewall DiagnosisThere may be times when firewall may block thenetwork traffic that you want to allow based on itsconfiguration settings
For each case of network block, the Wizard containsthe firewall’s analysis of the cause and the possiblesolutions to fix the block.Norton 360 recommen
To create a Norton Account from the Norton AccountWeb page1In the Norton 360 main window, click Account.2In the My Account window, click Access Norton
wAutomatic Program Control configures network accessonly for the versions of programs that Symantecrecognizes as safe. Norton 360 blocks any infectedp
suspicious or vulnerable, Norton 360 assigns Poor orBad trust level.wYour computer must be connected to the Internet toaccess the latest reputation in
In the left pane of the firewall alerts, you can find thefollowing reputation information:Shows the stability rating ofthe file on your computer.The s
Shows the user prevalence ofthe file. This data is based onthe information that millionsof Norton Community Watchcustomers shared andSymantec's r
Shows the trust level of thefile.Symantec assigns thefollowing trust levels:1 Norton Trusted -Indicates the file that isNorton Trusted.1 Good - Symant
About Intrusion PreventionIntrusion Prevention scans all the network traffic thatenters and exits your computer and compares thisinformation against a
Turning off or turning on Intrusion PreventionnotificationsYou can choose whether you want to receivenotifications when Intrusion Prevention blockssus
6Click OK.7In the Intrusion Signatures window, click OK.8In the Settings window, click Apply.Excluding or including attack signatures in monitoringIn
5Click OK.Turning off or turning on AutoBlockWhen an attack is detected from a computer, the attackis automatically blocked to ensure that your comput
Unblocking AutoBlocked computersIn some cases, benign network activity can appear tobe similar to an attack and AutoBlock blocks thenetwork activity a
You can also change your Norton Account password,if required. Your computer must be connected to theInternet to access your Norton Account.wSymantec p
To permanently block a computer that has been blockedby AutoBlock1In the Norton 360 main window, click Settings.2In the Settings window, under Detaile
3On the Intrusion and Browser Protection tab, inthe Browser Protection row, do one of the following:1 To turn off Browser Protection, move the On/Offs
When a device on your network attempts to infect yourcomputer, AutoBlock stops all access requests fromthis device. If you add this device to the Intr
1 Your home network is infected.When a device on your network attempts to infect yourcomputer, AutoBlock stops all the access requests fromthis device
1 Yahoo (Browser)1 MSN Explorer (Browser, E-mail & Chat)1 QQ (Chat)1 ICQ (Chat)1 Skype (Chat)1 MSN Messenger (Chat)1 Yahoo Messenger (Chat)1 Limew
and poor. Based on the reputation levels, the files canbe broadly classified as follows:Includes the files that are eitherNorton trusted or User trust
By default, Download Insight lets you install safe files.For files of unknown reputation levels, DownloadInsight prompts you to select an action that
Turning off or turning on Download IntelligenceDownload Insight protects your computer against anyunsafe file that you may run or execute after youdow
3On the Intrusion and Browser Protection tab, inthe Download Intelligence row, move the On/Offswitch to the left to the On position.4In the Settings w
3On the Intrusion and BrowserProtection tab, underDownload Intelligence, in the Download InsightNotifications row, do one of the following:1 To receiv
Chapter 1 Getting Started ... ... . ... . ... . ... 7About Norton 360 ... ... ... . ... . ... 7Activation pr
About Norton ManagementNorton Management lets you manage all of your Nortonproducts and Norton product keys from one location.You can add your devices
You can use the following options to configureDownload Insight Full Report:When you set the DownloadInsight Full Report option toAlways, Download Insi
When you set the DownloadInsight Full Report option toUnproven Only, DownloadInsight prompts you to select asuitable action for unknown filesonly. In
When you set the DownloadInsight Full Report option toNever, Download Insight doesnot prompt you to select asuitable action for any type offile that y
4In the Settings window, click Apply, and then clickClose.Turning on or turning off Alert on Poor StabilityWhen you turn on the Alert on Poor Stabilit
email into the Inbox folder and spam email into theJunk folder or the Norton AntiSpam folder.Norton AntiSpam uses Symantec enterprise-class,spam-filte
the addresses from your Outlook address book orWindows address book, it also imports the addressesthat are available in the Safe Sender and the Blocke
1 Uses a user-defined address listto expedite the scanning of email.1 Accepts all email messages fromsenders in the Allowed List.1 Treats all email me
the Norton AntiSpam drop-down list or the options toclassify the email messages as spam or legitimate. Youcan also use these options to empty the spam
the initial client integration. It helps you keep your listof allowed and blocked email senders in sync with yourcurrent address books. When Norton An
You can use the following options:Marks the selected email as spam and movesthe email message into the Junk folder or theNorton AntiSpam folder.When y
Accessing Norton Management on WindowsYou can access Norton Management in one of thefollowing ways:1 Using a Web browser on any computer.1 From the ma
Displays the Norton AntiSpam settings sectionof the Norton 360 Settings windowOpenNortonAntiSpamSetting Address Book ExclusionsWhen you add an email a
7Click OK to save and close the Address BookExclusions window.To edit or delete entries in the Address Book Exclusionslist1In the Norton 360 main wind
2In the Settings window, under Detailed Settings,click AntiSpam.3On the Filter tab, in the Allowed List row, clickConfigure.4In the Allowed List windo
3On the Filter tab, in the Allowed List row, clickConfigure.4In the Allowed List window, select the item thatyou want to edit or delete.5Do one of the
4In the Allowed List window, click Import.5In the Allowed List window, click Apply.6Click OK.To add entries to the Blocked List1In the Norton 360 main
5Do one of the following:1 To edit an entry, click Edit to open the EditEmail Address dialog box, edit the details, andthen click OK.1 To delete an en
3On the ClientIntegration tab, in the Feedback row,select any one from the following three options:Automatically sends themisclassified email message
approach to filter spam email messages from legitimateemail messages.The email messages that you receive in your emailprogram undergo scanning through
Norton AntiSpam then sends the email message to youremail program. Based on predefined email rules, theemail program then moves the email message to t
numbers for your email program. If the SMTP and POP3port numbers for your email program are differentfrom the default port numbers, you must configure
To access Norton Management from the Windowsnotification area1Go to the Windows device on which NortonManagement is installed.2In the notification are
5In the AddPort toprotect window, in the Port Typedrop-down list, do one of the following:1 To add the incoming email port, click POP3.1 To add the ou
plan, you can set up NoLimit policy so that Norton 360connects to Symantec servers to ensure completeprotection. However, if you think that Norton 360
Turning off or turning on Network Cost AwarenessYou can set up policies to restrict the Internet usageof Norton 360. If you do not want to restrict th
The Network Cost Awareness Settings window listsall the network connections that your computer usesto connect to the Internet. You can view the status
6Select one of the following:1 AutoAllows Norton 360 to receive all product andvirus definition updates based on the Windows8 cost awareness policy. B
This chapter includes the following topics:1 About securing your sensitive dataAbout securing your sensitive dataThe Internet provides the fastest and
window. The Norton Safe Web feature provides you asafe search environment in the Web by displaying thesite rating icons next to every search result.Wh
In addition, the Norton Site Safety pop-up windowincludes information about Symantec AuthenticatedWeb sites. Web site hackers often mimic company Webs
the security level of all the Web sites that you visit anddisplays the results in the Norton Site Safety pop-upwindow. Antiphishing also blocks naviga
To report an incorrect evaluation of a suspicious Website1Open your browser and go to the Web site that youthink is suspicious.2On the Norton Toolbar,
5In the confirmation window, click Yes to confirmthat you are already on the device you want tomanage.6In the window that appears, click Save File and
wThe Community Buzz option is available only inEnglish-language versions of Windows.For each Web site that you want to know the site safetystatus, Nor
Norton Safe Web provides the following Web site safetystates when you browse through the Internet:You can see Norton Secured iconnext to the search re
You can see a red cross (x) iconnext to the search results.When you visit a Web site withthis status, you can see a similarstatus icon on the NortonTo
Norton Safe Web does not havesufficient information about thisWeb site to provide a shoppingsafety rating.UntestedNorton Safe Web has analyzedthis Web
let other Facebook users know about the security statusof any Web site.To scan your Facebook Wall using Norton Safe Web,use the ScanFacebookWall optio
Searching the Web using Norton Safe SearchNorton Safe Search enhances your Web searchexperience. When you search the Internet using NortonSafe Search,
Norton Safe Search enables youto erase all the data that arerelated to your search activitiesfrom the Ask.com server. ThePrivacy Safeguard feature ofN
Turning off or turning on Scam InsightScam Insight prevents you from divulging yoursensitive information such as Social Security Numbersor credit card
The following features in Identity Safe provide securestorage of your sensitive information:Stores login information, suchas your login credentials fo
Norton 360 adds the Norton Toolbar to the InternetExplorer, Firefox, or Chrome Web browsers. TheNorton Toolbar has the following components:1 Norton m
4If you are prompted to provide your email address,in the Email Address box, type the email addressthat you use to log on to your Norton Account, andt
1 Personal information such as your address, date ofbirth, passport number, and social security number.1 Credit card details including card number and
Identity Safe to manage your personal data such asaddresses, date of birth and credit card information.The logins, cards, and notes help you store and
save in one Windows user account from anotherWindows user account. This way Identity Safe protectsyour sensitive data from misuse by multiple users of
1 Reset your Identity Safe.About creating Identity Safe vaultsIdentity Safe helps you manage your sensitiveinformation and provide additional security
In addition to the local vault on your Windows useraccount, you can save your Identity Safe data in onlinevault. The Identity Safe data is stored onli
Signing in to Norton AccountIdentity Safe lets you create a local vault and an onlinevault to save your Identity Safe data. You must log into your Nor
The following are the benefits of moving your IdentitySafe data online:1 Lets you access your Identity Safe data from anycomputer.wYour computer must
passwords, and credit card details. You can sync youridentity safe data in the local vault into the online vault.When you save your data in online vau
10In the Merge Identity Safe Data Online window,click Merge.Deleting local vault and online vaultIdentity Safe lets you create a local vault and an on
To merge the Identity Safe data from portable profileto local vault or online vault1On the Norton Toolbar, in the Identity Safe menu,click Merge Porta
About the supported devicesTo install and use Norton 360, your device must meetthe following minimum system requirements:Hardware requirementWindows1
3Set up Identity Safe.4In the Identity Safe Setup Successful window, doone of the following:1 Check Importmy logins from Internet Explorerto import al
4In the Enter the Password box, type your IdentitySafe password.If you forget your password, Identity Safe lets youenter wrong password three times. I
wYou must be logged in to Identity Safe to access theIdentity Safe features. The Identity Safe features aresupported only in the Internet Explorer, Fi
Identity Safe automatically logs you out of the currentvault, when you are logged in to your local vault oronline vault and click Identity Safe Setup
To configure Identity Safe settings1In the Norton 360 main window, click Identity, andthen click Manage Identity Protection.Securing your sensitive da
2Under Identity Safe, identify the feature that youwant to use, and click Configure. Your options are:Lets you set up Identity Safevault.Identity Safe
Lets you configure the way youwant Identity Safe to collect,store, and display the logininformation for the Web pagesyou visit.You can configure Ident
Lets you manage your personalinformation such as name, dateof birth, email address, andcredit card information in oneplace.You can use the information
Lets you store and managesensitive information.You can save social securitynumber, driver's license number,insurance policy number, andpassport n
Lets you move your Identity Safedata that you stored in your localvault to online vault.wWhen you sync yourIdentity Safe data from localvault to onlin
Service Pack 1 and232-bit and 64-bitversions1 MicrosoftWindows VistaHome Basic1 MicrosoftWindows VistaHome Premium1 MicrosoftWindows VistaUltimate1 Mi
1 Lets you quickly launch the Web site login page1 Fills in your login automatically when you revisitWeb pages1 Lets you manually add logins1 Lets you
appears on the top left corner of the Login Assistantwindow.Identity Safe automatically detects login fields whichare not auto filled or filled incorr
To save a login1Go to the Web site for which you want to save yourlogin.2Type your login details, and then click the optionor link that logs you in.No
1 Displays the login ID and lets you show or hide thepassword.1 Displays the strength of the password for each ofthe logins.1 Lets you quickly launch
6In the Username dialog box, in the Enter newusername box, type the user name of the login, andthen, click OK.7In the Information dialog box, click OK
To delete a login or a folder1In the Norton 360 main window, click Identity, andthen click Manage Identity Protection.2Under Identity Safe, in the Edi
Ensure that the URL you change belongs to thesame domain as the current URL.1 View the details of the date and time when you lastmade to the Edit Logi
Changing the user name and passwordIdentity Safe lets you change the user name andpassword for the logins that you have saved in the EditLogins window
5In the Validate Password for Identity Safe windowdo the following:1 In the Enter the Password box, type yourIdentity Safe password.1 Click Validate.6
You can use the information that you store in the cardsto do the following:1 Automatically fill forms1 Provide sensitive information without having to
Supported Norton productsTo use all the features of Norton 360, you must use thefollowing versions of Norton security product:If you use an older vers
You can also copy and edit the required fields from theselected card in the Login Assistant window. Bydefault, the important data such as Passwords, C
4Use the following tabs to type your card details:Provide details such as cardname, name, gender, and dateof birth. You can set a passwordand provide
You can view a summary of the card that you created.You can select any of the cards that are present in thelist of cards at the left pane of the Edit
3In the Edit Identity Cards window, select the cardthat you want to delete.4Click Delete Card.5In the Warning dialog box, click Yes.6Click Close.To du
identity numbers that you use when you browse theWeb. The Edit Notes option in Identity Safe stores allyour sensitive IDs in a very secure way and let
4Click Edit Notes, and modify the information underDetails.You can change the category, modify the title, andedit the additional information that you
1 Merge the imported data in to the vault that youare currently logged in.1 Replace the existing Identity Safe data that youstored in your vault that
Importing your Identity Safe dataYou can import your Identity Safe data from the filethat you previously backed up. You can also import theIdentity Sa
3In the Import Identity Safe Data window, underImport my data from, select one of the followingoptions:1 Portable Profile (Drive: Drive:\)This option
You can configure the following options in theBrowsing Options window:Configures Identity Safe todisplay your logins each timeyou visit a Web site tha
1 Any Web site URL that your product identifies asfraudulent1 All the Web site URLs that you visited before thedetection of a risk1 The applications a
About Password & SecurityYou can use Password & Security to change yourIdentity Safe password. You can also use this option toset the level of
Password Security381Securing your sensitive dataAbout securing your sensitive data
Specify the Identity Safepassword security level.Identity Safe provides fourlevels of security to protectyour Identity Safe password.Choose one of the
period. You can specifythe idle time-out periodas 15, 30, or 45 minutes.Use this option if otherpeople have access toyour computer.1 Ask for my passwo
the password by using the Password & Security optionin Settings window.If you want to change the Identity Safe password ofyour online vault, the p
You have the following options in the NortonToolbar:Lets you access IdentityProtection and other settings.The following options areavailable in the No
Lets you access the Identity Safedata stored in your online vault.You can add, edit or delete yourLogins, Cards, and Notes underthis section.You can u
Lets you view the logins andcards that you have saved inIdentity Safe.Some Web sites have forms tofill or require login information.You can use the Va
In Google Chrome Web browser, the Norton Toolbarcan be accessed as a Chrome Extension. In theExtensions page of the Chrome browser, you can enableor d
When you hide the toolbar, Norton 360 does not displaythe Norton Site Safety pop-up window. However,Norton 360 notifies you about suspicious andfraudu
option in the Administrative Settings window. Youcan also review the data, which Norton CommunityWatch collects and submits to Symantec, in theSecurit
2In the main menu that appears, click Tools >Extensions.3Under Extensions page, click Show button option.Accessing Identity Safe settings from the
2On the NortonToolbar, in the Norton menu, selectone of the following:Lets you report to Symantecabout the current Antiphishingevaluation.Report SiteL
Lets you turn on the Norton SafeWeb feature which provides asafe online browsing experience.The following are the uniquefeatures of Norton Safe Web:1
Accessing the Vault Open/Vault Closed menuThe Vault Open/Vault Closed menu on the NortonToolbar lets you view and manage the logins, Identitycards, an
2On the Norton Toolbar, in the Vault Open/VaultClosed menu, select one of the following:Lets you merge the IdentitySafe data from your portableMerge P
Settings395Securing your sensitive dataAbout securing your sensitive data
Lets you view the variousoptions that are available inIdentity Safe.The options are:1 Edit LoginsLets you open the EditLogins window.1 Edit Identity C
autofill the logininformation in the currentWeb page.Lets you open the NortonFeedback Web site.You can submit feedback onyour experience with Identity
Securing your sensitive dataAbout securing your sensitive data398
This chapter includes the following topics:1 About the Network Security MapAbout the Network Security MapA home network typically consists of the comp
Chapter 4 Scanning your computer ... . ... . 163About the Norton 360 scans ... . ... . ... 163About Computer Scan ... ...
computer. Your computer might be infected with avirus if you experience any of the following symptoms:1 You cannot install Norton 360.1 You cannot sta
1 Subscription status and Norton product version ofthe computers that are connected to your network1 Status of your wireless network connection1 Conne
wNorton 360 requires you to configure the SymantecSecurity Driver to open the Network Security Map. Youcannot install the Symantec Security Driver whe
To view the details of a device on the Network SecurityMapProtecting your home networkAbout the Network Security Map402
4In the NetworkSecurityMap window, click a deviceicon.You can use the scroll arrows to view the devicesthat are listed in the network map.The device d
Shows the category to which thedevice belongsThe device category iconprovides details on theconnection status and securitystatus. Norton 360 labels al
Shows the access level that isgranted to a remote device toconnect to your computerThe initial trust level is set basedon the configuration of yourcom
You can click each of the features and read thesummary to learn more about using Network SecurityMap to manage your home network. By default, theNetwo
wEnsure that the computers that you want to remotelymonitor have a version of a Norton product thatsupports Remote Monitoring.Norton 360 requires a Pa
Turning off Remote MonitoringWhen you turn off Remote Monitoring, you stop remotemonitoring of the computers that are connected toyour network.You can
You can add the following details when you add adevice:1 The name or description1 The IP address or physical addressThe Network Security Map finds any
Programs containingmalicious codes that aredisguised as or hiding insomething benign, such as agame or utility.Trojan horsesTools that are used by aha
6In the IP or Physical Address box, type the IPaddress or physical address of the device that youwant to add to the Network Security Map.You can use t
To find the IP address by using ipconfig on WindowsVista1On the computer you want to identify, on theWindows taskbar, click Start.2In the Start Search
help you identify the devices that are listed in thenetwork map.To edit the details of the device that is on your network1In the Norton 360 main windo
To edit the name of the device that you added manually1In the Norton 360 main window, click Settings.2In the Settings window, under Detailed Settings,
network. The initial network trust level is set based onthe configuration of your computer.wEnsure that you change the trust level of a device toFull
To change the trust level of your network1In the Norton 360 main window, click Settings.2In the Settings window, under Detailed Settings,click My Netw
6To select a trust level for a network, in the EditNetwork Trust Level window, click one of thefollowing:Adds the network to the TrustedlistFULL TRUST
Adds the network to theRestricted listThe devices that are onRestricted network cannotcommunicate with yourcomputer. However, you can stilluse the net
6To select a trust level for a device, in the EditDeviceTrust Level window, click one of the following:Adds a device to the Full TrustlistFull Trust d
computer increases the scan time which slows downthe network speed of your computer.If you know that a specific device on your network issafe, you can
Programs that track systemactivity, gather systeminformation, or track userhabits, and relay thisinformation to third-partyorganizations. Theinformati
5In the Network Security Map window, do one ofthe following:1 To edit the trust level of a device that is on yournetwork, in the network map, click th
When you remove an individual device, the onlinedevices appear again the next time you open theNetwork Security Map. However, Norton 360permanently re
For more information on how to secure your wirelessnetwork, on the left side of the Network Security Mapwindow, click the Why is it not secure link. F
To view the device details1In the Norton 360 main window, click Settings.2In the Settings window, under Detailed Settings,click My Network.3In the Net
2In the Settings window, under Detailed Settings,click My Network.3In the Communication Port box, type a newcommunication port number.You must use the
This chapter includes the following topics:1 About Tuneup1 About disk and file fragmentation1 Optimizing your permanent disks manually1 About using op
Tuneup detects and fixes common computer problems,cleans up unwanted cookies and files, and defragmentsthe hard disk to optimize PC performance.About
wYou can run Disk optimization only when disk has morethan 15 percent of free space.Some programs, such as movie-editing programs orprograms that requ
Norton 360 automaticallyoptimizes the hard disk asneeded. You can also set aschedule for optimization.Set a schedule foroptimizationLarge files are of
When you browse a Webpage, your browserdownloads the text andgraphics that comprise thecontents of the page. Whenyou finish viewing the page,the brows
You can download Norton Bootable Recovery ToolWizard in one of the following ways:1 From the Start menu.1 From the Norton Support Web site.To download
2When the activity is complete, in the Tuneupwindow, click Close.Running Registry CleanupThe Windows registry can contain the entries that referto fil
About Startup ManagerSome programs are configured to launch during startupof your computer. The number of startup itemsincreases as you install new ap
program and measure the performance of yourcomputer the next time you start your computer.Norton 360 delays the start of the delayed programsby five m
To disable startup items1In the Norton 360 main window, click Tuneup, andthen click Run Startup Manager.2In the On/Off column, uncheck a program that
To run delayed startup items manually1In the Norton 360 main window, click Tuneup, andthen click Run Startup Manager.2In the Startup Manager window, c
This chapter includes the following topics:1 About Norton Backup and Restore1 About backups1 About backup preparation1 About backup set1 Backing up yo
About backupsOne of the most important ways to protect the valuableinformation on your PC is to back up your filesregularly. In case you lose your dat
No matter which backup method you choose, you canalways add or remove items from the set of files thatyou select to back up. You can add or remove ani
You can choose from a varietyof file types, such as photos,documents, and music. Youcan also specify individualfiles.You have the followingoptions:1 S
Where439Protecting your media and dataAbout backup preparation
About locating your Norton Product Key or activationPINTo use Norton Bootable Recovery Tool, you must startthe computer from any of the following reco
You can choose any storagelocation that Norton 360offers for your backuplocation, depending on yourPC and the connecteddevices.You can choose to store
available in the Settingswindow.You can have Norton 360back up your files when yourcomputer is idle. You can alsoset a regular backup scheduleor manua
you can create a backup set to back up your picturefiles and music files to a CD. You can also createanother backup set to back up your Microsoft Offi
set to back up your pictures to your local fixed disk.You can create another backup set to back up yourvideos to a CD. You can also configure differen
name does not describe the backup set after you modifythe configuration.wThe maximum character length of a backup set nameis 32 alphanumeric character
sorts them into various categories. It then backs up thefiles that fall into these categories.Norton 360 uses the following file categories:This categ
This category includes, but isnot limited to: MPEG AudioStream, Layer III files (.mp3);MPEG-4 Video files (.mp4);MPEG-4 Audio Layer files(.m4a); Apple
This category includes, but isnot limited to: MicrosoftMoney files (.mny, .mn1,.mn2, .mn3, .mn4, .mn5,.mn6, .mn7, .mn8, .mn9,.mn10, .mn11, .mn12, .mn1
This category includes, but isnot limited to: MicrosoftWindows Media files (.wmv);Apple QuickTime Video Clipfiles (.mov); MPEG 1 SystemStream files (.
This category includes, but isnot limited to: MicrosoftWord documents andtemplates (doc, .dot);Microsoft Excel Worksheetand templates (.xls, .xlt,.xla
1 If you received your Norton product preinstalledby the computer manufacturer, the Product Key isavailable on your Norton Account. When you areprompt
This category includes, but isnot limited to: MicrosoftOutlook Address Book files(.wab); Microsoft PersonalAddress Book files (.pab);Palm Address Book
.fm file extension in the Office Documents category,you can add the .fm file extension to the category.The Edit File Type option on the What tab of th
with the file extension that you added and backs themup to that file category. For example, if you want toback up the documents with a .fm file extens
Removing a file extension from a backup categoryEach backup file category contains a list of fileextensions. However, you can remove a default fileext
4In the window that appears, click Reset Defaults.5Click Save.Deleting previously backed up filesYou can delete the files that you backed up previousl
2On the Summary tab, in the Backup set namedrop-down list, select the backup set that you wantto delete.3Under Things you can do, click Delete backup
Adding files and folders to a backup setYou are not limited to backing up the files that Norton360 automatically detects and places into its filecateg
4In the file selection window that appears, navigateto file that you want to add, click to select it, andthen click Open.5Click OK.6In the Manage Back
You can exclude a file or folder from the backup setfrom Windows Explorer by using the shortcut menu.The shortcut menu is available after you configur
6In the Manage Backup Sets window, click SaveSettings to save the settings.To exclude a file or folder from a backup set in WindowsExplorer1In Windows
Creating Norton Bootable Recovery Tool on a CD orDVDNorton Bootable Recovery Tool is integrated withWindows Preinstallation Environment (WinPE).Theref
following table to choose a location that best meetsyour needs for safety, speed, and storage capacity:Your subscription to Norton 360comes with an al
This choice backs your files upto a special folder on drive C ofyour PC. Backing up to drive C isvery quick and convenient, andis only limited to the
CD, DVD, or Blu-ray discsProtecting your media and dataAbout backup set462
This choice requires that youhave recordable CDs, DVDs, orBlu-ray discs and an optical drivein your PC to record on thosediscs. You must be present to
location for the first time, Norton360 prompts you to configurethe optical backup drive on yourcomputer. Norton 360 lets youinstall the optical driver
Flash drives and the other datastorage devices that areattached to your PC can alsoserve as backup locations.Norton 360 displays suchdevices as extern
3On the Where tab, select the location and devicewhere you want your backups to be stored.If the device or location does not appear on the list,click
Viewing or changing a backup scheduleNorton 360 lets you schedule backups when it isconvenient for you. You can schedule your backups torun late at ni
Choose this option to haveNorton 360 backup your filesonly when you start thebackup yourself.Manual ScheduleYour computer's performance is maximi
To delete a backup set1In the Norton 360 main window, click Backup, andthen click Manage Backup Sets.2On the Summary tab, in the Backup set namedrop-d
Creating Norton Bootable Recovery Tool ISO fileYou can create a Norton Bootable Recovery Tool ISOfile on your computer. You can burn this ISO file to
Whether you have set Norton 360 to back up your PCautomatically or not, you can always run a backup. Forexample, you have added or modified important
When you restore files, you can change any of thefollowing settings:You can choose any of thebackup sets to restore thefiles.If you backed up your dat
You can restore to theoriginal locations of the files,or navigate to a new locationwhere you can restore yourfiles. Norton 360 displays thetotal numbe
Choosing where to restore files fromWhen Norton 360 restores files, it displays the backuplocation of the most recent backup set you ran. Youcan chang
Selecting files to restoreWhen you restore backed-up files with Norton 360, youmight not need to restore all the files from a backup.You can restore t
You can use any of the following methods, and you cancombine methods, to select files to restore:You can restore all thebacked-up files withoutexcludi
2Under Files, in the Search text box, type all or partof a file name, or the extension of the file.3Click Search.The window that appears displays the
wRestoring files to their original locations deletes newerversions of the same files that are stored in thoselocations. If you do not want to replace
When you insert an optical disc that contains thebacked-up files, the Autorun Restore featureautomatically opens the Portable Restore window.wIf you d
To restore files using Norton 360 Autorun Restore1Insert an optical disc that contains the backed-upfiles.2Click the ARestore icon to launch the Autor
To create Norton Bootable Recovery Tool on a USB key1Insert the USB key into the USB port of yourcomputer.2In the Norton Bootable RecoveryTool Wizard
destinations where your files are backed up. Eachbackup destination contains the backup sets to whichthe backup destination is configured.Norton Backu
Viewing backup files on the Norton Backup DriveYou can use the Norton Backup Drive to view the filesthat are backed up. You can view the Norton Backup
2Select the backup destination, and navigate to thebackup set destination that contains the file thatyou backed up.3Do one of the following:1 Right-cl
About solutions to the backup problemsThe following table provides some tips to help youavoid backup problems.The following tips apply to allbackups:1
The following tips apply tobackups to CDs or DVDs:1 Have extra discs on handwhen you back up. Thistip helps you to avoidoccasional disc flaws orsituat
The following tips apply tobackups to external drives:1 Some drives use olderWindows file systems,such as FAT-16 or FAT-32that cannot store fileslarge
The following tips apply tobackups to online storage:1 Make sure that your PCdoes not automaticallydisconnect from theInternet when it is not inuse.1
and search the Symantec Knowledge Base for solutionsto your problem.To get additional help with backup problems1In the Norton 360 main window, click S
Although online backup is convenient and safe, beforechoosing it for your backup method, consider thefollowing limitations:Speed limitationsProtecting
The amount of time that it takesto transfer your backup to theSecure Online Storage dependson the speed of your Internetconnection. If you have manyfi
If you have a valid Norton product key or activationPIN, you can go to your Norton Account and access theNorton Bootable Recovery Tool download link.T
up your smaller files, such asyour financial documents andword-processing documents.If a backup is in progress, youshould leave your computerturned on
1 The amount of online storage space that is availableto youYour product needs to be activated to use the onlinebackup feature. The first time you con
storage does not contain sufficient space for thebackup, Norton 360 notifies you and provides you anoption to buy more space.You do not have to wait u
all automatic backup of files. You can use the RunBackup Now option in the main window if you want toback up your files from all the backup sets.You c
Turning off or turning on backup settingoptionsNorton 360 provides you various options to manageyour backup settings. Norton 360 backup settings letyo
Indicates that the file has beenexcluded from backupNorton 360 displays a disabledbackup status on a file when youexclude the file from any of theback
3In the Backup Settings window, do one of thefollowing:1 To turn off icon overlays, in the Backup StatusOverlays row, move the On/Off switch to therig
This chapter includes the following topics:1 About Norton 360 Settings1 Customizing Norton 360 Settings1 Turning on or turning off Quick Controls serv
You can configure the following Detailed Settings inthe Settings window:Specify how certain types ofviruses and spyware, as well asother threats, are
View all the devices available inyour network and specify thetrust level of the devices that areconnected to your network.You can hide or show theNetw
About Download Insight .. . ... ... ... 293About Norton AntiSpam . . ... . ... ... 303About configuring POP3 and SMTPpor
Norton Bootable Recovery Tool automaticallydownloads the latest virus definitions from Symantecservers and uses these virus definitions to secure your
Configure Identity Safe to secureyour online identities andtransaction data.You can also configure SafeSurfing options.Identity ProtectionSpecify when
The Quick Controls in the Settings window let youturn on or turn off the following services:Turns on or turns off Silent ModeYou can turn on Silent Mo
Turns on or turns off SmartFirewallWhen you turn on SmartFirewall, it monitorscommunications between yourcomputer and the othercomputers on the Intern
provides the slider setting for you to decide whetherto resolve security threats automatically or ask youbefore it takes an action.1 You can configure
1 Safe Surfing1 Identity Safe1 Backup1 Backup Status Overlays1 Automatic LiveUpdate1 Smart Firewall1 Norton Tamper ProtectionYou should leave all of t
You can use the following Antivirus settings:The Automatic Protectionsettings let you control thescanning and monitoring of yourcomputer.It protects y
Scans and RisksCustomizing settingsAbout Antivirus settings506
Scans and Risks settings let youcustomize the scans that Norton360 performs on your computer.You can use the following Scansand Risks options:1 Comput
Norton 360 to protect theports.1 Email Antivirus ScanEmail Antivirus Scan protectsyou from the threats that aresent or received in emailattachments.Th
1 Exclusions / Low RisksExclusions options specifythe items such as folders,files, and drives that youexclude from Norton 360scans. Scans, signatures,
4Read the Norton License Agreement, type yourProduct Key, and then click I Agree.If you use a non-QWERTY keyboard, use the VirtualKeyboard option to e
Antispyware protects yourcomputer against the securityrisks that can compromise yourpersonal information andprivacy.Norton 360 protects yourcomputer f
About Automatic Protection settingsThe Boot Time Protection option on the AutomaticProtection tab provides an enhanced security levelfrom the time you
You can use the following Real Time Protectionoptions:Auto-ProtectCustomizing settingsAbout Antivirus settings512
Auto-Protect loads intomemory and providesconstant protection while youwork. It checks for virusesand other security risks everytime that you run prog
boot virus infects yourremovable media, ensurethat Auto-Protect isturned on to rescan theremovable media. Youthen insert the removablemedia and open i
SONAR Protection515Customizing settingsAbout Antivirus settings
Symantec Online Network forAdvanced Response (SONAR)provides the real-timeprotection against threatsand proactively detectsunknown security risks onyo
360 to automaticallyremove low-certaintythreats if it does not getany response from youwhen SONAR AdvancedMode option is enabled.1 Show SONAR BlockNot
You can use the following Scans and Risks settings:Computer ScansCustomizing settingsAbout Antivirus settings518
Norton 360 lets you run differenttypes of scans to detect andprevent any virus infection onyour computer. The scans areQuick Scan, Full System Scan,an
To update Norton Bootable Recovery Tool virusdefinitions on a USB key1Insert your Norton Bootable Recovery Tool USB keyinto the USB port of your compu
Scans for rootkits and othersecurity risks that might behidden on your computer.1 Network Drives ScanScans the network drivesthat are connected to you
1 Full System ScanScans your computer whenit is idle.When your computer is idle,Norton 360 runs a FullSystem Scan. After the scanis complete, you can
The Scan Performance Profilessettings let you configure howNorton 360 should scan yourcomputer based on the digitalsignature and trust level of thefil
Protected Ports settings protectthe POP3 and SMTP ports ofyour email program.You can use this option tomanually configure your POP3and SMTP email port
Exclusion / Low RisksCustomizing settingsAbout Antivirus settings524
Exclusions options specify theitems such as folders, files, anddrives that you exclude fromNorton 360 scans. Scans,signatures, and low-risk itemsare s
also remove items from theexcluded-items list.1 Signatures to Exclude fromAll DetectionsLets you select known risksby name and remove a riskname from
The Insight Network scan usesthe Cloud technology wherein aremote server on the Webcontains the latest virusdefinitions. Norton 360 scansyour computer
UpdatesCustomizing settingsAbout Antivirus settings528
Norton 360 protects yourcomputer from vulnerabilitiesthrough the latest program anddefinition updates. Definitionupdates contain the informationthat l
2In the page that appears, click Download NortonPower Eraser.3Save the NPE.exe file to your Desktop.4Double-click the NPE.exe file on your Desktop.5Re
Definitions are a subset ofvirus definitions.1 Apply updates only onrebootLets you choose how theprogram updates obtainedby Automatic LiveUpdateneed t
The following tabs are available in the Firewall settingswindow:Lets you activate the generalfirewall features andcustomize the ports that yourcompute
Prevents intrusion attemptsand protects your Webbrowser from attacks bymalicious Web sitesYou can use the DownloadIntelligence option that isavailable
Lets you activate theadvanced protection featuresof Smart FirewallThe advanced settings let youturn on or turn off theAutomatic Program Controlfeature
About Firewall General settingsSmart Firewall General settings let you activate thegeneral firewall features and customize the ports thatyour computer
Automatically allows the Internettraffic that matches theconnections that an applicationopens.Check this option to do thefollowing:1 Analyze the netwo
to date. If you do not use Automatic LiveUpdate, youshould run LiveUpdate once a week.Norton 360 also provides the Web Browser Protectionfeature to pr
when Automatic Program Control is set to Aggressiveor Automatic. You can use this option to specify howNorton 360 must control any network traffic tha
triggers the allowed event is added to the trusted listof its corresponding category in Advanced EventsMonitoring. You can remove the application from
Monitors the Trojan horses andother malicious programs thatbypass network traffic.These programs penetrate theWindows TCP/IP layer to sendand receive
Automatic updates require an Internet connection. Ifyou use a proxy server to connect to the Internet, youmust configure the proxy settings in your pr
Norton AntiSpam settings help you configure thefollowing:1 The email client with which Norton AntiSpamshould integrate1 The list of allowed email send
The options on the ClientIntegration tab let you integrateNorton AntiSpam with youremail clients to keep you freefrom unsolicited emailmessages. You c
Lets you check the SymantecWeb servers to filter the spamemail messages which the localfilters classify as legitimate.Web QueryLets you configure your
Norton 360 supports NortonAntiSpam integration with theaddress books of email clientsfrom which you want NortonAntiSpam to import emailaddresses.You c
You can use the Configure option in the NetworkSecurity Map row to access Network Security Mapwindow. The Network Security Map window providesa pictor
Removes all of the devices that arelisted in Network Map.You can purge Network Map if youwant to create a new list of devices.For example, you can pur
Shows the communication port thatNorton products use to communicatewith each other over the network.If you change the communicationport number on your
1 Select the files that are required to be backed up.1 Choose the location to store the backed up files.1 Assign a schedule to run a backup.In additio
Lets you view the backup statusof a file by adding the statusoverlay to the file’s iconThe status overlays that appearsare:1 Green icon with a check m
Lets you add or exclude a file ora folder to a backup set by usingthe right-click shortcut menuYou can use this option after youconfigure Backup in th
wLiveUpdate does not download the latest definitionupdates and program updates, if the Network CostAwareness option in the Settings window is set to N
Lets you specify the amount oflocal disk space that you want toreserve.When you perform an onlinebackup, Norton 360 creates atemporary file in your lo
Antiphishing tells you the following things about theWeb pages that you visit:1 If it is safe to enter confidential information1 If the Web page is kn
log in to Identity Safe. The password protects you byrestricting unauthorized access to your data in IdentitySafe.The Identity Safe feature provides y
AdviceDescriptionFeatureYou can use theinformation thatyou store in thecards to do thefollowing:1 Automaticallyfill forms1 Providesensitiveinformation
AdviceDescriptionFeatureIt becomesdifficult tomanage variousidentitynumbers. EditNotes stores allof your sensitiveIDs in a verysecure way andlets you
Task Scheduling includes the following settings:Lets you specify the tasks thatshould run in the backgroundautomatically when yourcomputer is idleThes
SchedulingCustomizing settingsAbout Task Scheduling settings556
Lets you schedule PC Securityand PC Tuneup related activitiesYou can specify how oftenNorton 360 should scan yoursystem for security andperformance is
idle when there is no detectablemouse or keyboard activity for aperiod that you specify as idletimeout duration. When youschedule your scans weekly or
Lets you view how Norton 360has protected you for the past30 days.This report includes theactivities that Norton 360performed to protect yourcomputer.
The type of definition updates that each of theSymantec products receive are as follows:Users of these productsreceive the latest virusdefinitions fro
Lets you specify the automaticconfiguration details, proxysettings, and the authenticationdetails to connect to theInternet.Programs such as LiveUpdat
Lets you submit selectedsecurity and application data toSymantec for analysis.Norton Community Watchprotects you against newpotential risks. It collec
Lets you remotely view yourdevice’s security status and fixsome security issues by usingNorton Management, NortonOne, and Norton Studio. NortonStudio
Performance Monitoring563Customizing settingsAbout Administrative Settings
Lets you monitor theperformance of your computer.When the PerformanceMonitoring option is turned on,Norton 360 monitors the CPUusage and memory usage
Norton 360 saves the eventin the Security History logbut does not alert you withthe notifications. You canalso turn off this option ifyou do not want
1 Use Low Resource Profile OnBattery PowerLets you configure Norton360 to change the resourcethreshold to low profile whenyour computer runs onbattery
1 High-Usage Alert for:2 CPUWhen this option isturned on, Norton 360detects and notifies youabout the increasedusage of the CPUresource by any program
1 Program ExclusionsLets you select specificprograms to exclude fromappearing in performancealerts.You can use the Configureoption to list the program
Lets you secure the product andprotect it from unauthorizedchanges.You have the following options:1 Non-Admins Access toSettingsLets you access andcon
Users of these productsreceive the latest virusdefinitions fromSymantec that protectsyour computer from alltypes of security threats.In addition, user
Silent Mode SettingsCustomizing settingsAbout Administrative Settings570
Lets you turn on or turn offSilent Mode.You have the following options:1 Silent ModeWhen you turn on the SilentMode option, you enableSilent Mode for
When you use a MediaCenter application torecord a TV program,Norton 360 detects theactivity, andautomatically turns onQuiet Mode. When QuietMode is tu
Lets you delay the automaticrunning of Norton-specificbackground tasks when youresume your computer fromhibernate mode or standbymode.Automatic Resume
Lets your PC run smoothly andefficiently by deleting theunused temporary files andbrowsing history if you useFirefox Web browser.Norton 360 automatica
If you want to temporarily turn off Norton ProductTamper Protection, you can turn it off for a specifiedduration.wYou cannot run System Restore on you
To turn on Norton Product Tamper Protection1In the Norton 360 main window, click Settings.2In the Settings window, under Detailed Settings,click Admin
You can turn off the Settings Password Protectionoption if you no longer require password protectionfor your Norton 360 Settings.Securing your Norton
Turning off Norton 360 Settings passwordYou can protect your Norton 360 Settings with apassword using the Settings Password Protectionoption. If the S
wThe reset settings password option appears in theSelect Uninstall Preference window only if theSettings Password Protection option is turned on. Tous
Contains the most importantvirus definitions that arerequired for latest securitythreats as viewed by Symantec.The Core Set is a subset of theComplete
About Remote ManagementThe Remote Management feature lets you remotelymanage Norton 360 using Norton Studio app, NortonManagement, and Norton One. It
By default, the Remote Management option is turnedoff. You can turn on this option if you want to remotelymanage Norton 360 on your device.In the Nort
2 Auto-Protect2 Scan incoming emails2 Scan outgoing emails2 Antispyware2 Intrusion Prevention2 SONAR2 Antiphishing2 Browser Protection1 Perform the fo
To turn on Remote Management1In the Norton 360 main window, click Settings.2In the Settings window, under Detailed Settings,click Administrative Setti
Customizing settingsAbout Administrative Settings584
This chapter includes the following topics:1 Finding the version number of your product1 Finding the End-User License Agreement1 About upgrading your
Finding the End-User License AgreementEnd-User License Agreement (EULA) is a legaldocument that you agree to while installing theproduct. EULA contain
turn on the Automatic Download of New Versionoption. To turn on the Automatic Download of NewVersion option, go the Norton 360 main window, andthen cl
updates. You can use LiveUpdate to obtain the latestupdates.The upgrade process might not work if your Webbrowser is incompatible to communicate with
To check for a new version of the product1In the Norton 360 main window, click Support.2In the Support drop-down menu, click Check forNew Version.This
installation time, lesser boot time, and lesser memoryconsumption. It also occupies lesser amount of diskspace as compared to the full set of virus de
configure the proxy settings of Norton 360. See“Configuring Network Proxy Settings” on page 67.If you do not know your proxy settings, contact yourInt
4In the Checking Your Connection window, clickRetry.5If you use a proxy server to connect to the Internet,you may be prompted to authenticate. If you
To stay informed about protection issues1Open your Web browser, and go to the followingURL:http://www.symantec.com2In the Symantec Web site, click Nor
wSupport offerings may vary based on the language orproduct.About Norton Support Web siteThe Norton Support Web site provides a full range ofself-help
contact the technical support team in the followingways:Chat in real time with asupport representative.For more complex technicalissues, chat offers t
also use the SearchSupport box to find solution usinga keyword.Norton Support Web site also contains useful links tothe product manual, the Norton Acc
Getting support by phoneWhen you click the Get Support option in the Supportdrop-down menu, Norton Autofix performs a QuickScan and should repair your
Support policySymantec recommends that you have the latest versionof the product, as it contains new and enhancedfeatures for better protection agains
If you are a Norton One Premium Member, go to thefollowing Norton One support Web site for informationon this topic:https://one.norton.com/supportClub
Uninstalling Norton 360You can remove Norton 360 from your computer in thefollowing ways:1 From Windows Control Panel1 From the Start menuwYou should
Chapter 13 Customizing settings ... . ... . ... .. 497About Norton 360 Settings ... ... ... 497Customizing Norton 360 Se
turn off or turn on the Automatic LiveUpdate optionfrom Quick Controls in the Settings window.wIf you are connected to the Internet, AutomaticLiveUpda
To uninstall Norton 360 from Windows Control Panel1Do one of the following:1 On the Windows Taskbar, click Start > ControlPanel.1 In Windows 8, go
5To uninstall Norton 360, click Next.6If Norton 360 offers to install the Norton Toolbarafter uninstall, do one of the following:1 To keep the Norton
3To uninstall Norton 360, click Next.4If Norton 360 offers to install the Norton Toolbarafter uninstall, do one of the following:1 To keep the Norton
Aabout customer support 593Actions windowdeleting security risks 139performing actions 139restoring security risks 139submission, items toSymantec 139
attentioninfected files 234infected items 172resolve any items 172Attention Requiredabout 172resolving the risk 172Auto-Protectnotifications 229Automa
Browser Protectionturning on and turning off 290Browsingoptions 378Browsing Optionsabout 378Ccache files 428Cardsabout 368adding 370deleting 371duplic
detectingsecurity risks 228deviceadding 408editing details 411excluding from IntrusionPrevention scan 418purging from exclusion list 292remotely monit
firewall rules (continued)removing 277turning on and off 275Firewall settingsadding programs 259foldersscanning 245fragmentation 426Full Screen Detect
Internet (continued)temporary files 245, 428Intrusion AutoBlockblocking computerspermanently 289turning on and off 288unblocking computers 289Intrusio
multipartite viruses 241NNetworkchanging trust level 413discovering devices 406editing details 413forming 406joining 406managing 399Network Cost Aware
presence of a specific virus or security threat. Norton360 shows the date on which you last updated the virusand spyware definitions.You can also chec
Norton AntiSpam (continued)Feedback 315settings 539SSL 303Web Query 316Norton Autofixsupport assistants 589Norton Backup and Restore 435Norton Backup
Ppasswordchanging 383editing 362Norton Account 29saving 361updating 368PC securitycategories 117PC Tuneupcategories 117disk cleanup 429disk optimizati
Quarantine (continued)managing items 153opening 153removing items 157restoring items 156Quarantined Items viewadding items 125Quick Controlsturning on
Safe Webturning off 334turning on 334scan at the command promptcommand line scanning 223Scan Completeappearing after a scan 234Scan Complete windowapp
Settings 497Administrative Settings 558antivirus 504customizing 502firewall 276, 530, 534home network 543Identity Protection 550Quick Controls 503sett
Symantec Web siteblogs and forums 591System Insightabout 75Events graph 75monitoring activities 78Performance graph 75system status graphactivity deta
Web Query (continued)turning off 317turning on 317Web sitescache files 428Windows temporary files 245wireless networkviewing status 421worms 240Index6
fooNorton from Symantec products protect consumers from traditional threats with antivirus, phishing protection, and spywareprotection. They also prot
If you do not activate your service orrenew your subscription, you cannotobtain updates of any kind and thesoftware no longer functions.If you purchas
that require system restart are automatically appliedthe next time you restart your computer.To turn on or turn off Apply updates only on reboot1In th
additional and fast protection for the latest threats inbetween the full updates without disrupting your onlineexperience.Even if you do not turn on P
About Network Proxy SettingsA proxy server regulates access to the Internet, andprevents external computers from accessing yournetwork. If you are on
Network Proxy Settings window lets you specify thefollowing settings:Lets you specify the automaticconfiguration URL or script tomanage Internet acces
Lets you connect to the Internetthrough a server that requiresauthentication.Use the Username box andPassword box to type theauthentication details.Au
4In the Network Proxy Settings window, do thefollowing:1 If you want your browser to automatically detectnetwork connection settings, under AutomaticC
Indicates that your computerrequires attention.At the bottom section of theNorton 360 main window,click Fix Now to resolve thesecurity threats on your
This chapter includes the following topics:1 About Norton 3601 Activation protects you1 About your Norton Account1 About Norton Management1 About Nort
When your system status or protection categoriesstatuses are marked as At Risk or Attention, you canresolve the security issues directly from the main
You can right-click the icon to see a shortcut menu forNorton 360. You can choose items on the shortcut menuto open the Norton 360 window, to fix any
Use this option to create abackup of your files.You can specify when andhow often Norton 360 backsup your files.Run Backup NowUse this option to revie
To view details of a protection feature1In the Norton 360 main window, click on aprotection feature, and then click View Details.In the window that ap
Getting StartedAbout Norton 360 status74
This chapter includes the following topics:1 About System InsightAbout System InsightNorton 360 continuously monitors your computer tokeep it free of
alerts, or Quick Scans. The graph displays theactivities as icon or stripe, and the description foreach icon or stripe is provided at the bottom of th
The Norton Tasks window provides the details suchas the timestamp, the duration, and the status ofthe background jobs. The details also include thetyp
About monitoring system activitiesSystem Insight provides information about theimportant system activities that you performed or thatoccurred over a p
Indicates the optimizationactivities that you performed onyour system over a period of thelast three months.OptimizedProvides the details about thethr
Norton 360 is completely automated and easy to use.It works quietly in the background to maintain youroverall system integrity with minimal effect on
Provides the details about QuickScans that Norton 360performed on your system overa period of the last threemonths.The details include the date onwhic
2In the Performance window, at the top of the Eventsgraph, click the tab for a month to view the details.3In the Events graph, move the mouse pointer
access the Resource Threshold Profile for Alertingoption, go to the Norton 360 main window, and thenclick Settings > Administrative Settings >Pe
Turns on performance alerts.Select this option if you wantNorton 360 to notify you withperformance alerts when aprogram or process exceedsthe threshol
3Under Performance Monitoring, in thePerformanceAlerting row, do one of the following:1 To turn off performance alerts, move thePerformanceAlerting sw
3Under Performance Monitoring, in the ResourceThreshold Profile for Alerting row, select one ofthe following options:Configures a low thresholdlimit f
the program or the process manually and free theresource.If the Use Low Resource Profile On Battery Poweroption is turned on, Norton 360 automatically
To exclude a program from performance alerts1In the Norton 360 main window, click Settings.2In the Settings window, under Detailed Settings,click Admi
6Click OK.7In the Settings window, click Close.About CPU graph and memory graphNorton 360 monitors the overall system CPU usageand memory usage and th
1 The file name, version number, digital signature,the date on which the process was installed.1 The date on which the process was last used andwhethe
Includes the performancetuning features, such ascleaning up unwanted filesand performing RegistryCleanup.TuneupDepending on the security status of the
2In the Performance window, do one of the following:1 To view the CPU graph, click the CPU tab.1 To view the memory graph, click the Memorytab.1 To ma
2In the Performance window, do one of the following:1 To view the CPU graph, click the CPU tab.1 To view the memory graph, click the Memorytab.3Click
structures so that they can grow without immediatelybecoming fragmented again.You can optimize your boot volume manually by usingthe Optimize option i
can view details such as timestamp, duration, andstatus of the background job.To optimize your boot volume from the Performancewindow1In the Norton 36
to optimize the boot volume during idle time. Bydefault, this option is turned on.Turning off or turning on Idle Time OptimizerNorton 360 automaticall
You can use the icon that appears before the nameof a background job to start or stop a backgroundtask. You can start or stop a background task at any
The Norton Tasks window lets you monitor thefollowing Norton-specific tasks:Automatic LiveUpdateautomatically checks fordefinition updates andprogram
Deletes the unnecessary Webpage history that is leftbehind in your Internetbrowser's history folder.Removes the traces of anyInternet searches th
Allows the smart scanning offiles on your computer. Itimproves the performance ofNorton 360 scans by lettingyou scan fewer files withoutcompromising t
Scans the important locationsof your computer that theviruses and other securitythreats often target.Quick Scan takes less time toscan than a Full Sys
Comments to this Manuals