Symantec Norton 360 Multi-Device, 5U Manual

Browse online or download Manual for Antivirus security software Symantec Norton 360 Multi-Device, 5U. Symantec Norton 360 Premier Edition 2013 User Manual

  • Download
  • Add to my manuals
  • Print
  • Page
    / 618
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 0
Norton 360
TM
Product Manual
Care for our Environment; It's the right thing to do.
Symantec has removed the cover from this manual to reduce the Environmental Footprint of our
products. This manual is made from recycled materials.
Page view 0
1 2 3 4 5 6 ... 617 618

Summary of Contents

Page 1 - Norton 360

Norton 360TMProduct ManualCare for our Environment; ‘It's the right thing to do.’Symantec has removed the cover from this manual to reduce the En

Page 2 - Norton 360™ Product Manual

Lets you open thePerformance window inNorton 360.The Performance windowchronicles all installs,downloads, optimizations,detections, alerts, andinstanc

Page 3 - Contents

Performs backgroundmaintenance tasks related tolicensing.Licensing MaintenancePerforms backgroundmaintenance tasks related toNorton Insight. Tasks inc

Page 4 - Contents4

To monitor background jobs1In the Norton 360 main window, click Performance.2In the Performance window, click Norton Tasks.3In the Norton Tasks window

Page 5 - 5Contents

You can select one of the following options:Allows the Norton Tasks torun only when your computeruses external power.If you choose this option,Norton

Page 6 - Contents6

3In the Norton Tasks window, under the PowerSource column, click the Configure link for theNorton Task that you want to configure the powersource.4In

Page 7

A Norton 360 scan can identify threats on yourcomputer in the following ways:At regular intervals, Norton 360obtains definition updates fromSymantec.

Page 8 - About Norton 360 main window

Norton 360 obtains specificinformation about the Files ofInterest and submits theinformation to Symantec duringidle time. The informationincludes thin

Page 9

Symantec assigns the following confidence levels toFiles of Interest:Symantec analyzes the file astrusted based on the statisticalevaluation that is d

Page 10 - About Norton 360

Norton 360 also provides different profiles to configureyour scan performance. When you use the Full Scanprofile, Norton 360 follows the Blacklist tec

Page 11

The drop-down list that is available in the NortonInsight - Application Ratings window provides youthe following options:Lists the processes that runo

Page 12

Lists the Files of Interest thatyou manually trusted in theFile Insight window.This category does not listthe files that do not belongto the File of I

Page 13 - 13Getting Started

When your system status is At Risk or Attention, thissection automatically provides you the FixNow optionto fix all the issues at once.The right side

Page 14

To view the files using Norton Insight1In the Norton 360 main window, click Security, andthen click Run Norton Insight.2In the Norton Insight - Applic

Page 15 - 15Getting Started

window to update the trust value of a file. You can alsomanually trust any well-known files. You can changethe trust level of any file to User Trusted

Page 16

To manually trust the file4In the File Insight window, in the Details tab, clickTrust Now.You can manually trust the files that are poor,unproven, or

Page 17 - 17Getting Started

Norton 360 scans the files that have a confidencelevel other than Norton Trusted.1 Configure to High Trust to perform a scan thatexcludes the files th

Page 18 - Activation protects you

2In the Norton Insight - Application Ratingswindow, move the ScanPerformance Profiles sliderto one of the settings. Your options are:1 Full Scan1 Stan

Page 19 - Activating Norton 360

Norton 360 provides reports based on the followingcategories:Lets you view the details ofthe various attacks your PCis protected from.For example, you

Page 20

Viewing the Monthly ReportThe Monthly Report lets you view how Norton 360protected you for the past 30 days. This report includesdifferent activities

Page 21

This chapter includes the following topics:1 About total protection1 About keeping your computer secure1 About solving connection problems1 About resp

Page 22

Norton 360 is grouped into the following fourcategories of protection:Blocks and removes virusesand spyware from email anddownloaded sites, protectsag

Page 23 - About your Norton Account

1 Delete all unwanted messages without openingthem.1 Do not respond to email that you suspect is spam.Delete it.1 Be wary of any email that requests c

Page 24

Lets you access NortonManagement.Norton Management lets youmanage your Norton productsinstalled on all of yourdevices from one location. Tosign up or

Page 25 - 25Getting Started

About solving connection problemsNorton 360 uses an Internet connection to supportseveral of its protection features. If you use a proxyserver to conn

Page 26

Checks all boot records, files,and running programs to protectyour computer from viruses andspywareIt also runs other tasks (such asLiveUpdate, Regist

Page 27 - Creating a Norton Account

When you right-click a folder, the shortcut menudisplays Norton 360 and then Scan Now option. Youcan use this command to scan any particular folder.Wh

Page 28 - Accessing your Norton Account

window. For example, the security items that arerelated to the Quarantine feature appear under theQuarantine category. In addition, the Security Histo

Page 29

1 Email Errors1 Norton Community Watch1 Registry Cleanup1 File Cleanup1 Disk Optimization1 Silent Mode1 LiveUpdateYou can view the security items base

Page 30 - About Norton Management

History logs for that day. You can later import the fileinto Security History and analyze the data.Viewing items in Security HistorySecurity History p

Page 31

2In the Tasks window, under General Tasks, clickCheck Security History.Maintaining total protectionAbout monitoring protection features126

Page 32

3In Security History window, in the Show drop-downlist, select the category of items that you want toview. Your options are:The Recent History view in

Page 33

The security risks include thesuspicious programs that cancompromise the security ofyour computer.The Resolved Security Risksview in the Security Hist

Page 34 - About managing devices

The Security HistoryQuarantine provides a safelocation on your computerwhere you can isolate itemswhile you decide an action totake on them.The Quaran

Page 35 - About the supported devices

Lets you download theNorton Mobile Security forAndroid.Norton Mobile Security helpsprotect your mobile devicesagainst loss, theft, viruses,and other m

Page 36

The firewall monitors thecommunications betweenyour computer and othercomputers on the Internet.The Firewall - Network andConnections category in theS

Page 37

The firewall monitors thecommunications betweenyour computer and othercomputers on the Internet.The firewall maintains rulesto control Internet access

Page 38

Download Insight processesany executable file that youdownload for analysis of itsreputation level. It theninforms you about theprocessing results bas

Page 39

Norton Product TamperProtection lets you protectyour Norton product from anyattack or modification byunknown, suspicious, ormalicious applications.The

Page 40

Network Cost Awareness letsyou set up policies andrestrict the Internet usage ofNorton 360. You can definethe amount of networkbandwidth that Norton 3

Page 41

Norton 360 may generateerrors in some cases. Forexample, an error can occurwhen you run LiveUpdate orscan a folder. Engine errors,timeout errors, and

Page 42

The Norton CommunityWatch feature lets yousubmit any suspicioussecurity or suspiciousapplication data to Symantecfor analysis. Symantecassesses the da

Page 43

The File Cleanup featureremoves unwanted temporaryfiles including leftoverInternet browser files,Internet search words, andother temporary files.The F

Page 44

Silent Mode suppresses alertsand notifications andtemporarily suspends mostof the background activities.The Silent Mode view in theSecurity History wi

Page 45

4Click a row to view details for that item.If you want to view additional information about anitem, click the More Details option in the Detailspane o

Page 46

Online FamilyGetting StartedAbout Norton 36014

Page 47

The following table lists the categories that providethe advanced details about the Security History items:Displays the followinginformation about the

Page 48

Actions141Maintaining total protectionAbout monitoring protection features

Page 49

Displays the actions that areavailable for the selected itemThe options in the Actions viewvary depending on the optionsthat are available in the Show

Page 50

This action removes therestricted status from theselected computer or fromall of the unclassifiedcomputers on the selectednetwork.This option is avail

Page 51

1 Stop Notifying MeThis action prevents Norton360 from notifying you whenit blocks the selected attacksignature in the future.This option is available

Page 52 - About Norton Power Eraser

events that are related to Security Risks, DownloadInsight, and Performance.The File Insight window lets you view more details ofevents that belong to

Page 53 - About updating Norton 360

Lets you view the detailedinformation about theunresolved security risks in anorganized way.The Unresolved Security Riskscategory includes the infecte

Page 54 - About LiveUpdate

Lets you view the performancedetails of any File of Interest thatis available on your computer.The information includes thegeneral details, the origin

Page 55

Provides the lineage details of afile.You can view the file name andthe URL of the source fromwhere the file was downloaded.The lineage details of a f

Page 56

Let you return the securityrisk that is quarantined to theoriginal location on yourcomputer.Returns the selectedQuarantine item to itsoriginal locatio

Page 57 - About Smart Definitions

Lets you monitor your child’sactivities on the Internet.wNorton Online Familymay not be available withsome versions of Norton 360.In such case, you ma

Page 58

This category includes thesecurity risks or the infectedfiles that Norton 360 was notable to repair, remove, orquarantine.Unresolved SecurityRisksThis

Page 59

Takes you to the SymantecSecurity Response Web siteGet helpSends the security risk toSymantecSubmit to SymantecSearching in Security HistoryYou can se

Page 60 - Checking for updates manually

option to save the list in the Security History log. Youcan later import the log file and analyze the data.Security History stores the information in

Page 61

5In the Save As dialog box that appears, navigate toa location and specify the name for the file.The category name in the Show drop-down listappears a

Page 62

The Security History Quarantine includes the followinggroups of items:Includes the items suchas spyware and adwarethat are generally low riskand that

Page 63 - About Pulse Updates

3In the Threat Detected window, select the actionthat you want to perform. Some of the options are:Returns the security risk thatis quarantined to the

Page 64

Adding an item to the QuarantineSecurity History Quarantine provides a safe locationon your computer in which you can isolate items whileyou decide on

Page 65 - About Network Proxy Settings

functionality of a program that requires the riskprogram to run.For example, a shareware or freeware program thatyou download may use adware to keep i

Page 66

to remove the security risk and places it in the SecurityHistory Quarantine. Some programs may rely on thesecurity risk item that you quarantine to fu

Page 67

volume. These items appear as Not Submitted inSecurity History.To manually submit an item to Symantec1In the Security History window, in the Quarantin

Page 68 - About Norton 360 status

Details option in the Norton360 main window to viewmore details on the NortonOnline Family Web site.Getting StartedAbout Norton 36016

Page 69

attacks. It also provides information about the knownattacks that they are protected from.Vulnerabilities are flaws in your programs or youroperating

Page 70 - About the Norton 360 icon

For each program, you can view details such as thename of the program, its vendor, and the number ofvulnerabilities that the program contains. You can

Page 71

To view details about a vulnerable application1In the Norton 360 main window, click Tasks.2In the Tasks window, under General Tasks, clickCheck Vulner

Page 72

This chapter includes the following topics:1 About the Norton 360 scans1 About Computer Scan1 About Insight Network scan1 About Reputation Scan1 About

Page 73

Norton 360 automatically performs different types ofscans to secure your computer from latest threats. Italso lets you run different types of scans ma

Page 74

Reputation Scan displays thereputation information of thefiles on your computer. Itdisplays the reputationinformation such as trust level,prevalence,

Page 75 - Monitoring your

Scan Facebook Wall lets youscan the links and URLs that areavailable on your Facebookprofile.When you click the ScanFacebook Wall option, Norton360 ta

Page 76

of the Computer Scan displays the threat as Trojan.Foo.You can click the Run Scans option available in theTasks window to access the different types o

Page 77

Runs LiveUpdate, backup, anddisk optimization tasks.Runs LiveUpdate, backs up yourdata, frees disk space, andoptimizes your disk volume.Custom TaskCom

Page 78

3Click Go.You can use the following options:Suspends the scan temporarily.Click Resume to continue thescan.PauseSkips the current scan.SkipTerminates

Page 79

Lets you check the safety ofa Web site.You can also perform a safesearch.wThis option may not beavailable with some versionsof Norton 360. In such cas

Page 80

3Click Go.4After the scan is complete, in the Scans window,click Close.Scanning selected drives, folders, or filesOccasionally, you might want to scan

Page 81 - About performance alerting

4In the Scans window, do one of the following:1 To scan specific drives, click Run next to DriveScan, select the drives that you want to scan,and then

Page 82 - Select this option if you do

computer. Viruses, spyware, and other risks oftentarget these areas.If your most recent scan was a Full System Scan, thiswindow shows the results of a

Page 83

About custom scansYou can create a custom scan if you regularly scan aparticular segment of your computer. This custom scanlets you scan the segment f

Page 84

5In the New Scan window, in the Scan Name box,type a name for the scan.You cannot specify a scan name that is already inuse.6On the Scan Items tab, ad

Page 85 - Battery Power option

5In the window that appears, on the Scan Items tab,do the following:1 To add drives, click Add Drives, in the ScanDrives dialog box, select the drives

Page 86

5In the Edit Scan window, on the Scan Options tab,configure the scan options as required.6Click Save.Editing a custom scanYou can edit a custom scan t

Page 87

To run a custom scan1In the Norton 360 main window, click Security, andthen click Run Scans.2In the Scans window, under Computer Scans, clickCustom Sc

Page 88

4In the Scans window, in the Delete column, clickthe delete icon next to the custom scan that youwant to delete.5Click Yes to confirm that you want to

Page 89

wNorton 360 lets you select multiple dates if youschedule a monthly scan.To schedule a custom scan1In the Norton 360 main window, click Security, andt

Page 90

Lets you access NortonStudio.Norton Studio is a Windows8 app that lets you manageyour Norton products andNorton product keys from onelocation. You can

Page 91 - About optimization

7Under After scan completion:, select the state atwhich your computer should be after the scan iscomplete. Your options are:1 Stay On1 Turn Off1 Sleep

Page 92 - Optimizing your boot volume

5In the Edit Scan window, under When do you wantthe scan to run?, set the frequency and time atwhich you want the scan to run.Most of the frequency op

Page 93 - About the Idle Time Optimizer

Editing a scheduled scanYou can change the schedule of any scheduled customscan, Quick Scan, or Full System Scan from the Scanswindow.To edit a schedu

Page 94 - About the Norton Tasks

When the Insight Protection option is turned on,Norton 360 performs a traditional scan and an InsightNetwork scan simultaneously. The traditional scan

Page 95

When you right-click a file, the shortcut menudisplays Norton 360 and then Insight NetworkScan. You can use this command to scan a file usingboth loca

Page 96

4In the Insight Protection row, do one of thefollowing:1 To turn off Insight Protection, move the On/Offswitch to the right to the Off position.1 To t

Page 97

Computer Scan. Norton 360 uses the Computer Scanto perform the signature-based threat detection. Itcompares the signature of the filtered reputation f

Page 98

This category includesWindows System files (.sys),dynamic link library files(.dll), and device driver files(.drv).System filesThis category includesAc

Page 99

Scans all the Files of Interestthat are available on yourcomputer.When you perform a FullSystem Scan, Norton 360searches for Files of Intereston all t

Page 100

Symantec has a fewindications that the file is nottrusted.This file is suspicious and canharm your computer.PoorSymantec has a highindication that the

Page 101 - About Power Source

If you are not connected to the Internet, you can clickTry Later in the Activation not complete window tostart your product. The Activation window rea

Page 102 - Configuring the Power Source

4If there is a file with Poor or Bad trust level, underthe Trust Level column, click the red cross (x) icon.5In the Quarantine File window, click Quar

Page 103 - About Norton Insight

check the trust level of a specific file, you can scan theparticular file.To run a Reputation custom scan1In the Norton 360 main window, click Securit

Page 104 - About System Insight

When you run a Reputation Quick Scan, Norton 360considers the Files of Interest which include runningprocesses and loaded programs. When you run aRepu

Page 105

You can view the number of trusted files that areon your computer. You can also view the totalnumber of files that Symantec analyzes within theNorton

Page 106 - Files of Interest:

Indicates the trust level thatis assigned to a file.Symantec analyzes specificinformation about a file suchas the digital signature andthe hash value

Page 107

Indicates the communityusage level of the file.The search results aregrouped in to the followingcategories:1 Very Few Users: Showsthe files that have

Page 108

Indicates the system resourceusage level of the file.The usage levels are asfollows:1 Low: Indicates that thefile consumes minimumsystem resources.1 M

Page 109

Indicates the stability ratingof the file.The stability rating dependson how frequently theprogram crashes. Thedifferent stability ratings areas follo

Page 110

you are not only protected from unsafe sites but youcan also let other Facebook users know the securitystatus of any Web site.However, Norton Safe Web

Page 111

The following are the safety states that Norton SafeWeb provides after it scans the links on your FacebookWall:Indicates that the site is safe tovisit

Page 112

Norton 360™ Product ManualThe software described in this book is furnished under a licenseagreement and may be used only in accordance with the terms

Page 113 - 1 Full Scan

You can activate your product directly from theactivation alert. You can also activate your productfrom the Trial Period Status link in the main windo

Page 114

To enable your Facebook Wall1In the Norton 360 main window, click Security, andthen click Run Scans.2In the Scans window, under Scan Facebook Wall,cli

Page 115

suppress the SONAR notifications by disabling theShow SONAR Block Notifications option.The View Details link in the notification alert lets youview th

Page 116 - Viewing the Monthly Report

and proactively detects unknown security risks on yourcomputer. SONAR identifies emerging threats basedon the behavior of applications. SONAR identifi

Page 117 - Maintaining total

To exclude high-risk security threats from scanning1In the Norton 360 main window, click Settings.2In the Settings window, under Detailed Settings,cli

Page 118

window. The Signature Exclusions window containsthe list of all security risks that can be excluded fromNorton 360 scans. For each security risk, you

Page 119

About clearing file IDs that are excluded during scansWhen you run a Reputation Scan, Norton 360 providesinformation on the trust-worthiness of all pr

Page 120

again. This can improve the scan performance ofNorton 360 on your computer.However, if you want Norton 360 to scan all the filesin your computer, you

Page 121

Microsoft Excelexcel.exeMicrosoft PowerPointpowerpnt.exeMicrosoft Visiovisio.exeMicrosoft Accessmsaccess.exeMicrosoft Projectwinproj.exeNorton 360 sca

Page 122 - About Security History

4In the Microsoft Office Automatic Scan row, do oneof the following:1 To turn on Microsoft Office Automatic Scan,move the On/Off switch to the left to

Page 123

Norton 360 turns on this optionautomatically when it detects adisk burning task or a MediaCenter TV recording task. Norton360 also turns on Quiet Mode

Page 124

To activate your product from the main window1In the Norton 360 main window, do one of thefollowing:1 If you purchased a subscription version of areta

Page 125

About the Silent Mode that you turn on manuallyNorton 360 lets you manually turn on Silent Mode fora specified duration. When Silent Mode is turned on

Page 126

To turn on Silent Mode from the Administrative Settingswindow1In the Norton 360 main window, click Settings.2In the Settings window, under Detailed Se

Page 127

2In the Performance window, click Norton Tasks.3In the Norton Tasks window, under Silent Mode,move the On/Off switch to the right to the Offposition.4

Page 128 - Maintaining total protection

ensure high performance of your computer. Theactivities that are suspended run after you finish usingthe application in the full-screen mode.Silent Mo

Page 129

3In the Full Screen Detection row, move the On/Offswitch to the left to the On position.4In the Settings window, click Apply.5Click Close.About Quiet

Page 130

The following table explains about the various options:When you use a Media Centerapplication to burn a CD or aDVD, Norton 360 automaticallyenables Qu

Page 131

When you use a Media Centerapplication to record a TVprogram, Norton 360automatically enables QuietMode, if the Media Center TVRecording option is tur

Page 132

Norton 360 automatically turnson Quiet Mode when it detects aTV program recording session ora disk-burning session. Inaddition, you can manually addth

Page 133

To turn off or turn on IMAPI 2.0 Disk Burn1In the Norton 360 main window, click Settings.2In the Settings window, under Detailed Settings,click Admini

Page 134

turn on Quiet Mode to the Quiet Mode Programs list.When Norton 360 detects a running instance of aprogram that you added in the list, it automatically

Page 135

The product key is providedas part of the activationprocess. Be sure to save yourproduct key by creating orsigning in to your NortonAccount, or by pri

Page 136

To add a program1In the Norton 360 main window, click Settings.2In the Settings window, under Detailed Settings,click Administrative Settings.3In the

Page 137

5In the confirmation dialog box, click Yes.6In the Quiet Mode Programs window, click Applyand then click OK.About boot time protectionThe boot time pr

Page 138

Configuring boot time protectionThe boot time protection feature provides enhancedsecurity level from the time you start your computer.As soon as you

Page 139

Turning on or turning off Early Launch Anti-MalwareProtectionThe Early Launch Anti-Malware Protection featureprovides enhanced security level during t

Page 140

to scan or customize the scan by adding a specificcommand. The following commands are available:NAVW32 launches helpand terminates./?Scans all drives/

Page 141

Scans the specifieddrive, folder, or file[drive|folder|file]Performs Quick Scan inthe background.wNorton 360displays the scanswindow only when athreat

Page 142

Scanning your computerRunning a scan at the command prompt226

Page 143 - 1 Norton File Insight

This chapter includes the following topics:1 What to do if a security risk is foundWhat to do if a security risk is foundYour product provides many so

Page 144

In some cases, Norton 360 might not identify an itemas a security threat, but you might suspect that theitem is infected. In such cases, you can submi

Page 145

Security History also includes information aboutspyware, adware, and other security risks.Reviewing Auto-Protect notificationsAuto-Protect scans files

Page 146

activation procedure. You need to log in to yourparental control software or to the Internet throughyour ISP as an administrator to change yourconfigu

Page 147

3In the Show drop-down list, select the category forwhich you want to review Auto-Protect alerts.Your options are:Review Auto-Protectnotifications tha

Page 148

4In the right pane, click the Options link.The option name appears as Restore & Options forfew items.If one or more security risks such as spyware

Page 149

5In the Threat Detected window, select theappropriate action on the risk.The following are some of the options that areavailable in the Threat Detecte

Page 150

Removes the selectedsecurity risk from thecomputer andquarantines it.This option is availablefor the security risks thatrequire your attention formanu

Page 151 - Searching in Security History

Sends the security risk toSymantec.In some cases, Norton360 might not identify anitem as a security threat,but you might suspectthat the item is infec

Page 152 - 1 Text Files (.txt)

checks for the infections that have processes runningin memory. It also checks for the infections that thestart-up files and folders refer.If that doe

Page 153

Responding to security issuesWhat to do if a security risk is found236

Page 154

This chapter includes the following topics:1 About Norton 360 alerts and messages1 About managing messages and alerts1 Types of risks1 Types of threat

Page 155

You might see messages in the following locations:Several types of Norton 360messages appear in thenotification area, at the farright of the taskbar.

Page 156

Norton 360 displaysindividual status areas foreach protection feature, suchas Security, Identity, Backup,and Tuneup. The status areasshow how many iss

Page 157

After you log in to your Norton Account, you canmanage your product information with the followingoptions:Saves the information for all ofthe Norton p

Page 158

These risks consist of flawsin legitimate software thatcan be exploited, either tocause damage, block data, orsteal information.Vulnerabilities are us

Page 159

Types of virusesA virus is a small program that is designed to alter theway your PC operates, without your knowledge orpermission.To be a virus, a pro

Page 160

These viruses use thetechniques of both boot andfile infector viruses. Norton360 scans for such virusesand eliminates them.Multipartite virusesThese v

Page 161

This chapter includes the following topics:1 Turning on or turning off automatic tasks1 About custom task1 About scheduling automatic tasks1 About sch

Page 162

see the results of the latest Norton 360 activities thenext time you open the Norton 360 main window. Tosee a current report of Norton 360 activities,

Page 163 - Scanning your

Deletes the temporary filesthat are left behind on yourPC's hard disk after Internetbrowsing.Internet Explorer TemporaryFilesDeletes the unnecess

Page 164

Norton 360 lets you choose your own combination oftasks for a one-time scan. You can run LiveUpdate,back up your data, free disk space by cleaning up

Page 165 - About the Norton 360 scans

Examine your PC one or moretimes each week for securityand performance issues.You can pick the days of theweek and the time of day onwhich the scan pe

Page 166 - About Computer Scan

3On the Scheduling tab, under Schedule, select anoption.When you click Weekly or Monthly, you must selectthe time and day to run the automatic tasks.

Page 167

Does not perform anyscheduled backups ofchanged filesIf you choose this option, youshould manually back up yourchanged files regularly.Manual Schedule

Page 168 - Running a Quick Scan

Saves your account informationand your billing details.The Profile options are:1 Account InformationYou can update your NortonAccount information andy

Page 169 - Running a Full System Scan

Doing routine tasksSpecifying Idle Time Out duration250

Page 170

This chapter includes the following topics:1 About the Smart Firewall1 About Intrusion Prevention1 About Download Insight1 About Norton AntiSpam1 Abou

Page 171

Cloaks the inactive portson your computer therebyproviding protectionagainst attacks throughhacking techniques suchas port scanningPort scansMonitors

Page 172 - 1 Total items scanned

3On the General Settings tab, in the Smart Firewallrow, move the On/Off switch to the right to the Offposition.4Click Apply.5In the Security Request w

Page 173

To turn on Smart Firewall from the notification area4In the notification area on the taskbar, right-clickthe Norton 360 icon, and then click Enable Sm

Page 174 - Selecting the scan items

pcAnywhere with that specific computer. It thenprocesses the original rule and prevents its use withany other computer.About Traffic rulesNorton 360 i

Page 175 - Configuring the scan options

Permit the use of theNetBIOS name serviceand the NetBIOSdatagram service that theMicrosoft Network usesin file and printer sharing.NetBIOS is an acron

Page 176 - Running a custom scan

You can add a new Traffic rule on this tab. You can alsodo the following activities:You can change the settings ofa Traffic rule that does notfunction

Page 177 - Deleting a custom scan

1 Rename a program.1 Modify the rules for a program.1 Add a rule for a program.1 Modify the access settings of a program rule.1 Modify the priority of

Page 178 - About scheduling scans

Lets the firewall notifyyou when a programattempts to access theInternet. You can thenallow or block Internetaccess for the program.In some instances,

Page 179

Norton Online Backupprovides a secure andeasy-to-use online backupsolution that safeguards yourimportant data againstsystem crash, accidentaldeleting,

Page 180 - Scheduling a Full System Scan

To add a program to Firewall settings1In the Norton 360 main window, click Settings.2In the Settings window, under Detailed Settings,click Firewall.3O

Page 181 - Scheduling a Quick Scan

7In the Options drop-down list, select the access levelthat you want this program to have.Your options are:Allow all access attemptsby this program.Al

Page 182 - About Insight Network scan

3On the Program Rules tab, in the Program column,select the program that you want to change.4In the drop-down list next to the program that youwant to

Page 183 - 1 Insight Network Quick Scan

6Click Apply.Adding Traffic rules and Program rulesFirewall settings automatically create most of thefirewall rules that you need. You can add custom

Page 184

To use the Add Rule Wizard1Open the Add Rule Wizard by creating a Trafficrule or a Program rule.Keeping secure on the InternetAbout the Smart Firewall

Page 185 - About Reputation Scan

2In the first panel of the AddRule Wizard, select theaction that you want for this rule. Your options are:Allow communication ofthis type.AllowFor exa

Page 186 - Executable files

MonitorKeeping secure on the InternetAbout the Smart Firewall266

Page 187

Update the Firewall –Activities category in theevent log each time thatcommunication of thistype takes place. Thisoption lets you monitorhow often thi

Page 188

Security History logentry option in the AddRule Wizard or theModify Rule Wizard.3Click Next.4Select the type of connection for the rule. Youroptions a

Page 189

5Click Next, and then select the computers that applyto the rule. Your options are:The rule applies to allcomputers.Any computerThis rule applies only

Page 190

Creating a Norton AccountYour Norton Account stores the product key and thebilling information of your product. You can alsoregister your product with

Page 191

The rule applies only tothe computers, sites, ordomains that you specify.You can specify thenames and addresses ofcomputers that apply tothe rule. The

Page 192

6Click Next, and then select the protocols for therule. Your options are:The rule applies to TCP(Transmission ControlTCPProtocol)communications.The ru

Page 193

The rule applies to allsupported protocols.When you select thisoption, you cannotspecify the types ofcommunications or portsthat apply to the rule.All

Page 194 - Scanning your computer

8Click Next.9Check Create a Security History log entry if youwant Norton 360 to create an entry in the firewallevent log.Norton 360 creates an entry w

Page 195 - 195Scanning your computer

5In the Modify Rule window, make the necessarychanges to modify any aspect of the rule.6When you have finished changing the rule, clickOK.To modify a

Page 196

3On the Traffic Rules tab, select the rule that youwant to move.4Do one of the following:1 To move this rule before the rule above it, clickMove Up.1

Page 197 - About Scan Facebook Wall

To turn off a Traffic rule temporarily1In the Norton 360 main window, click Settings.2In the Settings window, under Detailed Settings,click Firewall.3

Page 198

6In the SecurityHistory-Advanced Details window,under Actions, click Allow.Removing a firewall ruleYou can remove some of the firewall rules if necess

Page 199

About Norton Firewall DiagnosisThere may be times when firewall may block thenetwork traffic that you want to allow based on itsconfiguration settings

Page 200 - About SONAR Protection

For each case of network block, the Wizard containsthe firewall’s analysis of the cause and the possiblesolutions to fix the block.Norton 360 recommen

Page 201 - About Real Time Exclusions

To create a Norton Account from the Norton AccountWeb page1In the Norton 360 main window, click Account.2In the My Account window, click Access Norton

Page 202

wAutomatic Program Control configures network accessonly for the versions of programs that Symantecrecognizes as safe. Norton 360 blocks any infectedp

Page 203 - About Signature Exclusions

suspicious or vulnerable, Norton 360 assigns Poor orBad trust level.wYour computer must be connected to the Internet toaccess the latest reputation in

Page 204

In the left pane of the firewall alerts, you can find thefollowing reputation information:Shows the stability rating ofthe file on your computer.The s

Page 205

Shows the user prevalence ofthe file. This data is based onthe information that millionsof Norton Community Watchcustomers shared andSymantec's r

Page 206 - Microsoft Wordwinword.exe

Shows the trust level of thefile.Symantec assigns thefollowing trust levels:1 Norton Trusted -Indicates the file that isNorton Trusted.1 Good - Symant

Page 207 - Microsoft Projectwinproj.exe

About Intrusion PreventionIntrusion Prevention scans all the network traffic thatenters and exits your computer and compares thisinformation against a

Page 208 - About Silent Mode

Turning off or turning on Intrusion PreventionnotificationsYou can choose whether you want to receivenotifications when Intrusion Prevention blockssus

Page 209

6Click OK.7In the Intrusion Signatures window, click OK.8In the Settings window, click Apply.Excluding or including attack signatures in monitoringIn

Page 210

5Click OK.Turning off or turning on AutoBlockWhen an attack is detected from a computer, the attackis automatically blocked to ensure that your comput

Page 211

Unblocking AutoBlocked computersIn some cases, benign network activity can appear tobe similar to an attack and AutoBlock blocks thenetwork activity a

Page 212

You can also change your Norton Account password,if required. Your computer must be connected to theInternet to access your Norton Account.wSymantec p

Page 213

To permanently block a computer that has been blockedby AutoBlock1In the Norton 360 main window, click Settings.2In the Settings window, under Detaile

Page 214 - About Quiet Mode

3On the Intrusion and Browser Protection tab, inthe Browser Protection row, do one of the following:1 To turn off Browser Protection, move the On/Offs

Page 215 - 215Scanning your computer

When a device on your network attempts to infect yourcomputer, AutoBlock stops all access requests fromthis device. If you add this device to the Intr

Page 216

1 Your home network is infected.When a device on your network attempts to infect yourcomputer, AutoBlock stops all the access requests fromthis device

Page 217

1 Yahoo (Browser)1 MSN Explorer (Browser, E-mail & Chat)1 QQ (Chat)1 ICQ (Chat)1 Skype (Chat)1 MSN Messenger (Chat)1 Yahoo Messenger (Chat)1 Limew

Page 218 - About User-Specified Programs

and poor. Based on the reputation levels, the files canbe broadly classified as follows:Includes the files that are eitherNorton trusted or User trust

Page 219

By default, Download Insight lets you install safe files.For files of unknown reputation levels, DownloadInsight prompts you to select an action that

Page 220 - Programs

Turning off or turning on Download IntelligenceDownload Insight protects your computer against anyunsafe file that you may run or execute after youdow

Page 221 - About boot time protection

3On the Intrusion and Browser Protection tab, inthe Download Intelligence row, move the On/Offswitch to the left to the On position.4In the Settings w

Page 222 - Protection

3On the Intrusion and BrowserProtection tab, underDownload Intelligence, in the Download InsightNotifications row, do one of the following:1 To receiv

Page 223

Chapter 1 Getting Started ... ... . ... . ... . ... 7About Norton 360 ... ... ... . ... . ... 7Activation pr

Page 224

About Norton ManagementNorton Management lets you manage all of your Nortonproducts and Norton product keys from one location.You can add your devices

Page 225 - 1 "\Program Files\Norton

You can use the following options to configureDownload Insight Full Report:When you set the DownloadInsight Full Report option toAlways, Download Insi

Page 226

When you set the DownloadInsight Full Report option toUnproven Only, DownloadInsight prompts you to select asuitable action for unknown filesonly. In

Page 227 - Responding to

When you set the DownloadInsight Full Report option toNever, Download Insight doesnot prompt you to select asuitable action for any type offile that y

Page 228

4In the Settings window, click Apply, and then clickClose.Turning on or turning off Alert on Poor StabilityWhen you turn on the Alert on Poor Stabilit

Page 229

email into the Inbox folder and spam email into theJunk folder or the Norton AntiSpam folder.Norton AntiSpam uses Symantec enterprise-class,spam-filte

Page 230

the addresses from your Outlook address book orWindows address book, it also imports the addressesthat are available in the Safe Sender and the Blocke

Page 231

1 Uses a user-defined address listto expedite the scanning of email.1 Accepts all email messages fromsenders in the Allowed List.1 Treats all email me

Page 232

the Norton AntiSpam drop-down list or the options toclassify the email messages as spam or legitimate. Youcan also use these options to empty the spam

Page 233

the initial client integration. It helps you keep your listof allowed and blocked email senders in sync with yourcurrent address books. When Norton An

Page 234

You can use the following options:Marks the selected email as spam and movesthe email message into the Junk folder or theNorton AntiSpam folder.When y

Page 235

Accessing Norton Management on WindowsYou can access Norton Management in one of thefollowing ways:1 Using a Web browser on any computer.1 From the ma

Page 236 - Responding to security issues

Displays the Norton AntiSpam settings sectionof the Norton 360 Settings windowOpenNortonAntiSpamSetting Address Book ExclusionsWhen you add an email a

Page 237 - Understanding

7Click OK to save and close the Address BookExclusions window.To edit or delete entries in the Address Book Exclusionslist1In the Norton 360 main wind

Page 238

2In the Settings window, under Detailed Settings,click AntiSpam.3On the Filter tab, in the Allowed List row, clickConfigure.4In the Allowed List windo

Page 239 - Types of risks

3On the Filter tab, in the Allowed List row, clickConfigure.4In the Allowed List window, select the item thatyou want to edit or delete.5Do one of the

Page 240 - Types of threats

4In the Allowed List window, click Import.5In the Allowed List window, click Apply.6Click OK.To add entries to the Blocked List1In the Norton 360 main

Page 241 - Types of viruses

5Do one of the following:1 To edit an entry, click Edit to open the EditEmail Address dialog box, edit the details, andthen click OK.1 To delete an en

Page 242

3On the ClientIntegration tab, in the Feedback row,select any one from the following three options:Automatically sends themisclassified email message

Page 243 - Doing routine

approach to filter spam email messages from legitimateemail messages.The email messages that you receive in your emailprogram undergo scanning through

Page 244 - About custom task

Norton AntiSpam then sends the email message to youremail program. Based on predefined email rules, theemail program then moves the email message to t

Page 245 - Running custom tasks

numbers for your email program. If the SMTP and POP3port numbers for your email program are differentfrom the default port numbers, you must configure

Page 246

To access Norton Management from the Windowsnotification area1Go to the Windows device on which NortonManagement is installed.2In the notification are

Page 247

5In the AddPort toprotect window, in the Port Typedrop-down list, do one of the following:1 To add the incoming email port, click POP3.1 To add the ou

Page 248 - About scheduling backups

plan, you can set up NoLimit policy so that Norton 360connects to Symantec servers to ensure completeprotection. However, if you think that Norton 360

Page 249

Turning off or turning on Network Cost AwarenessYou can set up policies to restrict the Internet usageof Norton 360. If you do not want to restrict th

Page 250 - Doing routine tasks

The Network Cost Awareness Settings window listsall the network connections that your computer usesto connect to the Internet. You can view the status

Page 251 - Keeping secure on

6Select one of the following:1 AutoAllows Norton 360 to receive all product andvirus definition updates based on the Windows8 cost awareness policy. B

Page 252

This chapter includes the following topics:1 About securing your sensitive dataAbout securing your sensitive dataThe Internet provides the fastest and

Page 253

window. The Norton Safe Web feature provides you asafe search environment in the Web by displaying thesite rating icons next to every search result.Wh

Page 254 - About firewall rules

In addition, the Norton Site Safety pop-up windowincludes information about Symantec AuthenticatedWeb sites. Web site hackers often mimic company Webs

Page 255 - About Traffic rules

the security level of all the Web sites that you visit anddisplays the results in the Norton Site Safety pop-upwindow. Antiphishing also blocks naviga

Page 256

To report an incorrect evaluation of a suspicious Website1Open your browser and go to the Web site that youthink is suspicious.2On the Norton Toolbar,

Page 257 - About Program rules

5In the confirmation window, click Yes to confirmthat you are already on the device you want tomanage.6In the window that appears, click Save File and

Page 258

wThe Community Buzz option is available only inEnglish-language versions of Windows.For each Web site that you want to know the site safetystatus, Nor

Page 259

Norton Safe Web provides the following Web site safetystates when you browse through the Internet:You can see Norton Secured iconnext to the search re

Page 260

You can see a red cross (x) iconnext to the search results.When you visit a Web site withthis status, you can see a similarstatus icon on the NortonTo

Page 261 - Customizing a program

Norton Safe Web does not havesufficient information about thisWeb site to provide a shoppingsafety rating.UntestedNorton Safe Web has analyzedthis Web

Page 262 - Removing a program

let other Facebook users know about the security statusof any Web site.To scan your Facebook Wall using Norton Safe Web,use the ScanFacebookWall optio

Page 263 - Using the Add Rule Wizard

Searching the Web using Norton Safe SearchNorton Safe Search enhances your Web searchexperience. When you search the Internet using NortonSafe Search,

Page 264

Norton Safe Search enables youto erase all the data that arerelated to your search activitiesfrom the Ask.com server. ThePrivacy Safeguard feature ofN

Page 265 - About the Smart Firewall

Turning off or turning on Scam InsightScam Insight prevents you from divulging yoursensitive information such as Social Security Numbersor credit card

Page 266

The following features in Identity Safe provide securestorage of your sensitive information:Stores login information, suchas your login credentials fo

Page 267

Norton 360 adds the Norton Toolbar to the InternetExplorer, Firefox, or Chrome Web browsers. TheNorton Toolbar has the following components:1 Norton m

Page 268

4If you are prompted to provide your email address,in the Email Address box, type the email addressthat you use to log on to your Norton Account, andt

Page 269

1 Personal information such as your address, date ofbirth, passport number, and social security number.1 Credit card details including card number and

Page 270

Identity Safe to manage your personal data such asaddresses, date of birth and credit card information.The logins, cards, and notes help you store and

Page 271

save in one Windows user account from anotherWindows user account. This way Identity Safe protectsyour sensitive data from misuse by multiple users of

Page 272

1 Reset your Identity Safe.About creating Identity Safe vaultsIdentity Safe helps you manage your sensitiveinformation and provide additional security

Page 273

In addition to the local vault on your Windows useraccount, you can save your Identity Safe data in onlinevault. The Identity Safe data is stored onli

Page 274

Signing in to Norton AccountIdentity Safe lets you create a local vault and an onlinevault to save your Identity Safe data. You must log into your Nor

Page 275

The following are the benefits of moving your IdentitySafe data online:1 Lets you access your Identity Safe data from anycomputer.wYour computer must

Page 276 - Allowing a blocked program

passwords, and credit card details. You can sync youridentity safe data in the local vault into the online vault.When you save your data in online vau

Page 277 - Removing a firewall rule

10In the Merge Identity Safe Data Online window,click Merge.Deleting local vault and online vaultIdentity Safe lets you create a local vault and an on

Page 278

To merge the Identity Safe data from portable profileto local vault or online vault1On the Norton Toolbar, in the Identity Safe menu,click Merge Porta

Page 279 - About Reputation Firewall

About the supported devicesTo install and use Norton 360, your device must meetthe following minimum system requirements:Hardware requirementWindows1

Page 280

3Set up Identity Safe.4In the Identity Safe Setup Successful window, doone of the following:1 Check Importmy logins from Internet Explorerto import al

Page 281

4In the Enter the Password box, type your IdentitySafe password.If you forget your password, Identity Safe lets youenter wrong password three times. I

Page 282

wYou must be logged in to Identity Safe to access theIdentity Safe features. The Identity Safe features aresupported only in the Internet Explorer, Fi

Page 283

Identity Safe automatically logs you out of the currentvault, when you are logged in to your local vault oronline vault and click Identity Safe Setup

Page 284

To configure Identity Safe settings1In the Norton 360 main window, click Identity, andthen click Manage Identity Protection.Securing your sensitive da

Page 285 - About Intrusion Prevention

2Under Identity Safe, identify the feature that youwant to use, and click Configure. Your options are:Lets you set up Identity Safevault.Identity Safe

Page 286

Lets you configure the way youwant Identity Safe to collect,store, and display the logininformation for the Web pagesyou visit.You can configure Ident

Page 287

Lets you manage your personalinformation such as name, dateof birth, email address, andcredit card information in oneplace.You can use the information

Page 288

Lets you store and managesensitive information.You can save social securitynumber, driver's license number,insurance policy number, andpassport n

Page 289 - AutoBlock

Lets you move your Identity Safedata that you stored in your localvault to online vault.wWhen you sync yourIdentity Safe data from localvault to onlin

Page 290

Service Pack 1 and232-bit and 64-bitversions1 MicrosoftWindows VistaHome Basic1 MicrosoftWindows VistaHome Premium1 MicrosoftWindows VistaUltimate1 Mi

Page 291

1 Lets you quickly launch the Web site login page1 Fills in your login automatically when you revisitWeb pages1 Lets you manually add logins1 Lets you

Page 292

appears on the top left corner of the Login Assistantwindow.Identity Safe automatically detects login fields whichare not auto filled or filled incorr

Page 293 - About Download Insight

To save a login1Go to the Web site for which you want to save yourlogin.2Type your login details, and then click the optionor link that logs you in.No

Page 294

1 Displays the login ID and lets you show or hide thepassword.1 Displays the strength of the password for each ofthe logins.1 Lets you quickly launch

Page 295

6In the Username dialog box, in the Enter newusername box, type the user name of the login, andthen, click OK.7In the Information dialog box, click OK

Page 296

To delete a login or a folder1In the Norton 360 main window, click Identity, andthen click Manage Identity Protection.2Under Identity Safe, in the Edi

Page 297

Ensure that the URL you change belongs to thesame domain as the current URL.1 View the details of the date and time when you lastmade to the Edit Logi

Page 298

Changing the user name and passwordIdentity Safe lets you change the user name andpassword for the logins that you have saved in the EditLogins window

Page 299

5In the Validate Password for Identity Safe windowdo the following:1 In the Enter the Password box, type yourIdentity Safe password.1 Click Validate.6

Page 300 - Download Insight Full Report:

You can use the information that you store in the cardsto do the following:1 Automatically fill forms1 Provide sensitive information without having to

Page 301

Supported Norton productsTo use all the features of Norton 360, you must use thefollowing versions of Norton security product:If you use an older vers

Page 302

You can also copy and edit the required fields from theselected card in the Login Assistant window. Bydefault, the important data such as Passwords, C

Page 303 - About Norton AntiSpam

4Use the following tabs to type your card details:Provide details such as cardname, name, gender, and dateof birth. You can set a passwordand provide

Page 304

You can view a summary of the card that you created.You can select any of the cards that are present in thelist of cards at the left pane of the Edit

Page 305 - About spam filtering features

3In the Edit Identity Cards window, select the cardthat you want to delete.4Click Delete Card.5In the Warning dialog box, click Yes.6Click Close.To du

Page 306

identity numbers that you use when you browse theWeb. The Edit Notes option in Identity Safe stores allyour sensitive IDs in a very secure way and let

Page 307 - 1 Windows Mail

4Click Edit Notes, and modify the information underDetails.You can change the category, modify the title, andedit the additional information that you

Page 308

1 Merge the imported data in to the vault that youare currently logged in.1 Replace the existing Identity Safe data that youstored in your vault that

Page 309

Importing your Identity Safe dataYou can import your Identity Safe data from the filethat you previously backed up. You can also import theIdentity Sa

Page 310 - AntiSpam

3In the Import Identity Safe Data window, underImport my data from, select one of the followingoptions:1 Portable Profile (Drive: Drive:\)This option

Page 311

You can configure the following options in theBrowsing Options window:Configures Identity Safe todisplay your logins each timeyou visit a Web site tha

Page 312 - 1 Domain

1 Any Web site URL that your product identifies asfraudulent1 All the Web site URLs that you visited before thedetection of a risk1 The applications a

Page 313

About Password & SecurityYou can use Password & Security to change yourIdentity Safe password. You can also use this option toset the level of

Page 314

Password Security381Securing your sensitive dataAbout securing your sensitive data

Page 315

Specify the Identity Safepassword security level.Identity Safe provides fourlevels of security to protectyour Identity Safe password.Choose one of the

Page 316 - About Web Query

period. You can specifythe idle time-out periodas 15, 30, or 45 minutes.Use this option if otherpeople have access toyour computer.1 Ask for my passwo

Page 317

the password by using the Password & Security optionin Settings window.If you want to change the Identity Safe password ofyour online vault, the p

Page 318

You have the following options in the NortonToolbar:Lets you access IdentityProtection and other settings.The following options areavailable in the No

Page 319

Lets you access the Identity Safedata stored in your online vault.You can add, edit or delete yourLogins, Cards, and Notes underthis section.You can u

Page 320 - About Network Cost Awareness

Lets you view the logins andcards that you have saved inIdentity Safe.Some Web sites have forms tofill or require login information.You can use the Va

Page 321 - 1 No Traffic

In Google Chrome Web browser, the Norton Toolbarcan be accessed as a Chrome Extension. In theExtensions page of the Chrome browser, you can enableor d

Page 322

When you hide the toolbar, Norton 360 does not displaythe Norton Site Safety pop-up window. However,Norton 360 notifies you about suspicious andfraudu

Page 323

option in the Administrative Settings window. Youcan also review the data, which Norton CommunityWatch collects and submits to Symantec, in theSecurit

Page 324

2In the main menu that appears, click Tools >Extensions.3Under Extensions page, click Show button option.Accessing Identity Safe settings from the

Page 325

2On the NortonToolbar, in the Norton menu, selectone of the following:Lets you report to Symantecabout the current Antiphishingevaluation.Report SiteL

Page 326 - About Antiphishing

Lets you turn on the Norton SafeWeb feature which provides asafe online browsing experience.The following are the uniquefeatures of Norton Safe Web:1

Page 327

Accessing the Vault Open/Vault Closed menuThe Vault Open/Vault Closed menu on the NortonToolbar lets you view and manage the logins, Identitycards, an

Page 328

2On the Norton Toolbar, in the Vault Open/VaultClosed menu, select one of the following:Lets you merge the IdentitySafe data from your portableMerge P

Page 329 - About Norton Safe Web

Settings395Securing your sensitive dataAbout securing your sensitive data

Page 330

Lets you view the variousoptions that are available inIdentity Safe.The options are:1 Edit LoginsLets you open the EditLogins window.1 Edit Identity C

Page 331

autofill the logininformation in the currentWeb page.Lets you open the NortonFeedback Web site.You can submit feedback onyour experience with Identity

Page 332

Securing your sensitive dataAbout securing your sensitive data398

Page 333

This chapter includes the following topics:1 About the Network Security MapAbout the Network Security MapA home network typically consists of the comp

Page 334

Chapter 4 Scanning your computer ... . ... . 163About the Norton 360 scans ... . ... . ... 163About Computer Scan ... ...

Page 335

computer. Your computer might be infected with avirus if you experience any of the following symptoms:1 You cannot install Norton 360.1 You cannot sta

Page 336 - 1 Click Search

1 Subscription status and Norton product version ofthe computers that are connected to your network1 Status of your wireless network connection1 Conne

Page 337

wNorton 360 requires you to configure the SymantecSecurity Driver to open the Network Security Map. Youcannot install the Symantec Security Driver whe

Page 338

To view the details of a device on the Network SecurityMapProtecting your home networkAbout the Network Security Map402

Page 339

4In the NetworkSecurityMap window, click a deviceicon.You can use the scroll arrows to view the devicesthat are listed in the network map.The device d

Page 340

Shows the category to which thedevice belongsThe device category iconprovides details on theconnection status and securitystatus. Norton 360 labels al

Page 341 - About Identity Safe vaults

Shows the access level that isgranted to a remote device toconnect to your computerThe initial trust level is set basedon the configuration of yourcom

Page 342

You can click each of the features and read thesummary to learn more about using Network SecurityMap to manage your home network. By default, theNetwo

Page 343 - 1 Reset your Identity Safe

wEnsure that the computers that you want to remotelymonitor have a version of a Norton product thatsupports Remote Monitoring.Norton 360 requires a Pa

Page 344

Turning off Remote MonitoringWhen you turn off Remote Monitoring, you stop remotemonitoring of the computers that are connected toyour network.You can

Page 345

You can add the following details when you add adevice:1 The name or description1 The IP address or physical addressThe Network Security Map finds any

Page 346

Programs containingmalicious codes that aredisguised as or hiding insomething benign, such as agame or utility.Trojan horsesTools that are used by aha

Page 347

6In the IP or Physical Address box, type the IPaddress or physical address of the device that youwant to add to the Network Security Map.You can use t

Page 348

To find the IP address by using ipconfig on WindowsVista1On the computer you want to identify, on theWindows taskbar, click Start.2In the Start Search

Page 349

help you identify the devices that are listed in thenetwork map.To edit the details of the device that is on your network1In the Norton 360 main windo

Page 350 - Resetting Identity Safe

To edit the name of the device that you added manually1In the Norton 360 main window, click Settings.2In the Settings window, under Detailed Settings,

Page 351 - Accessing Identity Safe

network. The initial network trust level is set based onthe configuration of your computer.wEnsure that you change the trust level of a device toFull

Page 352 - 1 The Norton Toolbar

To change the trust level of your network1In the Norton 360 main window, click Settings.2In the Settings window, under Detailed Settings,click My Netw

Page 353

6To select a trust level for a network, in the EditNetwork Trust Level window, click one of thefollowing:Adds the network to the TrustedlistFULL TRUST

Page 354

Adds the network to theRestricted listThe devices that are onRestricted network cannotcommunicate with yourcomputer. However, you can stilluse the net

Page 355

6To select a trust level for a device, in the EditDeviceTrust Level window, click one of the following:Adds a device to the Full TrustlistFull Trust d

Page 356 - Securing your sensitive data

computer increases the scan time which slows downthe network speed of your computer.If you know that a specific device on your network issafe, you can

Page 357 - 1 Change your login settings

Programs that track systemactivity, gather systeminformation, or track userhabits, and relay thisinformation to third-partyorganizations. Theinformati

Page 358

5In the Network Security Map window, do one ofthe following:1 To edit the trust level of a device that is on yournetwork, in the network map, click th

Page 359 - About Edit logins

When you remove an individual device, the onlinedevices appear again the next time you open theNetwork Security Map. However, Norton 360permanently re

Page 360

For more information on how to secure your wirelessnetwork, on the left side of the Network Security Mapwindow, click the Why is it not secure link. F

Page 361 - Saving logins

To view the device details1In the Norton 360 main window, click Settings.2In the Settings window, under Detailed Settings,click My Network.3In the Net

Page 362 - Editing logins

2In the Settings window, under Detailed Settings,click My Network.3In the Communication Port box, type a newcommunication port number.You must use the

Page 363

This chapter includes the following topics:1 About Tuneup1 About disk and file fragmentation1 Optimizing your permanent disks manually1 About using op

Page 364 - 1 Click Validate

Tuneup detects and fixes common computer problems,cleans up unwanted cookies and files, and defragmentsthe hard disk to optimize PC performance.About

Page 365

wYou can run Disk optimization only when disk has morethan 15 percent of free space.Some programs, such as movie-editing programs orprograms that requ

Page 366

Norton 360 automaticallyoptimizes the hard disk asneeded. You can also set aschedule for optimization.Set a schedule foroptimizationLarge files are of

Page 367

When you browse a Webpage, your browserdownloads the text andgraphics that comprise thecontents of the page. Whenyou finish viewing the page,the brows

Page 368 - About Edit Cards

You can download Norton Bootable Recovery ToolWizard in one of the following ways:1 From the Start menu.1 From the Norton Support Web site.To download

Page 369 - 1 Automatically fill forms

2When the activity is complete, in the Tuneupwindow, click Close.Running Registry CleanupThe Windows registry can contain the entries that referto fil

Page 370 - Adding cards

About Startup ManagerSome programs are configured to launch during startupof your computer. The number of startup itemsincreases as you install new ap

Page 371

program and measure the performance of yourcomputer the next time you start your computer.Norton 360 delays the start of the delayed programsby five m

Page 372

To disable startup items1In the Norton 360 main window, click Tuneup, andthen click Run Startup Manager.2In the On/Off column, uncheck a program that

Page 373 - About Edit Notes

To run delayed startup items manually1In the Norton 360 main window, click Tuneup, andthen click Run Startup Manager.2In the Startup Manager window, c

Page 374 - Editing Notes

This chapter includes the following topics:1 About Norton Backup and Restore1 About backups1 About backup preparation1 About backup set1 Backing up yo

Page 375

About backupsOne of the most important ways to protect the valuableinformation on your PC is to back up your filesregularly. In case you lose your dat

Page 376 - 1 Plain text

No matter which backup method you choose, you canalways add or remove items from the set of files thatyou select to back up. You can add or remove ani

Page 377

You can choose from a varietyof file types, such as photos,documents, and music. Youcan also specify individualfiles.You have the followingoptions:1 S

Page 378 - About Browsing Options

Where439Protecting your media and dataAbout backup preparation

Page 379 - 1 Ask before saving

About locating your Norton Product Key or activationPINTo use Norton Bootable Recovery Tool, you must startthe computer from any of the following reco

Page 380 - About Password & Security

You can choose any storagelocation that Norton 360offers for your backuplocation, depending on yourPC and the connecteddevices.You can choose to store

Page 381 - Password Security

available in the Settingswindow.You can have Norton 360back up your files when yourcomputer is idle. You can alsoset a regular backup scheduleor manua

Page 382

you can create a backup set to back up your picturefiles and music files to a CD. You can also createanother backup set to back up your Microsoft Offi

Page 383 - 1 Ask for my password

set to back up your pictures to your local fixed disk.You can create another backup set to back up yourvideos to a CD. You can also configure differen

Page 384

name does not describe the backup set after you modifythe configuration.wThe maximum character length of a backup set nameis 32 alphanumeric character

Page 385

sorts them into various categories. It then backs up thefiles that fall into these categories.Norton 360 uses the following file categories:This categ

Page 386

This category includes, but isnot limited to: MPEG AudioStream, Layer III files (.mp3);MPEG-4 Video files (.mp4);MPEG-4 Audio Layer files(.m4a); Apple

Page 387

This category includes, but isnot limited to: MicrosoftMoney files (.mny, .mn1,.mn2, .mn3, .mn4, .mn5,.mn6, .mn7, .mn8, .mn9,.mn10, .mn11, .mn12, .mn1

Page 388

This category includes, but isnot limited to: MicrosoftWindows Media files (.wmv);Apple QuickTime Video Clipfiles (.mov); MPEG 1 SystemStream files (.

Page 389

This category includes, but isnot limited to: MicrosoftWord documents andtemplates (doc, .dot);Microsoft Excel Worksheetand templates (.xls, .xlt,.xla

Page 390

1 If you received your Norton product preinstalledby the computer manufacturer, the Product Key isavailable on your Norton Account. When you areprompt

Page 391

This category includes, but isnot limited to: MicrosoftOutlook Address Book files(.wab); Microsoft PersonalAddress Book files (.pab);Palm Address Book

Page 392

.fm file extension in the Office Documents category,you can add the .fm file extension to the category.The Edit File Type option on the What tab of th

Page 393

with the file extension that you added and backs themup to that file category. For example, if you want toback up the documents with a .fm file extens

Page 394

Removing a file extension from a backup categoryEach backup file category contains a list of fileextensions. However, you can remove a default fileext

Page 395 - Settings

4In the window that appears, click Reset Defaults.5Click Save.Deleting previously backed up filesYou can delete the files that you backed up previousl

Page 396

2On the Summary tab, in the Backup set namedrop-down list, select the backup set that you wantto delete.3Under Things you can do, click Delete backup

Page 397

Adding files and folders to a backup setYou are not limited to backing up the files that Norton360 automatically detects and places into its filecateg

Page 398

4In the file selection window that appears, navigateto file that you want to add, click to select it, andthen click Open.5Click OK.6In the Manage Back

Page 399 - Protecting your

You can exclude a file or folder from the backup setfrom Windows Explorer by using the shortcut menu.The shortcut menu is available after you configur

Page 400

6In the Manage Backup Sets window, click SaveSettings to save the settings.To exclude a file or folder from a backup set in WindowsExplorer1In Windows

Page 401

Creating Norton Bootable Recovery Tool on a CD orDVDNorton Bootable Recovery Tool is integrated withWindows Preinstallation Environment (WinPE).Theref

Page 402 - Protecting your home network

following table to choose a location that best meetsyour needs for safety, speed, and storage capacity:Your subscription to Norton 360comes with an al

Page 403 - 1 The device does not have a

This choice backs your files upto a special folder on drive C ofyour PC. Backing up to drive C isvery quick and convenient, andis only limited to the

Page 404

CD, DVD, or Blu-ray discsProtecting your media and dataAbout backup set462

Page 405

This choice requires that youhave recordable CDs, DVDs, orBlu-ray discs and an optical drivein your PC to record on thosediscs. You must be present to

Page 406 - Setting up Remote Monitoring

location for the first time, Norton360 prompts you to configurethe optical backup drive on yourcomputer. Norton 360 lets youinstall the optical driver

Page 407

Flash drives and the other datastorage devices that areattached to your PC can alsoserve as backup locations.Norton 360 displays suchdevices as extern

Page 408 - Turning off Remote Monitoring

3On the Where tab, select the location and devicewhere you want your backups to be stored.If the device or location does not appear on the list,click

Page 409 - 1 The name or description

Viewing or changing a backup scheduleNorton 360 lets you schedule backups when it isconvenient for you. You can schedule your backups torun late at ni

Page 410

Choose this option to haveNorton 360 backup your filesonly when you start thebackup yourself.Manual ScheduleYour computer's performance is maximi

Page 411 - Editing device details

To delete a backup set1In the Norton 360 main window, click Backup, andthen click Manage Backup Sets.2On the Summary tab, in the Backup set namedrop-d

Page 412

Creating Norton Bootable Recovery Tool ISO fileYou can create a Norton Bootable Recovery Tool ISOfile on your computer. You can burn this ISO file to

Page 413 - Editing network details

Whether you have set Norton 360 to back up your PCautomatically or not, you can always run a backup. Forexample, you have added or modified important

Page 414

When you restore files, you can change any of thefollowing settings:You can choose any of thebackup sets to restore thefiles.If you backed up your dat

Page 415

You can restore to theoriginal locations of the files,or navigate to a new locationwhere you can restore yourfiles. Norton 360 displays thetotal numbe

Page 416

Choosing where to restore files fromWhen Norton 360 restores files, it displays the backuplocation of the most recent backup set you ran. Youcan chang

Page 417

Selecting files to restoreWhen you restore backed-up files with Norton 360, youmight not need to restore all the files from a backup.You can restore t

Page 418

You can use any of the following methods, and you cancombine methods, to select files to restore:You can restore all thebacked-up files withoutexcludi

Page 419

2Under Files, in the Search text box, type all or partof a file name, or the extension of the file.3Click Search.The window that appears displays the

Page 420

wRestoring files to their original locations deletes newerversions of the same files that are stored in thoselocations. If you do not want to replace

Page 421

When you insert an optical disc that contains thebacked-up files, the Autorun Restore featureautomatically opens the Portable Restore window.wIf you d

Page 422 - Viewing the device details

To restore files using Norton 360 Autorun Restore1Insert an optical disc that contains the backed-upfiles.2Click the ARestore icon to launch the Autor

Page 423 - Security Map

To create Norton Bootable Recovery Tool on a USB key1Insert the USB key into the USB port of yourcomputer.2In the Norton Bootable RecoveryTool Wizard

Page 424

destinations where your files are backed up. Eachbackup destination contains the backup sets to whichthe backup destination is configured.Norton Backu

Page 425 - Keeping your PC

Viewing backup files on the Norton Backup DriveYou can use the Norton Backup Drive to view the filesthat are backed up. You can view the Norton Backup

Page 426

2Select the backup destination, and navigate to thebackup set destination that contains the file thatyou backed up.3Do one of the following:1 Right-cl

Page 427

About solutions to the backup problemsThe following table provides some tips to help youavoid backup problems.The following tips apply to allbackups:1

Page 428

The following tips apply tobackups to CDs or DVDs:1 Have extra discs on handwhen you back up. Thistip helps you to avoidoccasional disc flaws orsituat

Page 429

The following tips apply tobackups to external drives:1 Some drives use olderWindows file systems,such as FAT-16 or FAT-32that cannot store fileslarge

Page 430 - Running Diagnostic Report

The following tips apply tobackups to online storage:1 Make sure that your PCdoes not automaticallydisconnect from theInternet when it is not inuse.1

Page 431 - About Startup Manager

and search the Symantec Knowledge Base for solutionsto your problem.To get additional help with backup problems1In the Norton 360 main window, click S

Page 432

Although online backup is convenient and safe, beforechoosing it for your backup method, consider thefollowing limitations:Speed limitationsProtecting

Page 433 - Managing startup items

The amount of time that it takesto transfer your backup to theSecure Online Storage dependson the speed of your Internetconnection. If you have manyfi

Page 434

If you have a valid Norton product key or activationPIN, you can go to your Norton Account and access theNorton Bootable Recovery Tool download link.T

Page 435

up your smaller files, such asyour financial documents andword-processing documents.If a backup is in progress, youshould leave your computerturned on

Page 436 - About backups

1 The amount of online storage space that is availableto youYour product needs to be activated to use the onlinebackup feature. The first time you con

Page 437 - About backup preparation

storage does not contain sufficient space for thebackup, Norton 360 notifies you and provides you anoption to buy more space.You do not have to wait u

Page 438

all automatic backup of files. You can use the RunBackup Now option in the main window if you want toback up your files from all the backup sets.You c

Page 439

Turning off or turning on backup settingoptionsNorton 360 provides you various options to manageyour backup settings. Norton 360 backup settings letyo

Page 440

Indicates that the file has beenexcluded from backupNorton 360 displays a disabledbackup status on a file when youexclude the file from any of theback

Page 441 - About backup set

3In the Backup Settings window, do one of thefollowing:1 To turn off icon overlays, in the Backup StatusOverlays row, move the On/Off switch to therig

Page 442 - Creating a new backup set

This chapter includes the following topics:1 About Norton 360 Settings1 Customizing Norton 360 Settings1 Turning on or turning off Quick Controls serv

Page 443

You can configure the following Detailed Settings inthe Settings window:Specify how certain types ofviruses and spyware, as well asother threats, are

Page 444 - About backup file categories

View all the devices available inyour network and specify thetrust level of the devices that areconnected to your network.You can hide or show theNetw

Page 445

About Download Insight .. . ... ... ... 293About Norton AntiSpam . . ... . ... ... 303About configuring POP3 and SMTPpor

Page 446

Norton Bootable Recovery Tool automaticallydownloads the latest virus definitions from Symantecservers and uses these virus definitions to secure your

Page 447

Configure Identity Safe to secureyour online identities andtransaction data.You can also configure SafeSurfing options.Identity ProtectionSpecify when

Page 448

The Quick Controls in the Settings window let youturn on or turn off the following services:Turns on or turns off Silent ModeYou can turn on Silent Mo

Page 449

Turns on or turns off SmartFirewallWhen you turn on SmartFirewall, it monitorscommunications between yourcomputer and the othercomputers on the Intern

Page 450 - About backup file extensions

provides the slider setting for you to decide whetherto resolve security threats automatically or ask youbefore it takes an action.1 You can configure

Page 451

1 Safe Surfing1 Identity Safe1 Backup1 Backup Status Overlays1 Automatic LiveUpdate1 Smart Firewall1 Norton Tamper ProtectionYou should leave all of t

Page 452

You can use the following Antivirus settings:The Automatic Protectionsettings let you control thescanning and monitoring of yourcomputer.It protects y

Page 453

Scans and RisksCustomizing settingsAbout Antivirus settings506

Page 454 - 1 Where tab

Scans and Risks settings let youcustomize the scans that Norton360 performs on your computer.You can use the following Scansand Risks options:1 Comput

Page 455

Norton 360 to protect theports.1 Email Antivirus ScanEmail Antivirus Scan protectsyou from the threats that aresent or received in emailattachments.Th

Page 456

1 Exclusions / Low RisksExclusions options specifythe items such as folders,files, and drives that youexclude from Norton 360scans. Scans, signatures,

Page 457

4Read the Norton License Agreement, type yourProduct Key, and then click I Agree.If you use a non-QWERTY keyboard, use the VirtualKeyboard option to e

Page 458

Antispyware protects yourcomputer against the securityrisks that can compromise yourpersonal information andprivacy.Norton 360 protects yourcomputer f

Page 459 - About backup locations

About Automatic Protection settingsThe Boot Time Protection option on the AutomaticProtection tab provides an enhanced security levelfrom the time you

Page 460

You can use the following Real Time Protectionoptions:Auto-ProtectCustomizing settingsAbout Antivirus settings512

Page 461

Auto-Protect loads intomemory and providesconstant protection while youwork. It checks for virusesand other security risks everytime that you run prog

Page 462

boot virus infects yourremovable media, ensurethat Auto-Protect isturned on to rescan theremovable media. Youthen insert the removablemedia and open i

Page 463

SONAR Protection515Customizing settingsAbout Antivirus settings

Page 464

Symantec Online Network forAdvanced Response (SONAR)provides the real-timeprotection against threatsand proactively detectsunknown security risks onyo

Page 465 - Choosing a backup location

360 to automaticallyremove low-certaintythreats if it does not getany response from youwhen SONAR AdvancedMode option is enabled.1 Show SONAR BlockNot

Page 466

You can use the following Scans and Risks settings:Computer ScansCustomizing settingsAbout Antivirus settings518

Page 467

Norton 360 lets you run differenttypes of scans to detect andprevent any virus infection onyour computer. The scans areQuick Scan, Full System Scan,an

Page 468 - Deleting a backup set

To update Norton Bootable Recovery Tool virusdefinitions on a USB key1Insert your Norton Bootable Recovery Tool USB keyinto the USB port of your compu

Page 469 - Backing up your files

Scans for rootkits and othersecurity risks that might behidden on your computer.1 Network Drives ScanScans the network drivesthat are connected to you

Page 470 - Restoring files

1 Full System ScanScans your computer whenit is idle.When your computer is idle,Norton 360 runs a FullSystem Scan. After the scanis complete, you can

Page 471

The Scan Performance Profilessettings let you configure howNorton 360 should scan yourcomputer based on the digitalsignature and trust level of thefil

Page 472

Protected Ports settings protectthe POP3 and SMTP ports ofyour email program.You can use this option tomanually configure your POP3and SMTP email port

Page 473

Exclusion / Low RisksCustomizing settingsAbout Antivirus settings524

Page 474 - Selecting files to restore

Exclusions options specify theitems such as folders, files, anddrives that you exclude fromNorton 360 scans. Scans,signatures, and low-risk itemsare s

Page 475

also remove items from theexcluded-items list.1 Signatures to Exclude fromAll DetectionsLets you select known risksby name and remove a riskname from

Page 476

The Insight Network scan usesthe Cloud technology wherein aremote server on the Webcontains the latest virusdefinitions. Norton 360 scansyour computer

Page 477

UpdatesCustomizing settingsAbout Antivirus settings528

Page 478 - 1 The name of the backup set

Norton 360 protects yourcomputer from vulnerabilitiesthrough the latest program anddefinition updates. Definitionupdates contain the informationthat l

Page 479

2In the page that appears, click Download NortonPower Eraser.3Save the NPE.exe file to your Desktop.4Double-click the NPE.exe file on your Desktop.5Re

Page 480

Definitions are a subset ofvirus definitions.1 Apply updates only onrebootLets you choose how theprogram updates obtainedby Automatic LiveUpdateneed t

Page 481 - Backup Drive

The following tabs are available in the Firewall settingswindow:Lets you activate the generalfirewall features andcustomize the ports that yourcompute

Page 482

Prevents intrusion attemptsand protects your Webbrowser from attacks bymalicious Web sitesYou can use the DownloadIntelligence option that isavailable

Page 483 - 1 Regularly check the

Lets you activate theadvanced protection featuresof Smart FirewallThe advanced settings let youturn on or turn off theAutomatic Program Controlfeature

Page 484

About Firewall General settingsSmart Firewall General settings let you activate thegeneral firewall features and customize the ports thatyour computer

Page 485 - 1 To avoid accidentally

Automatically allows the Internettraffic that matches theconnections that an applicationopens.Check this option to do thefollowing:1 Analyze the netwo

Page 486

to date. If you do not use Automatic LiveUpdate, youshould run LiveUpdate once a week.Norton 360 also provides the Web Browser Protectionfeature to pr

Page 487

when Automatic Program Control is set to Aggressiveor Automatic. You can use this option to specify howNorton 360 must control any network traffic tha

Page 488 - Speed limitations

triggers the allowed event is added to the trusted listof its corresponding category in Advanced EventsMonitoring. You can remove the application from

Page 489 - 1 Low usage

Monitors the Trojan horses andother malicious programs thatbypass network traffic.These programs penetrate theWindows TCP/IP layer to sendand receive

Page 490

Automatic updates require an Internet connection. Ifyou use a proxy server to connect to the Internet, youmust configure the proxy settings in your pr

Page 491

Norton AntiSpam settings help you configure thefollowing:1 The email client with which Norton AntiSpamshould integrate1 The list of allowed email send

Page 492

The options on the ClientIntegration tab let you integrateNorton AntiSpam with youremail clients to keep you freefrom unsolicited emailmessages. You c

Page 493

Lets you check the SymantecWeb servers to filter the spamemail messages which the localfilters classify as legitimate.Web QueryLets you configure your

Page 494

Norton 360 supports NortonAntiSpam integration with theaddress books of email clientsfrom which you want NortonAntiSpam to import emailaddresses.You c

Page 495

You can use the Configure option in the NetworkSecurity Map row to access Network Security Mapwindow. The Network Security Map window providesa pictor

Page 496

Removes all of the devices that arelisted in Network Map.You can purge Network Map if youwant to create a new list of devices.For example, you can pur

Page 497 - Customizing

Shows the communication port thatNorton products use to communicatewith each other over the network.If you change the communicationport number on your

Page 498 - About Norton 360 Settings

1 Select the files that are required to be backed up.1 Choose the location to store the backed up files.1 Assign a schedule to run a backup.In additio

Page 499 - 499Customizing settings

Lets you view the backup statusof a file by adding the statusoverlay to the file’s iconThe status overlays that appearsare:1 Green icon with a check m

Page 500

Lets you add or exclude a file ora folder to a backup set by usingthe right-click shortcut menuYou can use this option after youconfigure Backup in th

Page 501 - 501Customizing settings

wLiveUpdate does not download the latest definitionupdates and program updates, if the Network CostAwareness option in the Settings window is set to N

Page 502

Lets you specify the amount oflocal disk space that you want toreserve.When you perform an onlinebackup, Norton 360 creates atemporary file in your lo

Page 503

Antiphishing tells you the following things about theWeb pages that you visit:1 If it is safe to enter confidential information1 If the Web page is kn

Page 504 - About Antivirus settings

log in to Identity Safe. The password protects you byrestricting unauthorized access to your data in IdentitySafe.The Identity Safe feature provides y

Page 505 - 505Customizing settings

AdviceDescriptionFeatureYou can use theinformation thatyou store in thecards to do thefollowing:1 Automaticallyfill forms1 Providesensitiveinformation

Page 506

AdviceDescriptionFeatureIt becomesdifficult tomanage variousidentitynumbers. EditNotes stores allof your sensitiveIDs in a verysecure way andlets you

Page 507 - 507Customizing settings

Task Scheduling includes the following settings:Lets you specify the tasks thatshould run in the backgroundautomatically when yourcomputer is idleThes

Page 508

SchedulingCustomizing settingsAbout Task Scheduling settings556

Page 509 - 509Customizing settings

Lets you schedule PC Securityand PC Tuneup related activitiesYou can specify how oftenNorton 360 should scan yoursystem for security andperformance is

Page 510

idle when there is no detectablemouse or keyboard activity for aperiod that you specify as idletimeout duration. When youschedule your scans weekly or

Page 511

Lets you view how Norton 360has protected you for the past30 days.This report includes theactivities that Norton 360performed to protect yourcomputer.

Page 512

The type of definition updates that each of theSymantec products receive are as follows:Users of these productsreceive the latest virusdefinitions fro

Page 513 - 513Customizing settings

Lets you specify the automaticconfiguration details, proxysettings, and the authenticationdetails to connect to theInternet.Programs such as LiveUpdat

Page 514

Lets you submit selectedsecurity and application data toSymantec for analysis.Norton Community Watchprotects you against newpotential risks. It collec

Page 515 - 515Customizing settings

Lets you remotely view yourdevice’s security status and fixsome security issues by usingNorton Management, NortonOne, and Norton Studio. NortonStudio

Page 516

Performance Monitoring563Customizing settingsAbout Administrative Settings

Page 517 - 1 Show SONAR Block

Lets you monitor theperformance of your computer.When the PerformanceMonitoring option is turned on,Norton 360 monitors the CPUusage and memory usage

Page 518

Norton 360 saves the eventin the Security History logbut does not alert you withthe notifications. You canalso turn off this option ifyou do not want

Page 519 - 519Customizing settings

1 Use Low Resource Profile OnBattery PowerLets you configure Norton360 to change the resourcethreshold to low profile whenyour computer runs onbattery

Page 520

1 High-Usage Alert for:2 CPUWhen this option isturned on, Norton 360detects and notifies youabout the increasedusage of the CPUresource by any program

Page 521 - 521Customizing settings

1 Program ExclusionsLets you select specificprograms to exclude fromappearing in performancealerts.You can use the Configureoption to list the program

Page 522

Lets you secure the product andprotect it from unauthorizedchanges.You have the following options:1 Non-Admins Access toSettingsLets you access andcon

Page 523 - 523Customizing settings

Users of these productsreceive the latest virusdefinitions fromSymantec that protectsyour computer from alltypes of security threats.In addition, user

Page 524

Silent Mode SettingsCustomizing settingsAbout Administrative Settings570

Page 525 - 525Customizing settings

Lets you turn on or turn offSilent Mode.You have the following options:1 Silent ModeWhen you turn on the SilentMode option, you enableSilent Mode for

Page 526

When you use a MediaCenter application torecord a TV program,Norton 360 detects theactivity, andautomatically turns onQuiet Mode. When QuietMode is tu

Page 527

Lets you delay the automaticrunning of Norton-specificbackground tasks when youresume your computer fromhibernate mode or standbymode.Automatic Resume

Page 528

Lets your PC run smoothly andefficiently by deleting theunused temporary files andbrowsing history if you useFirefox Web browser.Norton 360 automatica

Page 529 - 529Customizing settings

If you want to temporarily turn off Norton ProductTamper Protection, you can turn it off for a specifiedduration.wYou cannot run System Restore on you

Page 530 - About Firewall settings

To turn on Norton Product Tamper Protection1In the Norton 360 main window, click Settings.2In the Settings window, under Detailed Settings,click Admin

Page 531 - 531Customizing settings

You can turn off the Settings Password Protectionoption if you no longer require password protectionfor your Norton 360 Settings.Securing your Norton

Page 532

Turning off Norton 360 Settings passwordYou can protect your Norton 360 Settings with apassword using the Settings Password Protectionoption. If the S

Page 533 - 533Customizing settings

wThe reset settings password option appears in theSelect Uninstall Preference window only if theSettings Password Protection option is turned on. Tous

Page 534

Contains the most importantvirus definitions that arerequired for latest securitythreats as viewed by Symantec.The Core Set is a subset of theComplete

Page 535 - 1 Block the suspicious

About Remote ManagementThe Remote Management feature lets you remotelymanage Norton 360 using Norton Studio app, NortonManagement, and Norton One. It

Page 536

By default, the Remote Management option is turnedoff. You can turn on this option if you want to remotelymanage Norton 360 on your device.In the Nort

Page 537

2 Auto-Protect2 Scan incoming emails2 Scan outgoing emails2 Antispyware2 Intrusion Prevention2 SONAR2 Antiphishing2 Browser Protection1 Perform the fo

Page 538

To turn on Remote Management1In the Norton 360 main window, click Settings.2In the Settings window, under Detailed Settings,click Administrative Setti

Page 539

Customizing settingsAbout Administrative Settings584

Page 540

This chapter includes the following topics:1 Finding the version number of your product1 Finding the End-User License Agreement1 About upgrading your

Page 541 - About Filter settings

Finding the End-User License AgreementEnd-User License Agreement (EULA) is a legaldocument that you agree to while installing theproduct. EULA contain

Page 542

turn on the Automatic Download of New Versionoption. To turn on the Automatic Download of NewVersion option, go the Norton 360 main window, andthen cl

Page 543 - About My Network settings

updates. You can use LiveUpdate to obtain the latestupdates.The upgrade process might not work if your Webbrowser is incompatible to communicate with

Page 544

To check for a new version of the product1In the Norton 360 main window, click Support.2In the Support drop-down menu, click Check forNew Version.This

Page 545 - 545Customizing settings

installation time, lesser boot time, and lesser memoryconsumption. It also occupies lesser amount of diskspace as compared to the full set of virus de

Page 546 - About backup settings

configure the proxy settings of Norton 360. See“Configuring Network Proxy Settings” on page 67.If you do not know your proxy settings, contact yourInt

Page 547

4In the Checking Your Connection window, clickRetry.5If you use a proxy server to connect to the Internet,you may be prompted to authenticate. If you

Page 548

To stay informed about protection issues1Open your Web browser, and go to the followingURL:http://www.symantec.com2In the Symantec Web site, click Nor

Page 549 - 549Customizing settings

wSupport offerings may vary based on the language orproduct.About Norton Support Web siteThe Norton Support Web site provides a full range ofself-help

Page 550

contact the technical support team in the followingways:Chat in real time with asupport representative.For more complex technicalissues, chat offers t

Page 551

also use the SearchSupport box to find solution usinga keyword.Norton Support Web site also contains useful links tothe product manual, the Norton Acc

Page 552 - 1 Quickly

Getting support by phoneWhen you click the Get Support option in the Supportdrop-down menu, Norton Autofix performs a QuickScan and should repair your

Page 553

Support policySymantec recommends that you have the latest versionof the product, as it contains new and enhancedfeatures for better protection agains

Page 554

If you are a Norton One Premium Member, go to thefollowing Norton One support Web site for informationon this topic:https://one.norton.com/supportClub

Page 555 - 555Customizing settings

Uninstalling Norton 360You can remove Norton 360 from your computer in thefollowing ways:1 From Windows Control Panel1 From the Start menuwYou should

Page 556

Chapter 13 Customizing settings ... . ... . ... .. 497About Norton 360 Settings ... ... ... 497Customizing Norton 360 Se

Page 557 - 557Customizing settings

turn off or turn on the Automatic LiveUpdate optionfrom Quick Controls in the Settings window.wIf you are connected to the Internet, AutomaticLiveUpda

Page 558 - About Administrative Settings

To uninstall Norton 360 from Windows Control Panel1Do one of the following:1 On the Windows Taskbar, click Start > ControlPanel.1 In Windows 8, go

Page 559 - 559Customizing settings

5To uninstall Norton 360, click Next.6If Norton 360 offers to install the Norton Toolbarafter uninstall, do one of the following:1 To keep the Norton

Page 560

3To uninstall Norton 360, click Next.4If Norton 360 offers to install the Norton Toolbarafter uninstall, do one of the following:1 To keep the Norton

Page 561 - 561Customizing settings

Aabout customer support 593Actions windowdeleting security risks 139performing actions 139restoring security risks 139submission, items toSymantec 139

Page 562

attentioninfected files 234infected items 172resolve any items 172Attention Requiredabout 172resolving the risk 172Auto-Protectnotifications 229Automa

Page 563 - 563Customizing settings

Browser Protectionturning on and turning off 290Browsingoptions 378Browsing Optionsabout 378Ccache files 428Cardsabout 368adding 370deleting 371duplic

Page 564

detectingsecurity risks 228deviceadding 408editing details 411excluding from IntrusionPrevention scan 418purging from exclusion list 292remotely monit

Page 565 - 565Customizing settings

firewall rules (continued)removing 277turning on and off 275Firewall settingsadding programs 259foldersscanning 245fragmentation 426Full Screen Detect

Page 566

Internet (continued)temporary files 245, 428Intrusion AutoBlockblocking computerspermanently 289turning on and off 288unblocking computers 289Intrusio

Page 567 - 567Customizing settings

multipartite viruses 241NNetworkchanging trust level 413discovering devices 406editing details 413forming 406joining 406managing 399Network Cost Aware

Page 568

presence of a specific virus or security threat. Norton360 shows the date on which you last updated the virusand spyware definitions.You can also chec

Page 569 - 569Customizing settings

Norton AntiSpam (continued)Feedback 315settings 539SSL 303Web Query 316Norton Autofixsupport assistants 589Norton Backup and Restore 435Norton Backup

Page 570

Ppasswordchanging 383editing 362Norton Account 29saving 361updating 368PC securitycategories 117PC Tuneupcategories 117disk cleanup 429disk optimizati

Page 571 - 571Customizing settings

Quarantine (continued)managing items 153opening 153removing items 157restoring items 156Quarantined Items viewadding items 125Quick Controlsturning on

Page 572

Safe Webturning off 334turning on 334scan at the command promptcommand line scanning 223Scan Completeappearing after a scan 234Scan Complete windowapp

Page 573 - 573Customizing settings

Settings 497Administrative Settings 558antivirus 504customizing 502firewall 276, 530, 534home network 543Identity Protection 550Quick Controls 503sett

Page 574 - 1 Firefox History Cleanup

Symantec Web siteblogs and forums 591System Insightabout 75Events graph 75monitoring activities 78Performance graph 75system status graphactivity deta

Page 575

Web Query (continued)turning off 317turning on 317Web sitescache files 428Windows temporary files 245wireless networkviewing status 421worms 240Index6

Page 577

fooNorton from Symantec products protect consumers from traditional threats with antivirus, phishing protection, and spywareprotection. They also prot

Page 578

If you do not activate your service orrenew your subscription, you cannotobtain updates of any kind and thesoftware no longer functions.If you purchas

Page 579

that require system restart are automatically appliedthe next time you restart your computer.To turn on or turn off Apply updates only on reboot1In th

Page 580 - About Remote Management

additional and fast protection for the latest threats inbetween the full updates without disrupting your onlineexperience.Even if you do not turn on P

Page 581

About Network Proxy SettingsA proxy server regulates access to the Internet, andprevents external computers from accessing yournetwork. If you are on

Page 582

Network Proxy Settings window lets you specify thefollowing settings:Lets you specify the automaticconfiguration URL or script tomanage Internet acces

Page 583

Lets you connect to the Internetthrough a server that requiresauthentication.Use the Username box andPassword box to type theauthentication details.Au

Page 584

4In the Network Proxy Settings window, do thefollowing:1 If you want your browser to automatically detectnetwork connection settings, under AutomaticC

Page 585 - Finding additional

Indicates that your computerrequires attention.At the bottom section of theNorton 360 main window,click Fix Now to resolve thesecurity threats on your

Page 586 - About upgrading your product

This chapter includes the following topics:1 About Norton 3601 Activation protects you1 About your Norton Account1 About Norton Management1 About Nort

Page 587

When your system status or protection categoriesstatuses are marked as At Risk or Attention, you canresolve the security issues directly from the main

Page 588

You can right-click the icon to see a shortcut menu forNorton 360. You can choose items on the shortcut menuto open the Norton 360 window, to fix any

Page 589 - About Norton Autofix

Use this option to create abackup of your files.You can specify when andhow often Norton 360 backsup your files.Run Backup NowUse this option to revie

Page 590

To view details of a protection feature1In the Norton 360 main window, click on aprotection feature, and then click View Details.In the window that ap

Page 591

Getting StartedAbout Norton 360 status74

Page 592 - About Support

This chapter includes the following topics:1 About System InsightAbout System InsightNorton 360 continuously monitors your computer tokeep it free of

Page 593 - About Norton Support Web site

alerts, or Quick Scans. The graph displays theactivities as icon or stripe, and the description foreach icon or stripe is provided at the bottom of th

Page 594

The Norton Tasks window provides the details suchas the timestamp, the duration, and the status ofthe background jobs. The details also include thetyp

Page 595 - About phone support

About monitoring system activitiesSystem Insight provides information about theimportant system activities that you performed or thatoccurred over a p

Page 596 - Getting support by phone

Indicates the optimizationactivities that you performed onyour system over a period of thelast three months.OptimizedProvides the details about thethr

Page 597 - Worldwide service and support

Norton 360 is completely automated and easy to use.It works quietly in the background to maintain youroverall system integrity with minimal effect on

Page 598 - ClubNorton

Provides the details about QuickScans that Norton 360performed on your system overa period of the last threemonths.The details include the date onwhic

Page 599 - Uninstalling Norton 360

2In the Performance window, at the top of the Eventsgraph, click the tab for a month to view the details.3In the Events graph, move the mouse pointer

Page 600

access the Resource Threshold Profile for Alertingoption, go to the Norton 360 main window, and thenclick Settings > Administrative Settings >Pe

Page 601

Turns on performance alerts.Select this option if you wantNorton 360 to notify you withperformance alerts when aprogram or process exceedsthe threshol

Page 602

3Under Performance Monitoring, in thePerformanceAlerting row, do one of the following:1 To turn off performance alerts, move thePerformanceAlerting sw

Page 603

3Under Performance Monitoring, in the ResourceThreshold Profile for Alerting row, select one ofthe following options:Configures a low thresholdlimit f

Page 604

the program or the process manually and free theresource.If the Use Low Resource Profile On Battery Poweroption is turned on, Norton 360 automatically

Page 605

To exclude a program from performance alerts1In the Norton 360 main window, click Settings.2In the Settings window, under Detailed Settings,click Admi

Page 606

6Click OK.7In the Settings window, click Close.About CPU graph and memory graphNorton 360 monitors the overall system CPU usageand memory usage and th

Page 607

1 The file name, version number, digital signature,the date on which the process was installed.1 The date on which the process was last used andwhethe

Page 608

Includes the performancetuning features, such ascleaning up unwanted filesand performing RegistryCleanup.TuneupDepending on the security status of the

Page 609

2In the Performance window, do one of the following:1 To view the CPU graph, click the CPU tab.1 To view the memory graph, click the Memorytab.1 To ma

Page 610

2In the Performance window, do one of the following:1 To view the CPU graph, click the CPU tab.1 To view the memory graph, click the Memorytab.3Click

Page 611

structures so that they can grow without immediatelybecoming fragmented again.You can optimize your boot volume manually by usingthe Optimize option i

Page 612

can view details such as timestamp, duration, andstatus of the background job.To optimize your boot volume from the Performancewindow1In the Norton 36

Page 613

to optimize the boot volume during idle time. Bydefault, this option is turned on.Turning off or turning on Idle Time OptimizerNorton 360 automaticall

Page 614

You can use the icon that appears before the nameof a background job to start or stop a backgroundtask. You can start or stop a background task at any

Page 615

The Norton Tasks window lets you monitor thefollowing Norton-specific tasks:Automatic LiveUpdateautomatically checks fordefinition updates andprogram

Page 616

Deletes the unnecessary Webpage history that is leftbehind in your Internetbrowser's history folder.Removes the traces of anyInternet searches th

Page 617

Allows the smart scanning offiles on your computer. Itimproves the performance ofNorton 360 scans by lettingyou scan fewer files withoutcompromising t

Page 618

Scans the important locationsof your computer that theviruses and other securitythreats often target.Quick Scan takes less time toscan than a Full Sys

Comments to this Manuals

No comments