Symantec Norton AntiVirus Tr 2012 Manual

Browse online or download Manual for Antivirus security software Symantec Norton AntiVirus Tr 2012. Symantec Norton AntiVirus Tr 2012 User Manual

  • Download
  • Add to my manuals
  • Print
  • Page
    / 504
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 0
Product Manual
Care for our Environment, It's the right thing to do.
Symantec has removed the cover from this manual to reduce the Environmental Footprint of our
products. This manual is made from recycled materials.
Page view 0
1 2 3 4 5 6 ... 503 504

Summary of Contents

Page 1 - Product Manual

Product ManualCare for our Environment, ‘It's the right thing to do’.Symantec has removed the cover from this manual to reduce the Environmental

Page 2

Chapter 4 Responding to security issues ... . . ... 179What to do if a security risk is found ... . . . .. 179Chapter 5 Protecting Internet

Page 3 - Norton™ Internet Security

Insight - Application Ratings window. However, youcan use the CheckTrust Now option in the File Insightwindow to update the trust value of a file. You

Page 4

To find the location of the file4In the File Insight window, click Locate.To refresh the trust level of the file4In the File Insight window, click Che

Page 5

The complete scan includes a scan of all files onyour computer irrespective of the confidence levelor digital signature of the files.1 Configure to St

Page 6 - 11. Privacy; Data Protection:

To configure Scan Performance Profiles from the NortonInsight - Application Ratings window1In the Norton Internet Security main window, clickAdvanced.

Page 7

Norton Internet Security provides reports based on thefollowing categories:Lets you view the details of thevarious attacks your computeris protected f

Page 8 - CPS / S 5.0 / USE

To view the Monthly Report1In the Norton Internet Security main window, clickSettings.2In the Settings window, click the General tab.3In the left pane

Page 9 - Contents

Monitoring your system's performanceAbout System Insight106

Page 10 - Contents10

This chapter includes the following topics:1 About maintaining protection1 About the Norton Internet Security scansAbout maintaining protectionAfter y

Page 11 - 11Contents

1 Run LiveUpdate regularly to receive new programupdates.1 Keep Auto-Protect turned on at all times to preventviruses from infecting your computer.1 W

Page 12 - Contents12

2In the Settings window, in the Computer tab, movethe On/Off switch to the left to the On position forthe following settings:Computer Scan providesthe

Page 13 - Getting started

Index ... . . . ... . . . ... . . ... . . . ... 49111Contents

Page 14 - Activating your product

5In the Smart Firewall section, in the SmartFirewallrow, move the On/Off switch to the left to the Onposition.6In the Message Protection section, move

Page 15

activities that are performed on your computer toprotect your computer from the Internet-based threatsthat exploit software vulnerabilities.Norton Int

Page 16

Insight Network Scan uses thevirus definitions that areavailable locally and hosted inthe Cloud. Insight Network Scandetects the files that aresuspici

Page 17

Reputation Scan displays thereputation information of thefiles on your computer. Itdisplays the reputationinformation such as trust level,prevalence,

Page 18

Scan Facebook Wall lets youscan the links and URLs that areavailable on your Facebookprofile.When you click the ScanFacebook Wall option, NortonIntern

Page 19 - 19Getting started

and some of the options in the network settings let youconfigure how you want Norton Internet Security toscan your computer for viruses and other secu

Page 20

2In the window that appears, do one of the following:1 In the Computer Scan pane, click the scan thatyou want to run.1 Click Reputation Scan, and then

Page 21

example, if a Trojan horse is detected, the scan resultsof the Computer Scan displays the threat as Trojan.Foo.You can click the Scan Now option avail

Page 22

Scans a particular file,removable drives, any of yourcomputer's drives, or any foldersor files on your computer.You can create a custom scan ifyo

Page 23 - 23Getting started

2In the Computer Scan pane, click Full System Scan.You can use the following options to suspend a FullSystem Scan:Suspends a Full System Scantemporari

Page 24

Contents12

Page 25 - 25Getting started

2In the Computer Scan pane, click Quick Scan.You can use the following options to suspend aQuick Scan:Suspends a Quick Scantemporarily.Click Resume to

Page 26

3In the Scans window, do one of the following:1 To scan specific drives, click Run next to DriveScan, select the drives that you want to scan,and then

Page 27 - 27Getting started

computer. Viruses, spyware, and other risks oftentarget these areas.If your most recent scan was a Full System Scan, thiswindow shows the results of a

Page 28

About custom scansYou can create a custom scan if you regularly scan aparticular segment of your computer. This custom scanlets you scan the segment f

Page 29

6On the Scan Schedule tab, set the frequency andtime at which you want to perform the scan. See“Scheduling a scan” on page 128.7On the Scan Options ta

Page 30 - The panes are:

4In the window that appears, on the Scan Items tab,do the following:1 To add drives, click Add Drives, in the ScanDrives dialog box, select the drives

Page 31

4In the Edit Scan window, on the Scan Options tab,configure the scan options as required.5Click Save.Editing a custom scanYou can edit a custom scan t

Page 32

2In the Computer Scan pane, click Custom Scan.3In the Scans window, click Run next to the customscan that you want to run.You can use the following op

Page 33 - About your Norton Account

About scheduling scansNorton Internet Security uses Idle Time Scans toautomatically detect the idle state of your computerand runs a Full System Scan

Page 34 - 1 Any time after activation

To schedule a custom scan1In the Norton Internet Security main window, clickScan Now.2In the Computer Scan pane, click Custom Scan.3In the Scans windo

Page 35

This chapter includes the following topics:1 Activation protects you1 About Norton Internet Security main window1 About your Norton Account1 About Nor

Page 36

Scheduling a Full System ScanNorton Internet Security uses Idle Time Scans toautomatically detect the idle state of your computer.Norton Internet Secu

Page 37 - Creating a Norton Account

Internet Security scans only the running processes andthe loaded programs. Quick Scan takes less time to scanthan a Full System Scan because this scan

Page 38 - Accessing your Norton Account

5Click Save.Running a scan at the command promptYou can scan with Norton Internet Security from thecommand prompt without opening the Norton InternetS

Page 39 - About Norton Community Watch

Enables (+) or disables(-) scanning of stealthitems/ST[+|-]Uses a task file as inputto the list of items toscanTask file path shouldfollow the ':

Page 40

Scans the specifieddrive, folder, or file[drive|folder|file]Performs Quick Scan inthe background.wNorton InternetSecurity displays thescans window onl

Page 41

Internet Security performs the Insight Network scan,it uses the virus definitions that are available locallyand in the Cloud. Norton Internet Security

Page 42

Norton Internet Security simultaneously performsa traditional Quick Scan and an Insight NetworkQuick Scan to scan the areas of your computer thatthe v

Page 43

on. By default, the Insight Protection option is turnedon.To turn off or turn on the Insight Protection1In the Norton Internet Security main window, c

Page 44

the signature-based threat detection. It compares thesignature of the filtered reputation files against theknown threat signatures to identify threats

Page 45

This category includesWindows System files (.sys),dynamic link library files(.dll), and device driver files(.drv).System filesThis category includesAc

Page 46

If you are connected to the Internet, product activationtakes place automatically when you start the productfor the first time after installation. Aft

Page 47

Scans all the Files of Interestthat are available on yourcomputer.When you perform a FullSystem Scan, Norton InternetSecurity searches for Files ofInt

Page 48

Symantec has a fewindications that the file is nottrusted.This file is suspicious and canharm your computer.PoorSymantec has a highindication that the

Page 49 - About LiveUpdate

4If there is a file with Poor or Bad trust level, underthe Trust Level column, click the red cross (x) icon.5In the Quarantine File window, click Quar

Page 50

check the trust level of a specific file, you can scan theparticular file.To run a Reputation custom scan1In the Norton Internet Security main window,

Page 51 - 51Getting started

When you run a Reputation Quick Scan, NortonInternet Security considers the Files of Interest whichinclude running processes and loaded programs. When

Page 52 - About Smart Definitions

1 The Norton Network graph displays the detailsabout the known good files and bad files.You can view the number of trusted files that areon your compu

Page 53

Trust LevelProtecting your files and dataAbout the Norton Internet Security scans146

Page 54 - About running LiveUpdate

Indicates the trust level thatis assigned to a file.Symantec analyzes specificinformation about a file suchas the digital signature andthe hash value

Page 55 - Checking for updates manually

suspicious file.Indicates the communityusage level of the file.The search results aregrouped in to the followingcategories:1 Very Few Users: Showsthe

Page 56

Indicates the system resourceusage level of the file.The usage levels are asfollows:1 Low: Indicates that thefile consumes minimumsystem resources.1 M

Page 57

updates to the product. If you skip the NortonAccountwindow, the product is activated, but the product keyis not saved in the Norton Account. You can

Page 58

Indicates the stability ratingof the file.The stability rating dependson how frequently theprogram crashes. Thedifferent stability ratings areas follo

Page 59 - About Pulse Updates

are not only protected from unsafe sites but you alsolet other Facebook users know the security status ofany Web site.However, Norton Safe Web require

Page 60 - About Network Proxy settings

The following are the safety states that Norton SafeWeb provides after it scans the links on your FacebookWall:Indicates that the site is safe tovisit

Page 61 - 1 Use automatic configuration

To scan your Facebook Wall1In the Norton Internet Security main window, clickScan Now.2In the window that appears, click Scan FacebookWall.3In the Nor

Page 62

The following list provides details on the settings thatyou can make and the predefined parameters:You can set the duration afterwhich Norton Internet

Page 63

Norton Internet Security discontinues any Idle TimeScans that it started during idle time if you begin touse your computer again. However, it resumes

Page 64

3In the Idle Time Scans row, in the drop-down list,select the option that you want to set. Your optionsare:1 Weekly1 Monthly1 Quarterly4Click Apply.Sp

Page 65 - Monitoring your

3In the Norton Tasks window, in the Idle Timeoutdrop-down list, select the duration that you want tospecify.4Click Close.About SONAR ProtectionSymante

Page 66

lets you specify the amount of time for which you wantSONAR Protection to be turned off.wWhen Auto-Protect is turned off, SONAR Protection isalso disa

Page 67

should exclude programs only if you are confident thatthey are not infected. You can exclude the programsfrom the Auto-Protect scans and SONAR scans b

Page 68

The product key is a 25-character alphanumeric stringthat is shown in five groups of five characters each,separated by hyphens. The location of the pr

Page 69

6In the dialog box that appears, select the item thatyou want to exclude from the scan.7Click OK.8In the Add Item dialog box, click OK.9In the window

Page 70

wWhen you exclude a known security risk from NortonInternet Security scans, the protection level of yourcomputer reduces. You should exclude items onl

Page 71 - About performance alerting

Microsoft Visiovisio.exeMicrosoft Accessmsaccess.exeMicrosoft Projectwinproj.exeNorton Internet Security scans the Office documentsand protect against

Page 72

About Silent ModeNorton Internet Security provides many solutions andfeatures to handle viruses and other security threats.Norton Internet Security di

Page 73

The Silent Mode that NortonInternet Security turns onautomatically when it detects adisk burning task or a MediaCenter TV recording task. NortonIntern

Page 74

About the Silent Mode that you turn on manuallyNorton Internet Security lets you manually turn onSilent Mode for a specified duration. When Silent Mod

Page 75

To turn on Silent Mode from the Settings window1In the Norton Internet Security main window, clickSettings.2In the Settings window, click the General

Page 76 - Battery Power option

2In the Performance window, click Norton Tasks.3In the Norton Tasks window, under Silent Mode,move the On/Off switch to the right to the Offposition.4

Page 77

Norton Internet Security identifies a Media CenterExtender session as an active full-screen applicationand turns on Silent Mode. When Silent Mode is e

Page 78

About Quiet ModeNorton Internet Security automatically enables QuietMode when you perform a few tasks that require higherutilization of your system re

Page 79

To recover or access yourproduct key log on tohttps://www.mynortonaccount.com.If you are not registered,register for Norton Account.You can find the p

Page 80

The following table explains about the various options:When you use a Media Centerapplication to burn a CD or aDVD, Norton Internet Securityautomatica

Page 81 - About Startup Manager

When you use a Media Centerapplication to record a TVprogram, Norton InternetSecurity automatically enablesQuiet Mode, if the Media CenterTV Recording

Page 82

Norton Internet Securityautomatically turns on QuietMode when it detects a TVprogram recording session or adisk-burning session. Inaddition, you can m

Page 83 - Managing startup items

only after the TV program recording session ordisk-burning session is complete. You cannot turn offQuiet Mode during the sessions by using the options

Page 84 - About optimization

About User-Specified ProgramsNorton Internet Security automatically turns on QuietMode when it detects a TV program recording sessionor a disk-burning

Page 85 - Optimizing your boot volume

Quiet Mode. Norton Internet Security turns on QuietMode the next time when you execute the program.You can only add the programs that have .exe fileex

Page 86 - About the Idle Time Optimizer

4Under Quiet Mode on Detection of, in theUser-Specified Programs row, click Configure.5In the Quiet Mode Programs window, select theprogram that you w

Page 87

Turns off boot time protection.If you turn off the Enable Boot Time Protectionoption, the protection level of your computerreduces.Configuring boot ti

Page 88 - About the Norton Tasks

Protecting your files and dataAbout the Norton Internet Security scans178

Page 89

This chapter includes the following topics:1 What to do if a security risk is foundWhat to do if a security risk is foundYour product provides many so

Page 90 - About Power Source

You can find the following items in the main window:Lets you view the overallprotection status of yourcomputer.When your system status isSecure, your

Page 91 - Configuring the Power Source

risk. You can access the Symantec Security ResponseWeb site and refer the manual removal instructions.In some cases, Norton Internet Security might no

Page 92 - About Norton Insight

You can view information about detected viruses andother security threats in Security History.Security History also includes information aboutspyware,

Page 93

3In the Show drop-down list, select the category forwhich you want to review Auto-Protect alerts.Your options are:Review Auto-Protectnotifications tha

Page 94

4In the right pane, click the Options link.The option name appears as Restore & Options forfew items.If one or more security risks such as spyware

Page 95 - 1 If the file has three green

5In the Threat Detected window, select theappropriate action on the risk.The following are some of the options that areavailable in the Threat Detecte

Page 96

Removes the selectedsecurity risk from thecomputer andquarantines it.This option is availablefor the security risks thatrequire your attention formanu

Page 97

Sends the security risk toSymantec.In some cases, NortonInternet Security mightnot identify an item as asecurity threat, but youmight suspect that the

Page 98

To respond to Worm Blocking alerts4In the alert window, select the action that you wantto take. Your options are:Permanently stops theworm by putting

Page 99

2After the worm has been quarantined, perform thefollowing tasks:1 Run LiveUpdate to ensure that you have thelatest definition updates.See “About Prog

Page 100

If that does not work, read the information on theThreats Detected window to identify the types of files189Responding to security issuesWhat to do if

Page 101

Lets you provide feedback on theproduct on a Symantec Webpage.wThis feature may not beavailable in some versions ofNorton Internet Security.FeedbackLe

Page 102 - 1 High Trust

that cannot be repaired. You can take one of thefollowing actions, depending on the file type:Infected filesResponding to security issuesWhat to do if

Page 103

You canview thefile typeof thedetectedrisk. Thisinformationhelps youto decidetheactionthat canbe takendependingon thefile type.Forexample,you canview

Page 104 - Viewing the Monthly Report

Replaceusingyouroperatingsystemdisks.Hard disk master boot record, boot record, orsystem files (such as IO.SYS or MSDOS.SYS) andfloppy disk boot recor

Page 105

This chapter includes the following topics:1 About the Smart Firewall1 About Download Insight1 About Intrusion Prevention1 About Vulnerability Protect

Page 106 - About System Insight

Internet. It also protects your computer from suchcommon security problems as the following:Warns you of connectionattempts from othercomputers and of

Page 107 - Protecting your

The Smart Firewall uses two kinds of firewall rules:Control network access forprograms on your computer.Program rulesControl all the incoming and theo

Page 108

network functionality and protection from knownInternet risks. Examples of default firewall rulesinclude the following:Permit all types ofoutbound and

Page 109

You can add a new General rule in this window. Youcan also do the following activities:You can change the settings ofa General rule that does notfunct

Page 110

1 Add a program.1 Rename a program.1 Modify the rules for a program.1 Add a rule for a program.1 Modify the access settings of a program rule.1 Modify

Page 111

Lets the firewall notifyyou when a programattempts to access theInternet. You can thenallow or block Internetaccess for the program.In some instances,

Page 112

Norton™ Internet Security ProductManualThe software described in this book is furnished under a licenseagreement and may be used only in accordance wi

Page 113

You can use the following options to perform theimportant tasks in Norton Internet Security:Lets you access different typesof scans to protect yourcom

Page 114

for the first time, an alert prompts you to configureaccess settings.When you turn off Automatic Program Control, awarning appears. Symantec recommend

Page 115

program, you can configure its access settings inProgram Control. You can allow, block, or create thecustom rules that are specific to the program tha

Page 116 - About Computer Scan

8In the Security Request - ProgramControl window,in the What do you want to do? drop-down list,select the access level that you want this programto ha

Page 117

you removed any programs in the previous version anddo not want them in the current version, you mustremove them again.To remove a program from Progra

Page 118 - Running a Full System Scan

6In the drop-down list next to the program that youwant to change, select the access level that you wantthis program to have. Your options are:Allow a

Page 119 - Running a Quick Scan

5In the Advanced Settings window, in the GeneralRules row, click Configure.6In the General Rules window, click Add.7Follow the instructions in the Add

Page 120

2In the first panel of the AddRule Wizard, select theaction that you want for this rule. Your options are:Allow communication ofthis type.AllowFor exa

Page 121

Update the Firewall –Activities category in theevent log each time thatcommunication of thistype takes place. Thisoption lets you monitorhow often thi

Page 122 - 1 Total items scanned

4Select the type of connection for the rule. Youroptions are:The rule applies tooutbound connectionsfrom your computer toanother computer.Connections

Page 123

5Click Next, and then select the computers that applyto the rule. Your options are:The rule applies to allcomputers.Any computerThis rule applies only

Page 124 - Selecting the scan items

Lets you access the NortonInternet Security advancedwindow.By using the Norton InternetSecurity advanced window, youcan do the following:1 Run differe

Page 125 - Configuring the scan options

6Click Next, and then select the protocols for therule. Your options are:The rule applies to TCP(Transmission ControlTCPProtocol)communications.The ru

Page 126 - Running a custom scan

The rule applies to allsupported protocols.When you select thisoption, you cannotspecify the types ofcommunications or portsthat apply to the rule.All

Page 127 - Deleting a custom scan

8Click Next.9Check Create a Security History log entry if youwant Norton Internet Security to create an entry inthe firewall event log.Norton Internet

Page 128 - About scheduling scans

5In the Advanced Settings window, in the GeneralRules row, click Configure.6In the General Rules window, select the rule thatyou want to change.7Click

Page 129

Changing the order of firewall rulesEach list of firewall rules is processed from the topdown. You can adjust how the firewall rules areprocessed by c

Page 130 - Scheduling a Quick Scan

5In the Program Control window, in the Programcolumn, select the program that contains the rulethat you want to move.6Click Modify.7In the Rules windo

Page 131 - Editing a scheduled scan

Removing a firewall ruleYou can remove some of the firewall rules if necessary.However, you cannot remove some of the defaultGeneral rules that appear

Page 132

6Click Modify.To remove all the program rules that are associatedwith the program, click Remove.7In the Rules window, select the rule that you wantto

Page 133

Lets you configure how NortonInternet Security must control thenetwork communications to and fromyour computer.For instance, you may have to beaway fr

Page 134 - About Insight Network scan

Displays the level of access that theprogram hasYou can change the access level byselecting a different entry from thedrop-down list.Your options are

Page 135 - 1 Insight Network Quick Scan

The bottom section of the Norton Internet Securitymain window helps you do the following:Lets you access the worldmap with hotspots ofcybercrimes and

Page 136

1 Select the networks or computers you want tocompletely restrict from directly accessing yourcomputer.When you select Trust Control, the Network Secu

Page 137 - About Reputation Scan

Firewall Reset221Protecting Internet activitiesAbout the Smart Firewall

Page 138 - Executable files

Returns the SmartFirewall to its defaultstate. You can click Resetto ensure that allrecommended firewallrules and settings areconfigured. NortonIntern

Page 139

address range1 Your computer mustbe connected to asecure wireless orwired connectionEnsures that blocked andinactive ports do notrespond to connection

Page 140

Automatic File/Printer SharingControlProtecting Internet activitiesAbout the Smart Firewall224

Page 141

Allows the computers onthe network to shareresources such as files,folders, and printers (thatare locally attached)Some of the Windows 7features such

Page 142

new network to whichyour computer isconnected as Shared orProtected. The promptappears only when thesecurity criteria forsharing matches.Protecting In

Page 143

Automatic Program Control227Protecting Internet activitiesAbout the Smart Firewall

Page 144

Automatically configuresInternet access settingsfor the Web-enabledprograms that are run forthe first timeThe Automatic LearnIPv6 NAT TraversalTraffic

Page 145

receive firewall alerts,you can turn onAutomatic ProgramControl.The Advanced EventsMonitoring settingsconsist of the followingcategories that providey

Page 146 - Trust Level

Online Family23Getting startedAbout Norton Internet Security main window

Page 147 - 1 Bad: Symantec has a high

1 Program ComponentThis option protectsyou against themalicious programsthat launchInternet-enabledprograms.1 Program LaunchThis option protectsyou ag

Page 148

Internet withoutfirewall alerts.1 Direct NetworkAccessThis option protectsyou against the Trojanhorses and othermalicious programsthat bypass networkt

Page 149 - 1 Unknown: Indicates that

1 COM ControlThis option protectsyou against themalicious programsthat manipulate anapplication's behaviorby instantiatingcontrolled COMobjects.A

Page 150 - About Scan Facebook Wall

1 The traffic has violated the traffic policy of thefirewall1 The traffic comes from the restricted zone ofnetworks or computers1 The traffic matches

Page 151

1 Opera (Browser)1 Firefox (Browser)1 Chrome (Browser)1 AOL (Browser)1 Safari (Browser)1 Yahoo (Browser)1 MSN Explorer (Browser, E-mail & Chat)1 Q

Page 152 - Scanning your Facebook Wall

Download Insight uses the file analysis results toprovide you the reputation details of the file. The basicreputation levels of the files are good, ba

Page 153 - About Idle Time Scans

Includes the files that areneither safe nor unsafe.Unknown files have unprovenreputation. These files mightharm your computer. In the caseof an unknow

Page 154

Lets you cancel the installationof the executable program.Cancel installationLets you remove the file fromyour computer.Remove this file from mysystem

Page 155

You can use the Download Intelligence option to turnoff or turn on Download Insight.To turn off Download Intelligence1In the Norton Internet Security

Page 156 - 1 Quarterly

1 Notifies you only when you download a file that isinfected with a local virus identification. If the filethat you download is infected with a cloud

Page 157

Lets you monitor your child’sactivities on the Internet.wNorton Online Familymay not be available in someversions of Norton InternetSecurity.When you

Page 158 - About Real Time Exclusions

Configuring the Show Report on Launch of FilesoptionThe Show Report on Launch of Files option lets youspecify when and for what type of file you want

Page 159

When you set the Show Reporton Launch of Files option toUnproven Files Only, DownloadInsight prompts you to select asuitable action for unknown fileso

Page 160 - About Signature Exclusions

When you set the Show Reporton Launch of Files option toNever, Download Insight doesnot prompt you to select asuitable action for any type offile that

Page 161 - Microsoft Excelexcel.exe

4Under Download Intelligence, in the Show Reporton Launch of Files row, do one of the following:1 If you want Download Insight to prompt you fora suit

Page 162 - Microsoft Projectwinproj.exe

To turn on or turn off Alert on Poor Stability1In the Norton Internet Security main window, clickSettings.2In the Settings window, click the Web tab.3

Page 163 - About Silent Mode

If you are sure that a device on your network is safe,you can change the trust level of the device to FullTrust. These trusted devices can be excluded

Page 164

To turn off or turn on an individual Intrusion Preventionnotification1In the Norton Internet Security main window, clickSettings.2In the Settings wind

Page 165

6Click OK.To include the attack signatures that were previouslyexcluded1In the Norton Internet Security main window, clickSettings.2In the Settings wi

Page 166

4Under Intrusion Prevention, in the IntrusionAutoBlock row, click Configure.5In the Intrusion AutoBlock window, underAutoBlock, do one of the followin

Page 167

6Click OK.Permanently blocking a computer that has beenblocked by AutoBlockYou can permanently block a computer that AutoBlockhas blocked. The permane

Page 168

details such as your child’slatest search terms, and thelatest alerts. After you signin, you can use the GetDetails option in the bottomsection of the

Page 169 - About Quiet Mode

using the Network Security Map. You can exclude thesetrusted devices from Intrusion Prevention scan.Excluding Full Trust devices from the IntrusionPre

Page 170 - 1 J. River MEDIA CENTER

If you find that any of the devices that you excludedfrom Intrusion Prevention scan is infected, you canpurge the saved exclusion list and remove all

Page 171

attacks. It also provides information about the knownattacks that they are protected from.Vulnerabilities are flaws in your programs or youroperating

Page 172

For each program, you can view details such as thename of the program, its vendor, and the number ofvulnerabilities that the program contains. You can

Page 173

should leave the signatures turned on. If you disable asignature, your computer may be vulnerable to attack.To view details about a vulnerable applica

Page 174 - About User-Specified Programs

It then gives this data to companies that can send youadvertisements based on these preferences.Tracking cookies are the small files that programs can

Page 175

spam email and legitimate email. It filters legitimateemail into the Inbox folder and spam email into theJunk folder or the Norton AntiSpam folder.Nor

Page 176 - About boot time protection

current address books. When Norton AntiSpam importsthe addresses from your Outlook address book orWindows address book, it also imports the addressest

Page 177 - 1 Normal

Configuring Client IntegrationThe Client Integration window lists the supported emailprograms, or clients, that are installed on yourcomputer and thei

Page 178

notifies the successful integration of Norton AntiSpamwith your email client.Norton AntiSpam also automatically imports the listsof addresses from the

Page 179 - Responding to

Lets you download theNorton Mobile Security forAndroid.You can use Norton MobileSecurity on all your devicesthat use Android operatingsystem.wNorton M

Page 180

7Click OK to save the changes and close the ClientIntegration window.Setting Address Book ExclusionsWhen you add an email address to the Address BookE

Page 181

8Click OK to save and close the Address BookExclusions window.To edit or delete entries in the Address Book Exclusionslist1In the Norton Internet Secu

Page 182

To import an address book1In the Norton Internet Security main window, clickSettings.2In the Settings window, click the Network tab.3In the left pane,

Page 183

4Under AntiSpam, in the Allowed List row, clickConfigure.5In the Allowed List window, select the item withwhich you want to work.6Do one of the follow

Page 184

6Click OK to save and close the AllowedList window.To add entries to the Blocked List1In the Norton Internet Security main window, clickSettings.2In t

Page 185

6Do one of the following:1 To edit an entry, click Edit to open the EditEmail Address dialog box, edit the details, andthen click OK.1 To delete an en

Page 186

Marks the selected email as allowed (not spam)and moves the email message into the Inbox.When you reclassify an email message aslegitimate, Norton Int

Page 187

To set the Feedback option1In the Norton Internet Security main window, clickSettings.2In the Settings window, click the Network tab.3In the left pane

Page 188 - 1 Scan your computer

high percentage of legitimate emails are misclassifiedas spam or spam is misclassified as legitimate. To avoidsuch misclassification, Norton AntiSpam

Page 189

additionally through the Web Query filter. Web Queryfilter analyzes the signature and URL hashes of theemail messages to classify them as legitimate e

Page 190 - Responding to security issues

Safe Web27Getting startedAbout Norton Internet Security main window

Page 191

email programs that use non-SSL POP3 and SMTPcommunication protocols. Norton Internet Securityalso scans all incoming and outgoing email messages.Nort

Page 192

To add POP3 and SMTP ports to Protected Ports1In the Norton Internet Security main window, clickSettings.2In the Settings window, click the Network ta

Page 193 - Protecting Internet

6Click Apply and then click OK.7In the Settings window, click OK.About the Network Security MapA home network typically consists of the computersand o

Page 194 - About firewall rules

Turning off or turning on Network Security OverviewThe Network Security Overview window provides abrief summary about the following features:1 Wireles

Page 195 - About General rules

4In the WelcomeScreen row, move the On/Off switchto the left to the On position.5Click Apply.6Click OK.Viewing devices on the Network Security MapThe

Page 196

To view devices on the Network Security Map1In the Norton Internet Security main window, clickAdvanced.2Under NetworkProtection, click Network Securit

Page 197 - About Program rules

To view the details of a device on the Network SecurityMapProtecting Internet activitiesAbout the Network Security Map276

Page 198

4In the Network Security Map window, click a deviceicon.You can use the scroll arrows to view the devicesthat are listed in the network map.The device

Page 199

Shows the category to which thedevice belongsThe device category iconprovides details on theconnection status and securitystatus. Norton Internet Secu

Page 200

Shows the access level that isgranted to a remote device toconnect to your computerThe initial trust level is set basedon the configuration of yourcom

Page 201

Lets you check the safety ofa Web site.You can also perform a safesearch.wThis option may not beavailable with some versionsof Norton Internet Securit

Page 202

Shows if the device is excludedfrom Intrusion Prevention scan.You can exclude a Full Trustdevice from Intrusion Preventionscan. When you exclude atrus

Page 203

3On the left side of the Network Security Mapwindow, under Remote Monitoring, click Setup.4In the Remote Monitoring Setup window, type aPasskey.The Pa

Page 204 - 1 Program rules

2Under NetworkProtection, click Network SecurityMap.3On the left side of the Network Security Mapwindow, under Remote Monitoring, click Disable.4In th

Page 205

The default trust level of the devices that you add tothe Network Security Map is Protected. However, youcan change the trust level of the devices.wIf

Page 206

Finding a computer's IP addressYou can find a computer's IP address in various ways.On Windows 2000/XP, Windows Vista, and Windows7 computer

Page 207 - About the Smart Firewall

Editing device detailsYou can change the name and category of a device thatis available on the Network Security Map. You canselect the categories such

Page 208

6In the Category drop-down list, click one of thefollowing device categories:1 GENERIC DEVICE1 DESKTOP PC1 LAPTOP1 SERVER PC1 NETWORK PRINTER1 ROUTER/

Page 209

To edit network details1In the Norton Internet Security main window, clickAdvanced.2Under NetworkProtection, click Network SecurityMap.3In the Network

Page 210

Vista Ultimate, Windows 7 Home Premium,Windows 7 Professional, or Windows 7 Ultimate)wIf you use a wireless network that is not secure, thedefault tru

Page 211

5To select a trust level for a network, in the EditNetwork Trust Level window, click one of thefollowing:Adds the network to the TrustedlistFULL TRUST

Page 212

section of the Norton InternetSecurity main window to viewthe recent Norton Safe Webstatistics on malicious sitesand URLs. You can also viewthe list o

Page 213

Adds the network to theRestricted listThe devices that are onRestricted network cannotcommunicate with yourcomputer. However, you can stilluse the net

Page 214

5To select a trust level for a device, in the EditDeviceTrust Level window, click one of the following:Adds a device to the Full TrustlistFull Trust d

Page 215

Scanning every request from all the devices that accessyour computer increases the scan time which slowsdown the network speed of your computer.If you

Page 216 - Removing a firewall rule

4In the Network Security Map window, do one ofthe following:1 To edit the trust level of a device that is on yournetwork, in the network map, click th

Page 217 - About Smart Firewall settings

When you remove an individual device, the onlinedevices appear again the next time you open theNetwork Security Map. However, Norton InternetSecurity

Page 218

For more information on how to secure your wirelessnetwork, on the left side of the Network Security Mapwindow, click the Why is it not secure link. F

Page 219

To view the device details1In the Norton Internet Security main window, clickAdvanced.2Under NetworkProtection, click Network SecurityMap.3In the Netw

Page 220

To modify the communication port for Network SecurityMap1In the Norton Internet Security main window, clickSettings.2In the Settings window, click the

Page 221

You can set up one of the following policies for each ofthe adapter that Norton Internet Security uses toconnect to the Internet:1 No LimitLets Norton

Page 222

2In the Settings window, click the Network tab.3In the left pane, click Network Security Settings.4In the Metered Broadband Mode row, move theOn/Off s

Page 223

Norton License AgreementNorton™ Internet SecurityIMPORTANT: PLEASE READ THE TERMSAND CONDITIONS OF THIS LICENSEAGREEMENT (“LICENSE AGREEMENT”)CAREFULL

Page 224

The panes are:Provides you the essentialcomputer protection options.It also contains links to scanyour computer, view thehistory of protection events,

Page 225

4In the Metered Broadband Mode row, move theOn/Off switch to the left to the On position.5Click Configure.The MeteredNetwork Settings window lists all

Page 226

This chapter includes the following topics:1 About securing your sensitive dataAbout securing your sensitive dataThe Internet provides the fastest and

Page 227

window. The Norton Safe Web feature provides you asafe search environment in the Web by displaying thesite rating icons next to every search result.Wh

Page 228

The Norton Site Safety pop-up window in InternetExplorer, Firefox, or Chrome Web browsers lets youview more details about the safety status of the Web

Page 229

Reporting an incorrect evaluation of a Web siteOn rare occasions, Antiphishing may report incorrectevaluation of a Web site. For example, you might vi

Page 230

navigation to the Web sites that are confirmed to befraudulent.The Norton Site Safety pop-up window helps youunderstand if the Web site that you visit

Page 231

wNorton Safe Web supports Internet Explorer, Firefox,or Chrome Web browsers.You can view the site safety status of any Web siteusing the FullReport op

Page 232 - 1 COM Control

Norton Safe Web provides the following Web site safetystates when you browse through the Internet:You can see Norton Secured iconnext to the search re

Page 233

You can see a red cross (x) iconnext to the search results.When you visit a Web site withthis status, you can see a similarstatus icon on the NortonTo

Page 234

Norton Safe Web does not havesufficient information about thisWeb site to provide a shoppingsafety rating.UntestedNorton Safe Web has analyzedthis Web

Page 235

You can view the different protection features on theright side of the window. You can move your mousepointer over each feature to view a brief summar

Page 236

let other Facebook users know about the security statusof any Web site.To scan your Facebook Wall using Norton Safe Web,use the ScanFacebookWall optio

Page 237

In addition, Norton Safe Search provides the followingfeatures:When you search the Internetusing Norton Safe Search, itanalyzes the security levels of

Page 238

You can use Norton Safe Search even when you turnoff the Identity Safe features.wNorton Safe Search is supported only by the InternetExplorer, Firefox

Page 239

4In the Norton Safe Web row, do one of the following:1 To turn off Norton Safe Web, in the Norton SafeWeb row, move the On/Off switch to the rightto t

Page 240

Antiphishing also helps to protect you frommalicious Web sites when you perform onlinetransactions.1 Manages your card information when you havemultip

Page 241 - About Download Insight

Internet Security expires as you are vulnerable toonline thefts and phishing attacks.The following are the activities that you can performafter the pr

Page 242

In addition to the local vault that you create on aWindows user account, you can also save your IdentitySafe data in online vault.You can access the I

Page 243

4In the Identity Safe row, do one of the following:1 To turn off Identity Safe, in the Identity Saferow, move the On/Off switch to the right to theOff

Page 244 - About Intrusion Prevention

wIf you have Identity Safe data that is stored on anyexternal drives from the older versions of NortonInternet Security, you can convert that portable

Page 245

1 The computer must be connected to the Internet.wYou can create only one online vault for a NortonAccount. You must log in to your Norton Account tom

Page 246

You can respond to the System Status indicatorsdirectly from the main window.To respond to System Status indicators from the mainwindow1In the bottom

Page 247

7In the Password Hint box, type a hint for thepassword.8Uncheck the Store information online throughyour Norton Account checkbox.This option appears o

Page 248

to your Norton Account to create an online vault. TheIdentity Safe data is stored online using your NortonAccount.You can access the Identity Safe dat

Page 249

1 Lets you access you Identity Safe data from anycomputer.wYour computer must have the latest version NortonInternet Security installed and must be co

Page 250

require your Identity Safe data that is stored in yourlocal vault and online vault, you can delete the vaults.When you delete the local vault and onli

Page 251

4In the Password box, type the password.5Do one of the following:1 If you want to delete the data from the portableprofile after import, check Delete

Page 252

7In the IdentitySafe Setup Successful window, clickDone.Resetting Identity SafeThere may be instances when you need to reset yourIdentity Safe.You may

Page 253

6In the Trouble Logging In? window, click ResetIdentity Safe.If you forget the Identity Safe password of youronline vault, you need to provide your No

Page 254

To access Identity Safe settings from the main window1In the Norton Internet Security main window, clickSettings.2In the Settings window, click the We

Page 255 - About Norton AntiSpam

5In the Log in to Identity Safe window, in the Enterthe Password box, type the password of the vaultyou want to log in.6Click Login.To log out of Iden

Page 256

4Under Identity Safe, identify the feature that youwant to use, and click Configure. Your options are:Lets you set up Identity Safevault.Identity Safe

Page 257

1 Browser Protection1 Safe SurfingTo monitor the protection status of a feature1In the Norton Internet Security main window, clickAdvanced.2In the win

Page 258

Lets you set the options that letIdentity Safe securely collect andstore your Web page logininformation.In addition, you can do thefollowing activitie

Page 259

Lets you manage your personalinformation such as name, dateof birth, email address, andcredit card information in oneplace.You can use the information

Page 260

Lets you store and managesensitive information.You can save social securitynumber, driver's license number,insurance policy number, andpassport n

Page 261

site's login page. You can instantly save your logininformation in Identity Safe.wTo manage your logins, you must be logged in toIdentity Safe.Id

Page 262

logins for the same Web site. You can also save thesame login for different Web sites.When you provide your login credentials on a Web site,Identity S

Page 263 - Identifying senders of spam

3On the Norton Toolbar, in the Save your login forthis site? row, do one of the following:1 If you want to save your login, click Save. In theSave Log

Page 264

1 Lets you save the Web site name with a name otherthan the default name.1 Displays the login ID and lets you show or hide thepassword.1 Displays the

Page 265

4Under Identity Safe, in the Edit Logins row, clickConfigure.5In the Edit Logins window, click Create New Login.6In the New Login dialog box, type the

Page 266 - Setting the Feedback option

7In the Validate Password for Identity Safe window,do the following:1 In the Enter the Password box, type yourIdentity Safe password.1 Click Login.8In

Page 267 - About Web Query

1 View the details of the date and time when you lastmade to the Edit Logins settingsTo quick-launch a login Web page1In the Norton Internet Security

Page 268

must provide your account information in theNorton Account window that appears.1 Any time after activationIf you skip the Norton Account window during

Page 269

Changing the user name and passwordIdentity Safe lets you change the user name andpassword for the logins that you have saved in the EditLogins window

Page 270

6Under Details, next to the Password box, clickShow.The Validate Password for Identity Safe windowappears. This window appears only if you havechanged

Page 271

4In the Save new password for login? menu bar, clickSave.About Edit Identity CardsThe Edit Identity Cards option in Identity Safe letsyou manage your

Page 272

When you are on a Web page that has forms, the Fillfields on this page? menu bar in the Norton Toolbardisplays the cards that you saved. You can click

Page 273 - 1 Trust Controls

6Use the following tabs to type your card details:Provide details such as cardname, name, gender, and dateof birth. You can set a passwordand provide

Page 274

You can view a summary of the card that you created.You can select any of the cards that are present in thelist of cards at the bottom of the Edit Ide

Page 275

2In the Settings window, click the Web tab.3In the left pane, click Identity Safe.4Under IdentitySafe, in the EditIdentity Cards row,click Configure.5

Page 276

Editing NotesYou can use the Edit Notes option in Identity Safe tostore your personal information, which you can retrieveand use when needed. You can

Page 277 - 1 The device does not have a

6Click Edit Notes, and modify the information underDetails.You can change the category, modify the title, andedit the additional information that you

Page 278

You can import your Identity Safe data from the filethat you previously backed up. You can also import theIdentity Safe data from the portable profile

Page 279 - 1 OFFLINE

Saves your account informationand your billing details.The Profile options are:1 Account InformationYou can update your NortonAccount information andy

Page 280 - Setting up Remote Monitoring

8If you want to back up your data with a passwordfor more security, type and confirm the password.9Click OK.10In the confirmation dialog box, click OK

Page 281 - Turning off Remote Monitoring

5In the Import Identity Safe Data window, underImport my data from, select one of the followingoptions:1 Portable Profile (Drive: Drive:\)This option

Page 282 - 1 The name or description

You can configure the following options in the IdentitySafe Options window:Prompts you to save the logincredentials for the Web sitesthat you visit.Of

Page 283

Password Security353Securing your sensitive dataAbout securing your sensitive data

Page 284

Specify the Identity Safepassword security level.Identity Safe provides fourlevels of security to protectyour Identity Safe password.Choose one of the

Page 285 - Editing device details

45 minutes.This option is useful if youare frequently in an areawhere other people haveaccess to your computer.1 No password needed.Automatically log

Page 286 - Editing network details

1 The password must not match with your NortonAccount user name or password.wYou can set your password hint here if you did notprovide it when you con

Page 287

You have the following options in the NortonToolbar:Lets you access the Web Settingsand other settings.The following options areavailable in the Norto

Page 288 - 1 Your network

Lets you perform an enhancedInternet search using NortonSafe Search.You can type a search string inthe Norton Safe Search box andperform a search. Whe

Page 289

Lets you view the logins andcards that you have saved inIdentity Safe.Some Web sites have forms tofill or require login information.You can use the Id

Page 290

Norton Online Backupprovides a secure andeasy-to-use online backupsolution that safeguards yourimportant data againstsystem crash, accidentaldeleting,

Page 291

Hiding and showing the Norton ToolbarYou can hide the Norton Toolbar if you do not want tosee the evaluation of every Web site that you visit.When you

Page 292

2On the NortonToolbar, in the Norton menu, selectone of the following:Lets you report to Symantecabout the current Antiphishingevaluation.Report SiteL

Page 293

Lets you view the communitysite rating of the Web sites youvisit.You can click Community Buzzto know further details about theWeb sites. Norton Safe W

Page 294

Lets you view the Norton SafeSearch box.You can type a search string inthe Norton Safe Search box andperform a search. The search boxdisplays relevant

Page 295 - Viewing the device details

Accessing the Identity Safe menuThe Identity Safe menu on the NortonToolbar lets youview and manage the logins, Identity cards, and notesthat you save

Page 296 - Security Map

2On the Norton Toolbar, in the Identity Safe menu,select one of the following:Lets you merge the IdentitySafe data from your portableMerge Portable Da

Page 297 - About Metered Broadband Mode

OptionsSecuring your sensitive dataAbout securing your sensitive data366

Page 298 - 1 No Traffic

Lets you view the variousoptions that are available inIdentity Safe.The options are:1 Ignore this pageYou can select this optionif you do not want toa

Page 299

must log in to your NortonAccount to move yourdata online.wThis option appearsin the Identity Safe menuonly when you are loggedin to your local vault.

Page 300

Lets you log out of or log into Identity Safe.You should log out of IdentitySafe to secure your IdentitySafe data when you are awayfrom your computer.

Page 301

Creating a Norton AccountYour Norton Account stores the product key and thebilling information of your product. You can alsoregister your product with

Page 302 - About Antiphishing

Securing your sensitive dataAbout securing your sensitive data370

Page 303

This chapter includes the following topics:1 About Security HistoryAbout Security HistorySecurity History window lets you do the following:1 View the

Page 304

window displays details of each item in the Detailspane.Based on their functionalities, Security History broadlyorganizes all categories into the All

Page 305 - About Norton Safe Web

SecurityHistory window. Therefore, Security Historydivides the items that are returned for any searchcriteria and displays them on separate pages. You

Page 306

1 Various alert windows and notifications1 Notification area of the Windows taskbar1 ThreatsDetected section in different Scan windowsTo open Security

Page 307

To view items in Security History1In the Norton Internet Security main window, clickAdvanced.2In the Computer Protection pane, click History.375Monito

Page 308

3In Security History window, in the Show drop-downlist, select the category of items that you want toview. Your options are:The Recent History view in

Page 309

The security risks include thesuspicious programs that cancompromise the security ofyour computer.The Resolved Security Risksview in the Security Hist

Page 310

The Security HistoryQuarantine provides a safelocation on your computerwhere you can isolate itemswhile you decide an action totake on them.The Quaran

Page 311

The firewall monitors thecommunications betweenyour computer and othercomputers on the Internet.The Firewall - Network andConnections category in theS

Page 312 - 1 Click Search

To create a Norton Account from the Norton AccountWeb page1In the Norton Internet Security main window, clickAccount.2In the Norton Account Web page t

Page 313

The firewall monitors thecommunications betweenyour computer and othercomputers on the Internet.The firewall maintains rulesto control Internet access

Page 314

Download Insight processesany executable file that youdownload for analysis of itsreputation level. It theninforms you about theprocessing results bas

Page 315

The various features ofIdentity Safe help youmanage your identities andprovide additional securitywhile you perform onlinetransactions.The Identity vi

Page 316

The performance alertfeature lets you view,monitor, and analyze theimpact of the systemactivities on your computer.The Performance Alert viewin the Se

Page 317 - About Identity Safe vaults

In some cases, you mighthave submitted evaluation ofcertain Web pages toSymantec.The Sites Reported toSymantec view in theSecurity History windowdispl

Page 318 - 1 Reset your Identity Safe

Email errors include anyfailure that occurs whenNorton Internet Security triesto send, download, or scan anemail message that you sendor receive.The E

Page 319

Silent Mode suppresses alertsand notifications andtemporarily suspends mostof the background activities.The Silent Mode view in theSecurity History wi

Page 320

4Click a row to view details for that item.If you want to view additional information about anitem, click the More Details option in the Detailspane.

Page 321

The following table lists the categories that providethe advanced details about the Security History items:Displays the followinginformation about the

Page 322

Actions389Monitoring protection featuresAbout Security History

Page 323

if required. Your computer must be connected to theInternet to access your Norton Account.wSymantec products that are older than the 2006product year

Page 324

Displays the actions that areavailable for the selected itemThe options in the Actions viewvary depending on the optionsthat are available in the Show

Page 325 - Resetting Identity Safe

This action removes therestricted status from theselected computer or fromall of the unclassifiedcomputers on the selectednetwork.This option is avail

Page 326 - Accessing Identity Safe

Displays the links that providethe information that is relatedto the selected itemFor some Security History items,this view lets you access therelevan

Page 327 - 1 The Norton Toolbar

The File Insight window lets you view more details ofevents that belong to some of the following categoriesin the Security History window:Lets you vie

Page 328

Lets you view the detailedinformation about quarantinedsecurity risks in an organizedway.The Quarantine categoryincludes the infected files thatare is

Page 329

You can select a tab to view more details about it. TheFile Insight window provides details about a file in thefollowing tabs:Displays the information

Page 330 - Securing your sensitive data

Provides the details about theactions performed by the file onyour computer. It also providesinformation about the resourceusage of a process and the

Page 331 - 1 Change your login settings

About the Threat Detected windowThe Threat Detected window appears whenever NortonInternet Security detects a security risk on yourcomputer. You can u

Page 332

level. The following are some of the options that areavailable in this window:Returns the selected Quarantineitem to its original locationwithout repa

Page 333 - Saving logins

You can clear the search results and return to thecurrent Security History list by clicking the black cross(x) icon in the Quick Search box.The Quick

Page 334

Software in accordance with suchspecifications;B. make one copy of the Software for back-upor archival purposes, or copy the Softwareonto the hard dis

Page 335 - Editing logins

1 General system information and performanceattributes from the computer1 General information about your computer such asidle time, standby, and scree

Page 336

The data is saved in a comma-separated text format.When you use this file type option, you can openand view the file externally without using Security

Page 337

5Select the .mcf file and click Open.You can only open log files of .mcf format in theSecurity History window. You can open and viewlog files of .txt

Page 338 - 1 Click Login

Once an item has been quarantined, you have severaloptions. All of the actions that you take on quarantineditems must be performed in the Security His

Page 339

3In the Threat Detected window, select the actionthat you want to perform. Some of the options are:Returns the selectedQuarantine item to itsoriginal

Page 340

The Quarantine view in the Security History windowdisplays a list of quarantined items. You can view thename and the risk status of each quarantined i

Page 341

remain on your computer or restore it if SpywareProtection has removed it.Some quarantined items are successfully disinfectedafter Norton Internet Sec

Page 342

When you submit files to Symantec automatically ormanually, you contribute to the effectiveness of yourSymantec product. For example, you can submit a

Page 343 - Adding cards

This chapter includes the following topics:1 Feature summary1 About turning off automatic features1 About customizing settings and optionsFeature summ

Page 344

downloads, and other files are scanned for viruses andother potential risks. In addition, the definition updatesthat Automatic LiveUpdate downloads wh

Page 345

Detects viruses, spyware, andother security risks incompressed files during manualscans.See “What to do if a security riskis found” on page 179.Compre

Page 346 - About Edit Notes

About Norton Bootable Recovery ToolNorton Bootable Recovery Tool scans and removesviruses, spyware, and other security risks from yourcomputer. Your c

Page 347 - Editing Notes

Scans for and detects viruses ininstant messenger attachments.Scans the instant messengerattachments for the supportedinstant messenger programsthat w

Page 348

About spyware and other security risk protectionfeaturesSpyware and other security risk protection featuresprovide protection against the latest secur

Page 349 - 1 Plain text

If you are unsure how tohandle a program that isclassified as a security risk,you can view the security riskassessment. The security riskassessment de

Page 350

Detects when your computerconnects to a new network.You can then allow or blockconnections from allcomputers that areconnected to that network.See “Ab

Page 351 - About Identity Safe Options

1 Uses a user-defined address listto expedite the scanning of email.1 Accepts all email messages fromsenders in the Allowed List.1 Treats all email me

Page 352

Norton Online Family helps parents to get a betterunderstanding of what children do online, so that theycan better protect and guide them.You can use

Page 353 - Password Security

1 Monitor and manage the Internet search that yourchildren perform.1 Define House Rules for your children based on theirage and maturity.wNorton Onlin

Page 354

In some cases, Auto-Protect might warn you about avirus-like activity that you know are not the work of avirus. If you perform such an activity and wa

Page 355 - 1 At least one capital letter

To control these spam mails you can use the spamfiltering. By default, spam protection remains active.If for any reason you want to disable it, you ca

Page 356

wNorton Community Watch collects and submits detaileddata about the Norton-specific errors and componentsonly. It does not collect or store any person

Page 357

Programs containingmalicious codes that aredisguised as or hiding insomething benign, such as agame or utility.Trojan horsesTools that are used by aha

Page 358

2In the Settings window, click the Network tab.3In the left pane, click Smart Firewall.4In the Intrusion Prevention row, move the On/Offswitch to the

Page 359

2In the Settings window, click the Web tab, and dothe following:1 In the Browser Protection section, in theBrowser Protection row, move the On/Offswit

Page 360

2In the Settings window, click the Web tab, and dothe following:1 In the Browser Protection section, in theBrowser Protection row, move the On/Offswit

Page 361

Configuring Norton Internet Security settingsThe default Norton Internet Security settings providea safe, automatic, and efficient way to protect your

Page 362

2In the Settings window, configure your settings inthe following tabs:Lets you configure howyou want Norton InternetComputerSecurity to scan yourcompu

Page 363

Lets you configure howyou want Norton InternetSecurity to monitor yournetwork activities.You can protect yourcomputer against thethreats that you migh

Page 364

Lets you safeguard yoursensitive information andonline transactions.You can manage yourlogin information, such asemail login credentialsand your finan

Page 365

Lets you configure theappearance and securityof your product.In addition, you canconfigure how NortonInternet Security submitsrisk details to Symantec

Page 366

About Computer settingsThe various options in the Computer tab let youconfigure how you want Norton Internet Security toscan your computer for viruses

Page 367

Norton Internet Security lets yourun different types of scans todetect and prevent any virusinfection on your computer.You can use the variousComputer

Page 368

Programs that track systemactivity, gather systeminformation, or track userhabits, and relay thisinformation to third-partyorganizations. Theinformati

Page 369

Real Time ProtectionCustomizing protection featuresAbout customizing settings and options430

Page 370

Real Time Protection optionprotects your computer bycontinuously checking forviruses and other security risks.You can use the Real TimeProtection opti

Page 371 - Monitoring

SONAR Protection1Symantec Online Network forAdvanced Response (SONAR)provides you with real-timeprotection against threats byproactively detectingunkn

Page 372

Updates433Customizing protection featuresAbout customizing settings and options

Page 373 - Opening Security History

Norton Internet Securityprotects your computer fromvulnerabilities through the latestprogram and definition updates.Definition updates contain theinfo

Page 374

latest available version andprompts you for freeinstallation. To get the latestversion, this option must beturned on.1 Smart DefinitionsActivates the

Page 375

Your options are:Intrusion PreventionCustomizing protection featuresAbout customizing settings and options436

Page 376

Intrusion Prevention scans allthe network traffic to and fromyour computer and comparesthis information against a set ofattack signatures. Attacksigna

Page 377 - About Security History

Message ProtectionCustomizing protection featuresAbout customizing settings and options438

Page 378

Message Protection protectsyour computer against thethreats that you may receivethrough email attachments. Youcan use the Email Antivirus Scanoption,

Page 379

You can download Norton Bootable Recovery ToolWizard in one of the following ways:1 From the Start menu.1 From the Norton Support Web site.To download

Page 380

your computer with whichyou want to integrate NortonAntiSpam.1 Send feedback about anymisclassified email messageto Symantec for analysis.1 Classify t

Page 381

Network SecuritySettings441Customizing protection featuresAbout customizing settings and options

Page 382

The Metered Broadband Modeoption lets you set up policiesand restrict the Internet usageof Norton Internet Security. Youcan define the amount ofnetwor

Page 383

related to the computers ordevices that are on yournetwork.1 Grant or deny permissions tothe networked devices toaccess your computer.1 Add or Remove

Page 384

Smart Firewall monitorscommunications between yourcomputer and the othercomputers on the Internet. Italso protects your computerfrom common security p

Page 385

Your options are:The Browser Protection featurechecks for browservulnerabilities in followingbrowsers:1 Internet Explorer 6 or later1 Firefox 3.0 or l

Page 386

Norton Internet Securityprotects your Internet Explorer,Firefox, and Chrome Webbrowsers with the Safe Surfingoptions.When the options under SafeSurfin

Page 387

Your options are:Norton Tasks447Customizing protection featuresAbout customizing settings and options

Page 388

Lets you configure yourNorton Tasks settings.Your options are:1 Automatic Resume DelayThis option delays theautomatic backgroundtasks for a specificdu

Page 389

volume when yourcomputer is idle.When the option is turnedon, Norton InternetSecurity automaticallyschedules theoptimization after youinstall an appli

Page 390

Using the Norton Bootable Recovery ToolIf the installation of your Norton product fails, you canuse the Norton Bootable Recovery Tool to scan andremov

Page 391

Other SettingsCustomizing protection featuresAbout customizing settings and options450

Page 392 - About the File Insight window

Lets you configure themiscellaneous settings.Your options are:1 Power Saving ModeLets you save your batterypower by suspending theNorton Tasks when yo

Page 393

most recent definitions.1 Norton CommunityWatchLets you submit selectedsecurity and applicationdata to Symantec foranalysis. Symantecanalyses the data

Page 394

1 Parental Controls havenot been installedLets you install NortonOnline Family.Norton Online Family is aparental controlapplication that helps youprot

Page 395

Performance MonitoringCustomizing protection featuresAbout customizing settings and options454

Page 396

Lets you monitor theperformance of yourcomputer.1 Performance MonitoringWhen you turn on thePerformance Monitoringoption, Norton InternetSecurity moni

Page 397

Log Only, or the Offmode. The Details &Settings link in thenotification alert letsyou view additionaldetails about theresource consumptionby the p

Page 398 - Searching in Security History

2 Alert for High-Usageof:2 CPUWhen this optionis turned on,Norton InternetSecurity detectsand notifies youwith the details ofincreased usage ofthe CPU

Page 399 - 1 Text Files (.txt)

about theincreased usage ofhandles by anyprogram orprocess.2 Program ExclusionsLets you selectspecific programs toexclude fromappearing inperformance

Page 400

Product Security459Customizing protection featuresAbout customizing settings and options

Page 401

Starting Norton Internet Security from thecommand promptIf you work from the command line (for example,writing a script or code), you can start Norton

Page 402

Lets you protect NortonInternet Security fromunauthorized changes.Your options are:1 Non-Admins Access toSettingsLets you access andconfigure all the

Page 403

to view or configure yourproduct settings.However, if you forgetyour settings password,you can reset thepassword in the windowthat appears when youcho

Page 404

Silent Mode SettingsCustomizing protection featuresAbout customizing settings and options462

Page 405

Lets you turn on or turn offSilent Mode.Your options are:1 Silent ModeWhen you turn on theSilent Mode option, SilentMode is enabled for aspecified dur

Page 406

turns on Quiet Mode.When Quiet Mode isturned on, NortonInternet Securitysuppresses thebackground activitiesbut continues todisplay alerts andnotificat

Page 407 - Customizing

2 User-SpecifiedProgramsWhen you run anapplication that islisted in theUser-SpecifiedPrograms list, NortonInternet Securitydetects the activity,and au

Page 408 - 1 Monitors your computer for

wYou cannot run System Restore on your computer whenNorton Product Tamper Protection is turned on. Youmust temporarily turn off Norton Product TamperP

Page 409

To turn on Norton Product Tamper Protection1In the Norton Internet Security main window, clickSettings.2In the Settings window, click the General tab.

Page 410 - Feature summary

wThe reset settings password option appears in theSelect your Uninstall Preference window only whenthe SettingsPassword Protection option is turned on

Page 411

6In the dialog box that appears, in the Password box,type a password.7In the Confirm Password box, type the passwordagain.8Click OK.9In the Settings w

Page 412

and notifications appear over the notification area ofyour computer. In most cases, you can click the linkavailable in the alert to view the details a

Page 413 - About spam filtering features

your Norton Internet Security Settings password usingthe reset settings password option in the SelectUninstall Preference window.To access the SelectU

Page 414 - About Parental Control

5In the dialog box that appears, in the ResetPassword Key box, type the randomly generatedkey that is displayed against Reset Password Key.6In the New

Page 415

Customizing protection featuresAbout customizing settings and options472

Page 416

This chapter includes the following topics:1 Finding the version number of your product1 Finding the End-User License Agreement1 About upgrading your

Page 417

Finding the End-User License AgreementEnd-User License Agreement (EULA) is a legaldocument that you agree to while installing theproduct. EULA contain

Page 418

Download of New Version option, go the NortonInternet Security main window, and then click Settings> Updates > Automatic Download of New Version

Page 419

updates. You can use LiveUpdate to obtain the latestupdates.The upgrade process might not work if your Webbrowser is incompatible to communicate with

Page 420

wYour product must be activated and you need anInternet connection to check if a new version isavailable and install new version of the product.To che

Page 421

that your computer is connected to the Internet. If youuse a proxy server to connect to the Internet, you mustconfigure the proxy settings of Norton I

Page 422

2In the Support drop-down menu, click GetSupport.3Follow the on-screen instructions in the CheckingYourConnection window to attempt to correct yourcon

Page 423

About Norton Internet Security shortcut menuNorton Internet Security performs backgroundactivities to keep your computer secure. The icon inthe notifi

Page 424 - 1 Updates

wThe Symantec Web site is constantly updated andenhanced, so the available resources may vary.To stay informed about protection issues1Open your Web b

Page 425

About SupportIf you have purchased Norton Internet Security, youcan access Support from the product.wSupport offerings may vary based on the language

Page 426 - 1 Safe Surfing

contact the technical support team in the followingways:Chat in real time with asupport representative.For more complex technicalissues, chat offers t

Page 427

also use the SearchSupport box to find solution usinga keyword.Norton Support Web site also contains useful links tothe product manual, the Norton Acc

Page 428 - About Computer settings

You can also use the click here link at the bottom ofthe Norton Autofix window to contact a supportrepresentative.wAvailability of support varies by r

Page 429

About keeping your subscription currentSubscription period lengths vary by Symantec product.To maintain uninterrupted protection, you must keepyour su

Page 430 - Real Time Protection

The ClubNorton Web page includes a regularly updatedarticle library, a glossary, the Norton Forums, and theNorton Update Center. You can also find the

Page 431 - 1 Auto-Protect

Symantec Web site or from the CD. To reinstall NortonInternet Security, follow the installation proceduresthat are available in the user guide.During

Page 432

4In the page that appears, under Select YourUninstall Preference, click one of the following:Lets you retain your settings,passwords, and preferences

Page 433

To uninstall Norton Internet Security from the Startmenu1On the Windows taskbar, do one of the following:1 In Windows XP, click Start > Programs &g

Page 434 - 1 Automatic Download of New

Lets you turn on or turn offSilent Mode.Turn on/Turn off SilentModeLets you turn off or turn on thefirewall.Disable/Enable SmartFirewallLets you turn

Page 435

5Do one of the following:1 Click RestartNow (recommended) to restart thecomputer.1 Click RestartLater to restart the computer later.Norton Internet Se

Page 436 - Your options are:

Aabout customer support 481accessingFacebook Scan 115accessing Norton Internet SecurityscansComputer Scan 115Reputation Scan 115Actions windowdeleting

Page 437

Antispywaremanaging using the mainwindow 255Application Ratingscheck trust level 99Scan Performance Profiles 101attack signatures 244attacksnetwork 19

Page 438 - Message Protection

Creating custom scans (continued)adding folders 123Crimeware Protectionturning off or turning on 420custom scanconfigure scan options 125select items

Page 439 - 1 Specify the addresses or

file extensionsof infected files 188filterWeb Query 267filteringemail 257identifying email senders 261, 263SSL 255web-based 267firewall rulesabout 194

Page 440 - 1 Classify the spam email

Insight Network (continued)Insight Network scan 134Quick Scan 134scan 134shortcut menu scan 134Single File Scan 134Insight Protectionturning off 136tu

Page 441

Manual Repair windowreviewing remaining risksin 118, 120Media Center ExtenderSilent Mode 167Memory graphabout 78obtaining historical data 80Metered Br

Page 442 - 1 View or modify details

Norton Insightabout 92Files of Interest 96refreshing trust level 96trusted files 92viewing processes 96Norton Internet Securityabout securing 467activ

Page 443

Online transactionsidentity theft 313Optimizationabout 84boot volume 85OptionsClient Integration 258customizing 422password protection 407Smart Firewa

Page 444 - About Web settings

programsadding to Program Control 200configuring Internet access 204creating firewall rules 204removing from ProgramControl 202protectionpreparing for

Page 445

by the Software, the Software will cease tofunction until activation is complete; atwhich time the Software functionality willbe restored. In the even

Page 446 - About General settings

download the latest updates. To configure the proxysettings of your network, go to the Norton InternetSecurity main window, and then click Settings &g

Page 447

running Quick Scanfast scan 119Insight Network Quick Scan 119Quick Scan 119Reputation Scan 142SSafe Surfingabout 301Safe Webturning off 312turning on

Page 448 - 1 Idle Time Optimizer

security risksabout 254, 411adding to Quarantine 403assessment 411attacks 194found by Auto-Protect 179, 181managing protection using themain window 25

Page 449

subscriptionmaintaining 485product updates 56summaryproduct features 407Supervisor user accountcreating firewall rules 197SupportAutoFix Scan 478Self

Page 450 - Other Settings

WWeb pageslaunching 338protection 302reporting 304Web Queryabout 267turning off 268turning on 268Web Settingsabout 444wireless networkviewing status 2

Page 451 - 1 Insight Protection

fooNorton from Symantec products protect consumers from traditional threats with antivirus, antispam, and Spyware Protection.They also protect against

Page 452

The type of definition updates that each of theSymantec products receive are as follows:Users of these productsreceive the latest virusdefinitions fro

Page 453 - 1 Parental Controls have

Users of these productsreceive the latest virusdefinitions fromSymantec that protectsyour computer from alltypes of security threats.In addition, user

Page 454

Contains the most importantvirus definitions that arerequired for latest securitythreats as viewed by Symantec.The Core Set is a subset of theComplete

Page 455 - 2 Performance Alerting

As the Smart Definitions are of considerably smallersize, it results in lesser download time, lesserinstallation time, lesser boot time, and lesser me

Page 456

These downloads are called Pulse Updates. The PulseUpdates are lighter and faster than AutomaticLiveUpdate. It keeps your computer secure from theongo

Page 457 - 2 Handles

updates periodically, which are enhancements to theproduct. Program updates are usually created to fixprogram errors, improve the performance of thepr

Page 458

you can acquire the product and maintain your statusare as follows:The product includes a limited-timesubscription to definition updates. Whenthe subs

Page 459 - Product Security

run LiveUpdate manually to obtain updates if you haveturned off the Automatic LiveUpdate option.wIf you are connected to the Internet, AutomaticLiveUp

Page 460 - 1 Settings Password

About Pulse UpdatesIn addition to the definition updates that AutomaticLiveUpdate downloads, Norton Internet Security usesstreaming technology to down

Page 461

be subject to the import and export laws ofthe United States, specifically the U.S. ExportAdministration Regulations (EAR), and thelaws of any country

Page 462 - Silent Mode Settings

turn on or turn off Pulse Updates only if AutomaticLiveUpdate is turned on.To turn off or turn on Pulse Updates1In the Norton Internet Security main w

Page 463 - 2 IMAPI 2.0 Disk Burn

the Internet. It also contains the words which you wantto filter and block while you access the Internet. Youcan also choose the option that lets your

Page 464

Lets you provide the details ofyour Proxy Settings.Under Proxy Settings, check Usea proxy server for your HTTPconnections, and do thefollowing:1 In th

Page 465 - 2 User-Specified

5In the Network Proxy Settings window, do thefollowing:1 If you want your browser to automatically detectnetwork connection settings, under AutomaticC

Page 466

Getting startedAbout Network Proxy settings64

Page 467

This chapter includes the following topics:1 About System InsightAbout System InsightNorton Internet Security continuously monitors yourcomputer to ke

Page 468

disk optimizations, threat detections, performancealerts, or Quick Scans. The graph displays theactivities as icon or stripe, and the description fore

Page 469

The NortonTasks window provides the details suchas the timestamp, the duration, and the status ofthe background jobs. The details also include thetype

Page 470

About monitoring system activitiesSystem Insight provides information about theimportant system activities that you performed or thatoccurred over a p

Page 471

Indicates the optimizationactivities that you performed onyour system over a period of thelast three monthsOptimizedProvides the details about thethre

Page 472

The name given to the Device during theinitial setup of such Device. If collected, thename will be used by Symantec as an accountname for the Device u

Page 473 - Finding additional

Provides the details about QuickScans that Norton InternetSecurity performed on yoursystem over a period of the lastthree monthsThe details include th

Page 474 - About upgrading your product

To view details of your system activities1In the Norton Internet Security main window, clickPerformance.2In the Performance window, at the top of the

Page 475

exceeds the defined threshold limit, Norton InternetSecurity alerts you with a performance alert.You can use the Resource Threshold Profile forAlertin

Page 476

Turns on performance alerts.Select this option if you wantNorton Internet Security tonotify you with performancealerts when a program orprocess exceed

Page 477 - About Norton Autofix

4Under Performance Monitoring, in thePerformanceAlerting row, do one of the following:1 To turn off performance alerts, move thePerformanceAlerting sw

Page 478

4Under Performance Monitoring, in the ResourceThreshold Profile for Alerting row, select one ofthe following options:Configures a low thresholdlimit f

Page 479

Turning off or turning on the Use Low Resource Profile OnBattery Power optionWhen your computer runs on battery power, it isimportant that all active

Page 480

3In the left pane, click Performance Monitoring.4Under Performance Monitoring, in the Use LowResource Profile On Battery Power row, move theOn/Off swi

Page 481 - About Support

window. When you remove a program, the programappears in the performance alert the next time itcrosses the resource consumption threshold limit.To rem

Page 482

define a region of the graph that you are interested toview. You can select a Zoom option to obtain magnifiedview or historical data of the graphs. Fo

Page 483 - About phone support

may collect, transmit, store, disclose andanalyze such information for these purposes.CPS / S 5.0 / USE

Page 484 - Support policy

The Zoom options provide you the magnified view ofthe CPU graph and memory graph. For example, if youselect the 10min option, Norton Internet Security

Page 485 - ClubNorton

3Do one of the following:1 To obtain historical data for the last one day,click 1d.1 To obtain historical data for the last one week,click 1w.1 To obt

Page 486 - About uninstalling

information such as Community Usage and ResourceUsage. You can also click the application name andview the File Insight details. These details would h

Page 487

These programs are called startup items. The startupitems increase the start time of your computer.Startup Manager helps you manage the startup itemso

Page 488

To delay startup items1In the Norton Internet Security main window, clickPerformance.2In the Performance window, click StartupManager.3In the StartupM

Page 489

Optimization rearranges file fragments into adjacentor contiguous clusters. When the drive head accessesall of the file data in one location, the file

Page 490

drive that contains the boot volume. Therefore, itrequires more time to complete optimization.You can access the Optimize option at the top of thesecu

Page 491

optimization does not affect the performance of yourcomputer.Optimization rearranges file fragments into adjacentor contiguous clusters in the hard di

Page 492

2In the Settings window, click the General tab.3In the left pane, click Norton Tasks.4In the Idle Time Optimizer row, move the On/Offswitch to the lef

Page 493

You can view details about the completion of thetask.1 The power source that the Norton Task uses.You can specify the type of power source that eachof

Page 494

Chapter 1 Getting started ... . . . ... . . . 13Activation protects you ... 13About Norton Interne

Page 495

3In the Norton Tasks window, view the details ofbackground jobs.4Do one of the following:1 To run a background job, click the Play icon thatappears be

Page 496

You can select one of the following options:Allows the Norton Tasks torun only when your computeruses external power.If you choose this option,Norton

Page 497

To configure the power source1In the Norton Internet Security main window, clickPerformance.2In the Performance window, in the left pane, clickNorton

Page 498

A Norton Internet Security scan can identify threatson your computer in the following ways:At regular intervals, NortonInternet Security obtainsdefini

Page 499

Norton Internet Security obtainsspecific information about theFiles of Interest and submits theinformation to Symantec duringidle time. The informatio

Page 500

Symantec assigns the following confidence levels toFiles of Interest:Symantec analyzes the file asgood based on the statisticalevaluation that is done

Page 501

follows the Blacklist technique to scan your computer.It scans all of the files on your computer against thesignatures that it obtained during definit

Page 502

The drop-down list that is available in the NortonInsight - Application Ratings window provides youthe following options:Lists the processes that runo

Page 503

Lists the Files of Interest thatyou manually trusted in theFile Insight windowThis category does not listthe files that do not belongto the File of In

Page 504

To view the files using Norton Insight1In the Norton Internet Security main window, clickAdvanced.2In the Computer Protection pane, click ApplicationR

Comments to this Manuals

No comments