Product ManualCare for our Environment, ‘It's the right thing to do’.Symantec has removed the cover from this manual to reduce the Environmental
Chapter 4 Responding to security issues ... . . ... 179What to do if a security risk is found ... . . . .. 179Chapter 5 Protecting Internet
Insight - Application Ratings window. However, youcan use the CheckTrust Now option in the File Insightwindow to update the trust value of a file. You
To find the location of the file4In the File Insight window, click Locate.To refresh the trust level of the file4In the File Insight window, click Che
The complete scan includes a scan of all files onyour computer irrespective of the confidence levelor digital signature of the files.1 Configure to St
To configure Scan Performance Profiles from the NortonInsight - Application Ratings window1In the Norton Internet Security main window, clickAdvanced.
Norton Internet Security provides reports based on thefollowing categories:Lets you view the details of thevarious attacks your computeris protected f
To view the Monthly Report1In the Norton Internet Security main window, clickSettings.2In the Settings window, click the General tab.3In the left pane
Monitoring your system's performanceAbout System Insight106
This chapter includes the following topics:1 About maintaining protection1 About the Norton Internet Security scansAbout maintaining protectionAfter y
1 Run LiveUpdate regularly to receive new programupdates.1 Keep Auto-Protect turned on at all times to preventviruses from infecting your computer.1 W
2In the Settings window, in the Computer tab, movethe On/Off switch to the left to the On position forthe following settings:Computer Scan providesthe
Index ... . . . ... . . . ... . . ... . . . ... 49111Contents
5In the Smart Firewall section, in the SmartFirewallrow, move the On/Off switch to the left to the Onposition.6In the Message Protection section, move
activities that are performed on your computer toprotect your computer from the Internet-based threatsthat exploit software vulnerabilities.Norton Int
Insight Network Scan uses thevirus definitions that areavailable locally and hosted inthe Cloud. Insight Network Scandetects the files that aresuspici
Reputation Scan displays thereputation information of thefiles on your computer. Itdisplays the reputationinformation such as trust level,prevalence,
Scan Facebook Wall lets youscan the links and URLs that areavailable on your Facebookprofile.When you click the ScanFacebook Wall option, NortonIntern
and some of the options in the network settings let youconfigure how you want Norton Internet Security toscan your computer for viruses and other secu
2In the window that appears, do one of the following:1 In the Computer Scan pane, click the scan thatyou want to run.1 Click Reputation Scan, and then
example, if a Trojan horse is detected, the scan resultsof the Computer Scan displays the threat as Trojan.Foo.You can click the Scan Now option avail
Scans a particular file,removable drives, any of yourcomputer's drives, or any foldersor files on your computer.You can create a custom scan ifyo
2In the Computer Scan pane, click Full System Scan.You can use the following options to suspend a FullSystem Scan:Suspends a Full System Scantemporari
Contents12
2In the Computer Scan pane, click Quick Scan.You can use the following options to suspend aQuick Scan:Suspends a Quick Scantemporarily.Click Resume to
3In the Scans window, do one of the following:1 To scan specific drives, click Run next to DriveScan, select the drives that you want to scan,and then
computer. Viruses, spyware, and other risks oftentarget these areas.If your most recent scan was a Full System Scan, thiswindow shows the results of a
About custom scansYou can create a custom scan if you regularly scan aparticular segment of your computer. This custom scanlets you scan the segment f
6On the Scan Schedule tab, set the frequency andtime at which you want to perform the scan. See“Scheduling a scan” on page 128.7On the Scan Options ta
4In the window that appears, on the Scan Items tab,do the following:1 To add drives, click Add Drives, in the ScanDrives dialog box, select the drives
4In the Edit Scan window, on the Scan Options tab,configure the scan options as required.5Click Save.Editing a custom scanYou can edit a custom scan t
2In the Computer Scan pane, click Custom Scan.3In the Scans window, click Run next to the customscan that you want to run.You can use the following op
About scheduling scansNorton Internet Security uses Idle Time Scans toautomatically detect the idle state of your computerand runs a Full System Scan
To schedule a custom scan1In the Norton Internet Security main window, clickScan Now.2In the Computer Scan pane, click Custom Scan.3In the Scans windo
This chapter includes the following topics:1 Activation protects you1 About Norton Internet Security main window1 About your Norton Account1 About Nor
Scheduling a Full System ScanNorton Internet Security uses Idle Time Scans toautomatically detect the idle state of your computer.Norton Internet Secu
Internet Security scans only the running processes andthe loaded programs. Quick Scan takes less time to scanthan a Full System Scan because this scan
5Click Save.Running a scan at the command promptYou can scan with Norton Internet Security from thecommand prompt without opening the Norton InternetS
Enables (+) or disables(-) scanning of stealthitems/ST[+|-]Uses a task file as inputto the list of items toscanTask file path shouldfollow the ':
Scans the specifieddrive, folder, or file[drive|folder|file]Performs Quick Scan inthe background.wNorton InternetSecurity displays thescans window onl
Internet Security performs the Insight Network scan,it uses the virus definitions that are available locallyand in the Cloud. Norton Internet Security
Norton Internet Security simultaneously performsa traditional Quick Scan and an Insight NetworkQuick Scan to scan the areas of your computer thatthe v
on. By default, the Insight Protection option is turnedon.To turn off or turn on the Insight Protection1In the Norton Internet Security main window, c
the signature-based threat detection. It compares thesignature of the filtered reputation files against theknown threat signatures to identify threats
This category includesWindows System files (.sys),dynamic link library files(.dll), and device driver files(.drv).System filesThis category includesAc
If you are connected to the Internet, product activationtakes place automatically when you start the productfor the first time after installation. Aft
Scans all the Files of Interestthat are available on yourcomputer.When you perform a FullSystem Scan, Norton InternetSecurity searches for Files ofInt
Symantec has a fewindications that the file is nottrusted.This file is suspicious and canharm your computer.PoorSymantec has a highindication that the
4If there is a file with Poor or Bad trust level, underthe Trust Level column, click the red cross (x) icon.5In the Quarantine File window, click Quar
check the trust level of a specific file, you can scan theparticular file.To run a Reputation custom scan1In the Norton Internet Security main window,
When you run a Reputation Quick Scan, NortonInternet Security considers the Files of Interest whichinclude running processes and loaded programs. When
1 The Norton Network graph displays the detailsabout the known good files and bad files.You can view the number of trusted files that areon your compu
Trust LevelProtecting your files and dataAbout the Norton Internet Security scans146
Indicates the trust level thatis assigned to a file.Symantec analyzes specificinformation about a file suchas the digital signature andthe hash value
suspicious file.Indicates the communityusage level of the file.The search results aregrouped in to the followingcategories:1 Very Few Users: Showsthe
Indicates the system resourceusage level of the file.The usage levels are asfollows:1 Low: Indicates that thefile consumes minimumsystem resources.1 M
updates to the product. If you skip the NortonAccountwindow, the product is activated, but the product keyis not saved in the Norton Account. You can
Indicates the stability ratingof the file.The stability rating dependson how frequently theprogram crashes. Thedifferent stability ratings areas follo
are not only protected from unsafe sites but you alsolet other Facebook users know the security status ofany Web site.However, Norton Safe Web require
The following are the safety states that Norton SafeWeb provides after it scans the links on your FacebookWall:Indicates that the site is safe tovisit
To scan your Facebook Wall1In the Norton Internet Security main window, clickScan Now.2In the window that appears, click Scan FacebookWall.3In the Nor
The following list provides details on the settings thatyou can make and the predefined parameters:You can set the duration afterwhich Norton Internet
Norton Internet Security discontinues any Idle TimeScans that it started during idle time if you begin touse your computer again. However, it resumes
3In the Idle Time Scans row, in the drop-down list,select the option that you want to set. Your optionsare:1 Weekly1 Monthly1 Quarterly4Click Apply.Sp
3In the Norton Tasks window, in the Idle Timeoutdrop-down list, select the duration that you want tospecify.4Click Close.About SONAR ProtectionSymante
lets you specify the amount of time for which you wantSONAR Protection to be turned off.wWhen Auto-Protect is turned off, SONAR Protection isalso disa
should exclude programs only if you are confident thatthey are not infected. You can exclude the programsfrom the Auto-Protect scans and SONAR scans b
The product key is a 25-character alphanumeric stringthat is shown in five groups of five characters each,separated by hyphens. The location of the pr
6In the dialog box that appears, select the item thatyou want to exclude from the scan.7Click OK.8In the Add Item dialog box, click OK.9In the window
wWhen you exclude a known security risk from NortonInternet Security scans, the protection level of yourcomputer reduces. You should exclude items onl
Microsoft Visiovisio.exeMicrosoft Accessmsaccess.exeMicrosoft Projectwinproj.exeNorton Internet Security scans the Office documentsand protect against
About Silent ModeNorton Internet Security provides many solutions andfeatures to handle viruses and other security threats.Norton Internet Security di
The Silent Mode that NortonInternet Security turns onautomatically when it detects adisk burning task or a MediaCenter TV recording task. NortonIntern
About the Silent Mode that you turn on manuallyNorton Internet Security lets you manually turn onSilent Mode for a specified duration. When Silent Mod
To turn on Silent Mode from the Settings window1In the Norton Internet Security main window, clickSettings.2In the Settings window, click the General
2In the Performance window, click Norton Tasks.3In the Norton Tasks window, under Silent Mode,move the On/Off switch to the right to the Offposition.4
Norton Internet Security identifies a Media CenterExtender session as an active full-screen applicationand turns on Silent Mode. When Silent Mode is e
About Quiet ModeNorton Internet Security automatically enables QuietMode when you perform a few tasks that require higherutilization of your system re
To recover or access yourproduct key log on tohttps://www.mynortonaccount.com.If you are not registered,register for Norton Account.You can find the p
The following table explains about the various options:When you use a Media Centerapplication to burn a CD or aDVD, Norton Internet Securityautomatica
When you use a Media Centerapplication to record a TVprogram, Norton InternetSecurity automatically enablesQuiet Mode, if the Media CenterTV Recording
Norton Internet Securityautomatically turns on QuietMode when it detects a TVprogram recording session or adisk-burning session. Inaddition, you can m
only after the TV program recording session ordisk-burning session is complete. You cannot turn offQuiet Mode during the sessions by using the options
About User-Specified ProgramsNorton Internet Security automatically turns on QuietMode when it detects a TV program recording sessionor a disk-burning
Quiet Mode. Norton Internet Security turns on QuietMode the next time when you execute the program.You can only add the programs that have .exe fileex
4Under Quiet Mode on Detection of, in theUser-Specified Programs row, click Configure.5In the Quiet Mode Programs window, select theprogram that you w
Turns off boot time protection.If you turn off the Enable Boot Time Protectionoption, the protection level of your computerreduces.Configuring boot ti
Protecting your files and dataAbout the Norton Internet Security scans178
This chapter includes the following topics:1 What to do if a security risk is foundWhat to do if a security risk is foundYour product provides many so
You can find the following items in the main window:Lets you view the overallprotection status of yourcomputer.When your system status isSecure, your
risk. You can access the Symantec Security ResponseWeb site and refer the manual removal instructions.In some cases, Norton Internet Security might no
You can view information about detected viruses andother security threats in Security History.Security History also includes information aboutspyware,
3In the Show drop-down list, select the category forwhich you want to review Auto-Protect alerts.Your options are:Review Auto-Protectnotifications tha
4In the right pane, click the Options link.The option name appears as Restore & Options forfew items.If one or more security risks such as spyware
5In the Threat Detected window, select theappropriate action on the risk.The following are some of the options that areavailable in the Threat Detecte
Removes the selectedsecurity risk from thecomputer andquarantines it.This option is availablefor the security risks thatrequire your attention formanu
Sends the security risk toSymantec.In some cases, NortonInternet Security mightnot identify an item as asecurity threat, but youmight suspect that the
To respond to Worm Blocking alerts4In the alert window, select the action that you wantto take. Your options are:Permanently stops theworm by putting
2After the worm has been quarantined, perform thefollowing tasks:1 Run LiveUpdate to ensure that you have thelatest definition updates.See “About Prog
If that does not work, read the information on theThreats Detected window to identify the types of files189Responding to security issuesWhat to do if
Lets you provide feedback on theproduct on a Symantec Webpage.wThis feature may not beavailable in some versions ofNorton Internet Security.FeedbackLe
that cannot be repaired. You can take one of thefollowing actions, depending on the file type:Infected filesResponding to security issuesWhat to do if
You canview thefile typeof thedetectedrisk. Thisinformationhelps youto decidetheactionthat canbe takendependingon thefile type.Forexample,you canview
Replaceusingyouroperatingsystemdisks.Hard disk master boot record, boot record, orsystem files (such as IO.SYS or MSDOS.SYS) andfloppy disk boot recor
This chapter includes the following topics:1 About the Smart Firewall1 About Download Insight1 About Intrusion Prevention1 About Vulnerability Protect
Internet. It also protects your computer from suchcommon security problems as the following:Warns you of connectionattempts from othercomputers and of
The Smart Firewall uses two kinds of firewall rules:Control network access forprograms on your computer.Program rulesControl all the incoming and theo
network functionality and protection from knownInternet risks. Examples of default firewall rulesinclude the following:Permit all types ofoutbound and
You can add a new General rule in this window. Youcan also do the following activities:You can change the settings ofa General rule that does notfunct
1 Add a program.1 Rename a program.1 Modify the rules for a program.1 Add a rule for a program.1 Modify the access settings of a program rule.1 Modify
Lets the firewall notifyyou when a programattempts to access theInternet. You can thenallow or block Internetaccess for the program.In some instances,
Norton™ Internet Security ProductManualThe software described in this book is furnished under a licenseagreement and may be used only in accordance wi
You can use the following options to perform theimportant tasks in Norton Internet Security:Lets you access different typesof scans to protect yourcom
for the first time, an alert prompts you to configureaccess settings.When you turn off Automatic Program Control, awarning appears. Symantec recommend
program, you can configure its access settings inProgram Control. You can allow, block, or create thecustom rules that are specific to the program tha
8In the Security Request - ProgramControl window,in the What do you want to do? drop-down list,select the access level that you want this programto ha
you removed any programs in the previous version anddo not want them in the current version, you mustremove them again.To remove a program from Progra
6In the drop-down list next to the program that youwant to change, select the access level that you wantthis program to have. Your options are:Allow a
5In the Advanced Settings window, in the GeneralRules row, click Configure.6In the General Rules window, click Add.7Follow the instructions in the Add
2In the first panel of the AddRule Wizard, select theaction that you want for this rule. Your options are:Allow communication ofthis type.AllowFor exa
Update the Firewall –Activities category in theevent log each time thatcommunication of thistype takes place. Thisoption lets you monitorhow often thi
4Select the type of connection for the rule. Youroptions are:The rule applies tooutbound connectionsfrom your computer toanother computer.Connections
5Click Next, and then select the computers that applyto the rule. Your options are:The rule applies to allcomputers.Any computerThis rule applies only
Lets you access the NortonInternet Security advancedwindow.By using the Norton InternetSecurity advanced window, youcan do the following:1 Run differe
6Click Next, and then select the protocols for therule. Your options are:The rule applies to TCP(Transmission ControlTCPProtocol)communications.The ru
The rule applies to allsupported protocols.When you select thisoption, you cannotspecify the types ofcommunications or portsthat apply to the rule.All
8Click Next.9Check Create a Security History log entry if youwant Norton Internet Security to create an entry inthe firewall event log.Norton Internet
5In the Advanced Settings window, in the GeneralRules row, click Configure.6In the General Rules window, select the rule thatyou want to change.7Click
Changing the order of firewall rulesEach list of firewall rules is processed from the topdown. You can adjust how the firewall rules areprocessed by c
5In the Program Control window, in the Programcolumn, select the program that contains the rulethat you want to move.6Click Modify.7In the Rules windo
Removing a firewall ruleYou can remove some of the firewall rules if necessary.However, you cannot remove some of the defaultGeneral rules that appear
6Click Modify.To remove all the program rules that are associatedwith the program, click Remove.7In the Rules window, select the rule that you wantto
Lets you configure how NortonInternet Security must control thenetwork communications to and fromyour computer.For instance, you may have to beaway fr
Displays the level of access that theprogram hasYou can change the access level byselecting a different entry from thedrop-down list.Your options are
The bottom section of the Norton Internet Securitymain window helps you do the following:Lets you access the worldmap with hotspots ofcybercrimes and
1 Select the networks or computers you want tocompletely restrict from directly accessing yourcomputer.When you select Trust Control, the Network Secu
Firewall Reset221Protecting Internet activitiesAbout the Smart Firewall
Returns the SmartFirewall to its defaultstate. You can click Resetto ensure that allrecommended firewallrules and settings areconfigured. NortonIntern
address range1 Your computer mustbe connected to asecure wireless orwired connectionEnsures that blocked andinactive ports do notrespond to connection
Automatic File/Printer SharingControlProtecting Internet activitiesAbout the Smart Firewall224
Allows the computers onthe network to shareresources such as files,folders, and printers (thatare locally attached)Some of the Windows 7features such
new network to whichyour computer isconnected as Shared orProtected. The promptappears only when thesecurity criteria forsharing matches.Protecting In
Automatic Program Control227Protecting Internet activitiesAbout the Smart Firewall
Automatically configuresInternet access settingsfor the Web-enabledprograms that are run forthe first timeThe Automatic LearnIPv6 NAT TraversalTraffic
receive firewall alerts,you can turn onAutomatic ProgramControl.The Advanced EventsMonitoring settingsconsist of the followingcategories that providey
Online Family23Getting startedAbout Norton Internet Security main window
1 Program ComponentThis option protectsyou against themalicious programsthat launchInternet-enabledprograms.1 Program LaunchThis option protectsyou ag
Internet withoutfirewall alerts.1 Direct NetworkAccessThis option protectsyou against the Trojanhorses and othermalicious programsthat bypass networkt
1 COM ControlThis option protectsyou against themalicious programsthat manipulate anapplication's behaviorby instantiatingcontrolled COMobjects.A
1 The traffic has violated the traffic policy of thefirewall1 The traffic comes from the restricted zone ofnetworks or computers1 The traffic matches
1 Opera (Browser)1 Firefox (Browser)1 Chrome (Browser)1 AOL (Browser)1 Safari (Browser)1 Yahoo (Browser)1 MSN Explorer (Browser, E-mail & Chat)1 Q
Download Insight uses the file analysis results toprovide you the reputation details of the file. The basicreputation levels of the files are good, ba
Includes the files that areneither safe nor unsafe.Unknown files have unprovenreputation. These files mightharm your computer. In the caseof an unknow
Lets you cancel the installationof the executable program.Cancel installationLets you remove the file fromyour computer.Remove this file from mysystem
You can use the Download Intelligence option to turnoff or turn on Download Insight.To turn off Download Intelligence1In the Norton Internet Security
1 Notifies you only when you download a file that isinfected with a local virus identification. If the filethat you download is infected with a cloud
Lets you monitor your child’sactivities on the Internet.wNorton Online Familymay not be available in someversions of Norton InternetSecurity.When you
Configuring the Show Report on Launch of FilesoptionThe Show Report on Launch of Files option lets youspecify when and for what type of file you want
When you set the Show Reporton Launch of Files option toUnproven Files Only, DownloadInsight prompts you to select asuitable action for unknown fileso
When you set the Show Reporton Launch of Files option toNever, Download Insight doesnot prompt you to select asuitable action for any type offile that
4Under Download Intelligence, in the Show Reporton Launch of Files row, do one of the following:1 If you want Download Insight to prompt you fora suit
To turn on or turn off Alert on Poor Stability1In the Norton Internet Security main window, clickSettings.2In the Settings window, click the Web tab.3
If you are sure that a device on your network is safe,you can change the trust level of the device to FullTrust. These trusted devices can be excluded
To turn off or turn on an individual Intrusion Preventionnotification1In the Norton Internet Security main window, clickSettings.2In the Settings wind
6Click OK.To include the attack signatures that were previouslyexcluded1In the Norton Internet Security main window, clickSettings.2In the Settings wi
4Under Intrusion Prevention, in the IntrusionAutoBlock row, click Configure.5In the Intrusion AutoBlock window, underAutoBlock, do one of the followin
6Click OK.Permanently blocking a computer that has beenblocked by AutoBlockYou can permanently block a computer that AutoBlockhas blocked. The permane
details such as your child’slatest search terms, and thelatest alerts. After you signin, you can use the GetDetails option in the bottomsection of the
using the Network Security Map. You can exclude thesetrusted devices from Intrusion Prevention scan.Excluding Full Trust devices from the IntrusionPre
If you find that any of the devices that you excludedfrom Intrusion Prevention scan is infected, you canpurge the saved exclusion list and remove all
attacks. It also provides information about the knownattacks that they are protected from.Vulnerabilities are flaws in your programs or youroperating
For each program, you can view details such as thename of the program, its vendor, and the number ofvulnerabilities that the program contains. You can
should leave the signatures turned on. If you disable asignature, your computer may be vulnerable to attack.To view details about a vulnerable applica
It then gives this data to companies that can send youadvertisements based on these preferences.Tracking cookies are the small files that programs can
spam email and legitimate email. It filters legitimateemail into the Inbox folder and spam email into theJunk folder or the Norton AntiSpam folder.Nor
current address books. When Norton AntiSpam importsthe addresses from your Outlook address book orWindows address book, it also imports the addressest
Configuring Client IntegrationThe Client Integration window lists the supported emailprograms, or clients, that are installed on yourcomputer and thei
notifies the successful integration of Norton AntiSpamwith your email client.Norton AntiSpam also automatically imports the listsof addresses from the
Lets you download theNorton Mobile Security forAndroid.You can use Norton MobileSecurity on all your devicesthat use Android operatingsystem.wNorton M
7Click OK to save the changes and close the ClientIntegration window.Setting Address Book ExclusionsWhen you add an email address to the Address BookE
8Click OK to save and close the Address BookExclusions window.To edit or delete entries in the Address Book Exclusionslist1In the Norton Internet Secu
To import an address book1In the Norton Internet Security main window, clickSettings.2In the Settings window, click the Network tab.3In the left pane,
4Under AntiSpam, in the Allowed List row, clickConfigure.5In the Allowed List window, select the item withwhich you want to work.6Do one of the follow
6Click OK to save and close the AllowedList window.To add entries to the Blocked List1In the Norton Internet Security main window, clickSettings.2In t
6Do one of the following:1 To edit an entry, click Edit to open the EditEmail Address dialog box, edit the details, andthen click OK.1 To delete an en
Marks the selected email as allowed (not spam)and moves the email message into the Inbox.When you reclassify an email message aslegitimate, Norton Int
To set the Feedback option1In the Norton Internet Security main window, clickSettings.2In the Settings window, click the Network tab.3In the left pane
high percentage of legitimate emails are misclassifiedas spam or spam is misclassified as legitimate. To avoidsuch misclassification, Norton AntiSpam
additionally through the Web Query filter. Web Queryfilter analyzes the signature and URL hashes of theemail messages to classify them as legitimate e
Safe Web27Getting startedAbout Norton Internet Security main window
email programs that use non-SSL POP3 and SMTPcommunication protocols. Norton Internet Securityalso scans all incoming and outgoing email messages.Nort
To add POP3 and SMTP ports to Protected Ports1In the Norton Internet Security main window, clickSettings.2In the Settings window, click the Network ta
6Click Apply and then click OK.7In the Settings window, click OK.About the Network Security MapA home network typically consists of the computersand o
Turning off or turning on Network Security OverviewThe Network Security Overview window provides abrief summary about the following features:1 Wireles
4In the WelcomeScreen row, move the On/Off switchto the left to the On position.5Click Apply.6Click OK.Viewing devices on the Network Security MapThe
To view devices on the Network Security Map1In the Norton Internet Security main window, clickAdvanced.2Under NetworkProtection, click Network Securit
To view the details of a device on the Network SecurityMapProtecting Internet activitiesAbout the Network Security Map276
4In the Network Security Map window, click a deviceicon.You can use the scroll arrows to view the devicesthat are listed in the network map.The device
Shows the category to which thedevice belongsThe device category iconprovides details on theconnection status and securitystatus. Norton Internet Secu
Shows the access level that isgranted to a remote device toconnect to your computerThe initial trust level is set basedon the configuration of yourcom
Lets you check the safety ofa Web site.You can also perform a safesearch.wThis option may not beavailable with some versionsof Norton Internet Securit
Shows if the device is excludedfrom Intrusion Prevention scan.You can exclude a Full Trustdevice from Intrusion Preventionscan. When you exclude atrus
3On the left side of the Network Security Mapwindow, under Remote Monitoring, click Setup.4In the Remote Monitoring Setup window, type aPasskey.The Pa
2Under NetworkProtection, click Network SecurityMap.3On the left side of the Network Security Mapwindow, under Remote Monitoring, click Disable.4In th
The default trust level of the devices that you add tothe Network Security Map is Protected. However, youcan change the trust level of the devices.wIf
Finding a computer's IP addressYou can find a computer's IP address in various ways.On Windows 2000/XP, Windows Vista, and Windows7 computer
Editing device detailsYou can change the name and category of a device thatis available on the Network Security Map. You canselect the categories such
6In the Category drop-down list, click one of thefollowing device categories:1 GENERIC DEVICE1 DESKTOP PC1 LAPTOP1 SERVER PC1 NETWORK PRINTER1 ROUTER/
To edit network details1In the Norton Internet Security main window, clickAdvanced.2Under NetworkProtection, click Network SecurityMap.3In the Network
Vista Ultimate, Windows 7 Home Premium,Windows 7 Professional, or Windows 7 Ultimate)wIf you use a wireless network that is not secure, thedefault tru
5To select a trust level for a network, in the EditNetwork Trust Level window, click one of thefollowing:Adds the network to the TrustedlistFULL TRUST
section of the Norton InternetSecurity main window to viewthe recent Norton Safe Webstatistics on malicious sitesand URLs. You can also viewthe list o
Adds the network to theRestricted listThe devices that are onRestricted network cannotcommunicate with yourcomputer. However, you can stilluse the net
5To select a trust level for a device, in the EditDeviceTrust Level window, click one of the following:Adds a device to the Full TrustlistFull Trust d
Scanning every request from all the devices that accessyour computer increases the scan time which slowsdown the network speed of your computer.If you
4In the Network Security Map window, do one ofthe following:1 To edit the trust level of a device that is on yournetwork, in the network map, click th
When you remove an individual device, the onlinedevices appear again the next time you open theNetwork Security Map. However, Norton InternetSecurity
For more information on how to secure your wirelessnetwork, on the left side of the Network Security Mapwindow, click the Why is it not secure link. F
To view the device details1In the Norton Internet Security main window, clickAdvanced.2Under NetworkProtection, click Network SecurityMap.3In the Netw
To modify the communication port for Network SecurityMap1In the Norton Internet Security main window, clickSettings.2In the Settings window, click the
You can set up one of the following policies for each ofthe adapter that Norton Internet Security uses toconnect to the Internet:1 No LimitLets Norton
2In the Settings window, click the Network tab.3In the left pane, click Network Security Settings.4In the Metered Broadband Mode row, move theOn/Off s
Norton License AgreementNorton™ Internet SecurityIMPORTANT: PLEASE READ THE TERMSAND CONDITIONS OF THIS LICENSEAGREEMENT (“LICENSE AGREEMENT”)CAREFULL
The panes are:Provides you the essentialcomputer protection options.It also contains links to scanyour computer, view thehistory of protection events,
4In the Metered Broadband Mode row, move theOn/Off switch to the left to the On position.5Click Configure.The MeteredNetwork Settings window lists all
This chapter includes the following topics:1 About securing your sensitive dataAbout securing your sensitive dataThe Internet provides the fastest and
window. The Norton Safe Web feature provides you asafe search environment in the Web by displaying thesite rating icons next to every search result.Wh
The Norton Site Safety pop-up window in InternetExplorer, Firefox, or Chrome Web browsers lets youview more details about the safety status of the Web
Reporting an incorrect evaluation of a Web siteOn rare occasions, Antiphishing may report incorrectevaluation of a Web site. For example, you might vi
navigation to the Web sites that are confirmed to befraudulent.The Norton Site Safety pop-up window helps youunderstand if the Web site that you visit
wNorton Safe Web supports Internet Explorer, Firefox,or Chrome Web browsers.You can view the site safety status of any Web siteusing the FullReport op
Norton Safe Web provides the following Web site safetystates when you browse through the Internet:You can see Norton Secured iconnext to the search re
You can see a red cross (x) iconnext to the search results.When you visit a Web site withthis status, you can see a similarstatus icon on the NortonTo
Norton Safe Web does not havesufficient information about thisWeb site to provide a shoppingsafety rating.UntestedNorton Safe Web has analyzedthis Web
You can view the different protection features on theright side of the window. You can move your mousepointer over each feature to view a brief summar
let other Facebook users know about the security statusof any Web site.To scan your Facebook Wall using Norton Safe Web,use the ScanFacebookWall optio
In addition, Norton Safe Search provides the followingfeatures:When you search the Internetusing Norton Safe Search, itanalyzes the security levels of
You can use Norton Safe Search even when you turnoff the Identity Safe features.wNorton Safe Search is supported only by the InternetExplorer, Firefox
4In the Norton Safe Web row, do one of the following:1 To turn off Norton Safe Web, in the Norton SafeWeb row, move the On/Off switch to the rightto t
Antiphishing also helps to protect you frommalicious Web sites when you perform onlinetransactions.1 Manages your card information when you havemultip
Internet Security expires as you are vulnerable toonline thefts and phishing attacks.The following are the activities that you can performafter the pr
In addition to the local vault that you create on aWindows user account, you can also save your IdentitySafe data in online vault.You can access the I
4In the Identity Safe row, do one of the following:1 To turn off Identity Safe, in the Identity Saferow, move the On/Off switch to the right to theOff
wIf you have Identity Safe data that is stored on anyexternal drives from the older versions of NortonInternet Security, you can convert that portable
1 The computer must be connected to the Internet.wYou can create only one online vault for a NortonAccount. You must log in to your Norton Account tom
You can respond to the System Status indicatorsdirectly from the main window.To respond to System Status indicators from the mainwindow1In the bottom
7In the Password Hint box, type a hint for thepassword.8Uncheck the Store information online throughyour Norton Account checkbox.This option appears o
to your Norton Account to create an online vault. TheIdentity Safe data is stored online using your NortonAccount.You can access the Identity Safe dat
1 Lets you access you Identity Safe data from anycomputer.wYour computer must have the latest version NortonInternet Security installed and must be co
require your Identity Safe data that is stored in yourlocal vault and online vault, you can delete the vaults.When you delete the local vault and onli
4In the Password box, type the password.5Do one of the following:1 If you want to delete the data from the portableprofile after import, check Delete
7In the IdentitySafe Setup Successful window, clickDone.Resetting Identity SafeThere may be instances when you need to reset yourIdentity Safe.You may
6In the Trouble Logging In? window, click ResetIdentity Safe.If you forget the Identity Safe password of youronline vault, you need to provide your No
To access Identity Safe settings from the main window1In the Norton Internet Security main window, clickSettings.2In the Settings window, click the We
5In the Log in to Identity Safe window, in the Enterthe Password box, type the password of the vaultyou want to log in.6Click Login.To log out of Iden
4Under Identity Safe, identify the feature that youwant to use, and click Configure. Your options are:Lets you set up Identity Safevault.Identity Safe
1 Browser Protection1 Safe SurfingTo monitor the protection status of a feature1In the Norton Internet Security main window, clickAdvanced.2In the win
Lets you set the options that letIdentity Safe securely collect andstore your Web page logininformation.In addition, you can do thefollowing activitie
Lets you manage your personalinformation such as name, dateof birth, email address, andcredit card information in oneplace.You can use the information
Lets you store and managesensitive information.You can save social securitynumber, driver's license number,insurance policy number, andpassport n
site's login page. You can instantly save your logininformation in Identity Safe.wTo manage your logins, you must be logged in toIdentity Safe.Id
logins for the same Web site. You can also save thesame login for different Web sites.When you provide your login credentials on a Web site,Identity S
3On the Norton Toolbar, in the Save your login forthis site? row, do one of the following:1 If you want to save your login, click Save. In theSave Log
1 Lets you save the Web site name with a name otherthan the default name.1 Displays the login ID and lets you show or hide thepassword.1 Displays the
4Under Identity Safe, in the Edit Logins row, clickConfigure.5In the Edit Logins window, click Create New Login.6In the New Login dialog box, type the
7In the Validate Password for Identity Safe window,do the following:1 In the Enter the Password box, type yourIdentity Safe password.1 Click Login.8In
1 View the details of the date and time when you lastmade to the Edit Logins settingsTo quick-launch a login Web page1In the Norton Internet Security
must provide your account information in theNorton Account window that appears.1 Any time after activationIf you skip the Norton Account window during
Changing the user name and passwordIdentity Safe lets you change the user name andpassword for the logins that you have saved in the EditLogins window
6Under Details, next to the Password box, clickShow.The Validate Password for Identity Safe windowappears. This window appears only if you havechanged
4In the Save new password for login? menu bar, clickSave.About Edit Identity CardsThe Edit Identity Cards option in Identity Safe letsyou manage your
When you are on a Web page that has forms, the Fillfields on this page? menu bar in the Norton Toolbardisplays the cards that you saved. You can click
6Use the following tabs to type your card details:Provide details such as cardname, name, gender, and dateof birth. You can set a passwordand provide
You can view a summary of the card that you created.You can select any of the cards that are present in thelist of cards at the bottom of the Edit Ide
2In the Settings window, click the Web tab.3In the left pane, click Identity Safe.4Under IdentitySafe, in the EditIdentity Cards row,click Configure.5
Editing NotesYou can use the Edit Notes option in Identity Safe tostore your personal information, which you can retrieveand use when needed. You can
6Click Edit Notes, and modify the information underDetails.You can change the category, modify the title, andedit the additional information that you
You can import your Identity Safe data from the filethat you previously backed up. You can also import theIdentity Safe data from the portable profile
Saves your account informationand your billing details.The Profile options are:1 Account InformationYou can update your NortonAccount information andy
8If you want to back up your data with a passwordfor more security, type and confirm the password.9Click OK.10In the confirmation dialog box, click OK
5In the Import Identity Safe Data window, underImport my data from, select one of the followingoptions:1 Portable Profile (Drive: Drive:\)This option
You can configure the following options in the IdentitySafe Options window:Prompts you to save the logincredentials for the Web sitesthat you visit.Of
Password Security353Securing your sensitive dataAbout securing your sensitive data
Specify the Identity Safepassword security level.Identity Safe provides fourlevels of security to protectyour Identity Safe password.Choose one of the
45 minutes.This option is useful if youare frequently in an areawhere other people haveaccess to your computer.1 No password needed.Automatically log
1 The password must not match with your NortonAccount user name or password.wYou can set your password hint here if you did notprovide it when you con
You have the following options in the NortonToolbar:Lets you access the Web Settingsand other settings.The following options areavailable in the Norto
Lets you perform an enhancedInternet search using NortonSafe Search.You can type a search string inthe Norton Safe Search box andperform a search. Whe
Lets you view the logins andcards that you have saved inIdentity Safe.Some Web sites have forms tofill or require login information.You can use the Id
Norton Online Backupprovides a secure andeasy-to-use online backupsolution that safeguards yourimportant data againstsystem crash, accidentaldeleting,
Hiding and showing the Norton ToolbarYou can hide the Norton Toolbar if you do not want tosee the evaluation of every Web site that you visit.When you
2On the NortonToolbar, in the Norton menu, selectone of the following:Lets you report to Symantecabout the current Antiphishingevaluation.Report SiteL
Lets you view the communitysite rating of the Web sites youvisit.You can click Community Buzzto know further details about theWeb sites. Norton Safe W
Lets you view the Norton SafeSearch box.You can type a search string inthe Norton Safe Search box andperform a search. The search boxdisplays relevant
Accessing the Identity Safe menuThe Identity Safe menu on the NortonToolbar lets youview and manage the logins, Identity cards, and notesthat you save
2On the Norton Toolbar, in the Identity Safe menu,select one of the following:Lets you merge the IdentitySafe data from your portableMerge Portable Da
OptionsSecuring your sensitive dataAbout securing your sensitive data366
Lets you view the variousoptions that are available inIdentity Safe.The options are:1 Ignore this pageYou can select this optionif you do not want toa
must log in to your NortonAccount to move yourdata online.wThis option appearsin the Identity Safe menuonly when you are loggedin to your local vault.
Lets you log out of or log into Identity Safe.You should log out of IdentitySafe to secure your IdentitySafe data when you are awayfrom your computer.
Creating a Norton AccountYour Norton Account stores the product key and thebilling information of your product. You can alsoregister your product with
Securing your sensitive dataAbout securing your sensitive data370
This chapter includes the following topics:1 About Security HistoryAbout Security HistorySecurity History window lets you do the following:1 View the
window displays details of each item in the Detailspane.Based on their functionalities, Security History broadlyorganizes all categories into the All
SecurityHistory window. Therefore, Security Historydivides the items that are returned for any searchcriteria and displays them on separate pages. You
1 Various alert windows and notifications1 Notification area of the Windows taskbar1 ThreatsDetected section in different Scan windowsTo open Security
To view items in Security History1In the Norton Internet Security main window, clickAdvanced.2In the Computer Protection pane, click History.375Monito
3In Security History window, in the Show drop-downlist, select the category of items that you want toview. Your options are:The Recent History view in
The security risks include thesuspicious programs that cancompromise the security ofyour computer.The Resolved Security Risksview in the Security Hist
The Security HistoryQuarantine provides a safelocation on your computerwhere you can isolate itemswhile you decide an action totake on them.The Quaran
The firewall monitors thecommunications betweenyour computer and othercomputers on the Internet.The Firewall - Network andConnections category in theS
To create a Norton Account from the Norton AccountWeb page1In the Norton Internet Security main window, clickAccount.2In the Norton Account Web page t
The firewall monitors thecommunications betweenyour computer and othercomputers on the Internet.The firewall maintains rulesto control Internet access
Download Insight processesany executable file that youdownload for analysis of itsreputation level. It theninforms you about theprocessing results bas
The various features ofIdentity Safe help youmanage your identities andprovide additional securitywhile you perform onlinetransactions.The Identity vi
The performance alertfeature lets you view,monitor, and analyze theimpact of the systemactivities on your computer.The Performance Alert viewin the Se
In some cases, you mighthave submitted evaluation ofcertain Web pages toSymantec.The Sites Reported toSymantec view in theSecurity History windowdispl
Email errors include anyfailure that occurs whenNorton Internet Security triesto send, download, or scan anemail message that you sendor receive.The E
Silent Mode suppresses alertsand notifications andtemporarily suspends mostof the background activities.The Silent Mode view in theSecurity History wi
4Click a row to view details for that item.If you want to view additional information about anitem, click the More Details option in the Detailspane.
The following table lists the categories that providethe advanced details about the Security History items:Displays the followinginformation about the
Actions389Monitoring protection featuresAbout Security History
if required. Your computer must be connected to theInternet to access your Norton Account.wSymantec products that are older than the 2006product year
Displays the actions that areavailable for the selected itemThe options in the Actions viewvary depending on the optionsthat are available in the Show
This action removes therestricted status from theselected computer or fromall of the unclassifiedcomputers on the selectednetwork.This option is avail
Displays the links that providethe information that is relatedto the selected itemFor some Security History items,this view lets you access therelevan
The File Insight window lets you view more details ofevents that belong to some of the following categoriesin the Security History window:Lets you vie
Lets you view the detailedinformation about quarantinedsecurity risks in an organizedway.The Quarantine categoryincludes the infected files thatare is
You can select a tab to view more details about it. TheFile Insight window provides details about a file in thefollowing tabs:Displays the information
Provides the details about theactions performed by the file onyour computer. It also providesinformation about the resourceusage of a process and the
About the Threat Detected windowThe Threat Detected window appears whenever NortonInternet Security detects a security risk on yourcomputer. You can u
level. The following are some of the options that areavailable in this window:Returns the selected Quarantineitem to its original locationwithout repa
You can clear the search results and return to thecurrent Security History list by clicking the black cross(x) icon in the Quick Search box.The Quick
Software in accordance with suchspecifications;B. make one copy of the Software for back-upor archival purposes, or copy the Softwareonto the hard dis
1 General system information and performanceattributes from the computer1 General information about your computer such asidle time, standby, and scree
The data is saved in a comma-separated text format.When you use this file type option, you can openand view the file externally without using Security
5Select the .mcf file and click Open.You can only open log files of .mcf format in theSecurity History window. You can open and viewlog files of .txt
Once an item has been quarantined, you have severaloptions. All of the actions that you take on quarantineditems must be performed in the Security His
3In the Threat Detected window, select the actionthat you want to perform. Some of the options are:Returns the selectedQuarantine item to itsoriginal
The Quarantine view in the Security History windowdisplays a list of quarantined items. You can view thename and the risk status of each quarantined i
remain on your computer or restore it if SpywareProtection has removed it.Some quarantined items are successfully disinfectedafter Norton Internet Sec
When you submit files to Symantec automatically ormanually, you contribute to the effectiveness of yourSymantec product. For example, you can submit a
This chapter includes the following topics:1 Feature summary1 About turning off automatic features1 About customizing settings and optionsFeature summ
downloads, and other files are scanned for viruses andother potential risks. In addition, the definition updatesthat Automatic LiveUpdate downloads wh
Detects viruses, spyware, andother security risks incompressed files during manualscans.See “What to do if a security riskis found” on page 179.Compre
About Norton Bootable Recovery ToolNorton Bootable Recovery Tool scans and removesviruses, spyware, and other security risks from yourcomputer. Your c
Scans for and detects viruses ininstant messenger attachments.Scans the instant messengerattachments for the supportedinstant messenger programsthat w
About spyware and other security risk protectionfeaturesSpyware and other security risk protection featuresprovide protection against the latest secur
If you are unsure how tohandle a program that isclassified as a security risk,you can view the security riskassessment. The security riskassessment de
Detects when your computerconnects to a new network.You can then allow or blockconnections from allcomputers that areconnected to that network.See “Ab
1 Uses a user-defined address listto expedite the scanning of email.1 Accepts all email messages fromsenders in the Allowed List.1 Treats all email me
Norton Online Family helps parents to get a betterunderstanding of what children do online, so that theycan better protect and guide them.You can use
1 Monitor and manage the Internet search that yourchildren perform.1 Define House Rules for your children based on theirage and maturity.wNorton Onlin
In some cases, Auto-Protect might warn you about avirus-like activity that you know are not the work of avirus. If you perform such an activity and wa
To control these spam mails you can use the spamfiltering. By default, spam protection remains active.If for any reason you want to disable it, you ca
wNorton Community Watch collects and submits detaileddata about the Norton-specific errors and componentsonly. It does not collect or store any person
Programs containingmalicious codes that aredisguised as or hiding insomething benign, such as agame or utility.Trojan horsesTools that are used by aha
2In the Settings window, click the Network tab.3In the left pane, click Smart Firewall.4In the Intrusion Prevention row, move the On/Offswitch to the
2In the Settings window, click the Web tab, and dothe following:1 In the Browser Protection section, in theBrowser Protection row, move the On/Offswit
2In the Settings window, click the Web tab, and dothe following:1 In the Browser Protection section, in theBrowser Protection row, move the On/Offswit
Configuring Norton Internet Security settingsThe default Norton Internet Security settings providea safe, automatic, and efficient way to protect your
2In the Settings window, configure your settings inthe following tabs:Lets you configure howyou want Norton InternetComputerSecurity to scan yourcompu
Lets you configure howyou want Norton InternetSecurity to monitor yournetwork activities.You can protect yourcomputer against thethreats that you migh
Lets you safeguard yoursensitive information andonline transactions.You can manage yourlogin information, such asemail login credentialsand your finan
Lets you configure theappearance and securityof your product.In addition, you canconfigure how NortonInternet Security submitsrisk details to Symantec
About Computer settingsThe various options in the Computer tab let youconfigure how you want Norton Internet Security toscan your computer for viruses
Norton Internet Security lets yourun different types of scans todetect and prevent any virusinfection on your computer.You can use the variousComputer
Programs that track systemactivity, gather systeminformation, or track userhabits, and relay thisinformation to third-partyorganizations. Theinformati
Real Time ProtectionCustomizing protection featuresAbout customizing settings and options430
Real Time Protection optionprotects your computer bycontinuously checking forviruses and other security risks.You can use the Real TimeProtection opti
SONAR Protection1Symantec Online Network forAdvanced Response (SONAR)provides you with real-timeprotection against threats byproactively detectingunkn
Updates433Customizing protection featuresAbout customizing settings and options
Norton Internet Securityprotects your computer fromvulnerabilities through the latestprogram and definition updates.Definition updates contain theinfo
latest available version andprompts you for freeinstallation. To get the latestversion, this option must beturned on.1 Smart DefinitionsActivates the
Your options are:Intrusion PreventionCustomizing protection featuresAbout customizing settings and options436
Intrusion Prevention scans allthe network traffic to and fromyour computer and comparesthis information against a set ofattack signatures. Attacksigna
Message ProtectionCustomizing protection featuresAbout customizing settings and options438
Message Protection protectsyour computer against thethreats that you may receivethrough email attachments. Youcan use the Email Antivirus Scanoption,
You can download Norton Bootable Recovery ToolWizard in one of the following ways:1 From the Start menu.1 From the Norton Support Web site.To download
your computer with whichyou want to integrate NortonAntiSpam.1 Send feedback about anymisclassified email messageto Symantec for analysis.1 Classify t
Network SecuritySettings441Customizing protection featuresAbout customizing settings and options
The Metered Broadband Modeoption lets you set up policiesand restrict the Internet usageof Norton Internet Security. Youcan define the amount ofnetwor
related to the computers ordevices that are on yournetwork.1 Grant or deny permissions tothe networked devices toaccess your computer.1 Add or Remove
Smart Firewall monitorscommunications between yourcomputer and the othercomputers on the Internet. Italso protects your computerfrom common security p
Your options are:The Browser Protection featurechecks for browservulnerabilities in followingbrowsers:1 Internet Explorer 6 or later1 Firefox 3.0 or l
Norton Internet Securityprotects your Internet Explorer,Firefox, and Chrome Webbrowsers with the Safe Surfingoptions.When the options under SafeSurfin
Your options are:Norton Tasks447Customizing protection featuresAbout customizing settings and options
Lets you configure yourNorton Tasks settings.Your options are:1 Automatic Resume DelayThis option delays theautomatic backgroundtasks for a specificdu
volume when yourcomputer is idle.When the option is turnedon, Norton InternetSecurity automaticallyschedules theoptimization after youinstall an appli
Using the Norton Bootable Recovery ToolIf the installation of your Norton product fails, you canuse the Norton Bootable Recovery Tool to scan andremov
Other SettingsCustomizing protection featuresAbout customizing settings and options450
Lets you configure themiscellaneous settings.Your options are:1 Power Saving ModeLets you save your batterypower by suspending theNorton Tasks when yo
most recent definitions.1 Norton CommunityWatchLets you submit selectedsecurity and applicationdata to Symantec foranalysis. Symantecanalyses the data
1 Parental Controls havenot been installedLets you install NortonOnline Family.Norton Online Family is aparental controlapplication that helps youprot
Performance MonitoringCustomizing protection featuresAbout customizing settings and options454
Lets you monitor theperformance of yourcomputer.1 Performance MonitoringWhen you turn on thePerformance Monitoringoption, Norton InternetSecurity moni
Log Only, or the Offmode. The Details &Settings link in thenotification alert letsyou view additionaldetails about theresource consumptionby the p
2 Alert for High-Usageof:2 CPUWhen this optionis turned on,Norton InternetSecurity detectsand notifies youwith the details ofincreased usage ofthe CPU
about theincreased usage ofhandles by anyprogram orprocess.2 Program ExclusionsLets you selectspecific programs toexclude fromappearing inperformance
Product Security459Customizing protection featuresAbout customizing settings and options
Starting Norton Internet Security from thecommand promptIf you work from the command line (for example,writing a script or code), you can start Norton
Lets you protect NortonInternet Security fromunauthorized changes.Your options are:1 Non-Admins Access toSettingsLets you access andconfigure all the
to view or configure yourproduct settings.However, if you forgetyour settings password,you can reset thepassword in the windowthat appears when youcho
Silent Mode SettingsCustomizing protection featuresAbout customizing settings and options462
Lets you turn on or turn offSilent Mode.Your options are:1 Silent ModeWhen you turn on theSilent Mode option, SilentMode is enabled for aspecified dur
turns on Quiet Mode.When Quiet Mode isturned on, NortonInternet Securitysuppresses thebackground activitiesbut continues todisplay alerts andnotificat
2 User-SpecifiedProgramsWhen you run anapplication that islisted in theUser-SpecifiedPrograms list, NortonInternet Securitydetects the activity,and au
wYou cannot run System Restore on your computer whenNorton Product Tamper Protection is turned on. Youmust temporarily turn off Norton Product TamperP
To turn on Norton Product Tamper Protection1In the Norton Internet Security main window, clickSettings.2In the Settings window, click the General tab.
wThe reset settings password option appears in theSelect your Uninstall Preference window only whenthe SettingsPassword Protection option is turned on
6In the dialog box that appears, in the Password box,type a password.7In the Confirm Password box, type the passwordagain.8Click OK.9In the Settings w
and notifications appear over the notification area ofyour computer. In most cases, you can click the linkavailable in the alert to view the details a
your Norton Internet Security Settings password usingthe reset settings password option in the SelectUninstall Preference window.To access the SelectU
5In the dialog box that appears, in the ResetPassword Key box, type the randomly generatedkey that is displayed against Reset Password Key.6In the New
Customizing protection featuresAbout customizing settings and options472
This chapter includes the following topics:1 Finding the version number of your product1 Finding the End-User License Agreement1 About upgrading your
Finding the End-User License AgreementEnd-User License Agreement (EULA) is a legaldocument that you agree to while installing theproduct. EULA contain
Download of New Version option, go the NortonInternet Security main window, and then click Settings> Updates > Automatic Download of New Version
updates. You can use LiveUpdate to obtain the latestupdates.The upgrade process might not work if your Webbrowser is incompatible to communicate with
wYour product must be activated and you need anInternet connection to check if a new version isavailable and install new version of the product.To che
that your computer is connected to the Internet. If youuse a proxy server to connect to the Internet, you mustconfigure the proxy settings of Norton I
2In the Support drop-down menu, click GetSupport.3Follow the on-screen instructions in the CheckingYourConnection window to attempt to correct yourcon
About Norton Internet Security shortcut menuNorton Internet Security performs backgroundactivities to keep your computer secure. The icon inthe notifi
wThe Symantec Web site is constantly updated andenhanced, so the available resources may vary.To stay informed about protection issues1Open your Web b
About SupportIf you have purchased Norton Internet Security, youcan access Support from the product.wSupport offerings may vary based on the language
contact the technical support team in the followingways:Chat in real time with asupport representative.For more complex technicalissues, chat offers t
also use the SearchSupport box to find solution usinga keyword.Norton Support Web site also contains useful links tothe product manual, the Norton Acc
You can also use the click here link at the bottom ofthe Norton Autofix window to contact a supportrepresentative.wAvailability of support varies by r
About keeping your subscription currentSubscription period lengths vary by Symantec product.To maintain uninterrupted protection, you must keepyour su
The ClubNorton Web page includes a regularly updatedarticle library, a glossary, the Norton Forums, and theNorton Update Center. You can also find the
Symantec Web site or from the CD. To reinstall NortonInternet Security, follow the installation proceduresthat are available in the user guide.During
4In the page that appears, under Select YourUninstall Preference, click one of the following:Lets you retain your settings,passwords, and preferences
To uninstall Norton Internet Security from the Startmenu1On the Windows taskbar, do one of the following:1 In Windows XP, click Start > Programs &g
Lets you turn on or turn offSilent Mode.Turn on/Turn off SilentModeLets you turn off or turn on thefirewall.Disable/Enable SmartFirewallLets you turn
5Do one of the following:1 Click RestartNow (recommended) to restart thecomputer.1 Click RestartLater to restart the computer later.Norton Internet Se
Aabout customer support 481accessingFacebook Scan 115accessing Norton Internet SecurityscansComputer Scan 115Reputation Scan 115Actions windowdeleting
Antispywaremanaging using the mainwindow 255Application Ratingscheck trust level 99Scan Performance Profiles 101attack signatures 244attacksnetwork 19
Creating custom scans (continued)adding folders 123Crimeware Protectionturning off or turning on 420custom scanconfigure scan options 125select items
file extensionsof infected files 188filterWeb Query 267filteringemail 257identifying email senders 261, 263SSL 255web-based 267firewall rulesabout 194
Insight Network (continued)Insight Network scan 134Quick Scan 134scan 134shortcut menu scan 134Single File Scan 134Insight Protectionturning off 136tu
Manual Repair windowreviewing remaining risksin 118, 120Media Center ExtenderSilent Mode 167Memory graphabout 78obtaining historical data 80Metered Br
Norton Insightabout 92Files of Interest 96refreshing trust level 96trusted files 92viewing processes 96Norton Internet Securityabout securing 467activ
Online transactionsidentity theft 313Optimizationabout 84boot volume 85OptionsClient Integration 258customizing 422password protection 407Smart Firewa
programsadding to Program Control 200configuring Internet access 204creating firewall rules 204removing from ProgramControl 202protectionpreparing for
by the Software, the Software will cease tofunction until activation is complete; atwhich time the Software functionality willbe restored. In the even
download the latest updates. To configure the proxysettings of your network, go to the Norton InternetSecurity main window, and then click Settings &g
running Quick Scanfast scan 119Insight Network Quick Scan 119Quick Scan 119Reputation Scan 142SSafe Surfingabout 301Safe Webturning off 312turning on
security risksabout 254, 411adding to Quarantine 403assessment 411attacks 194found by Auto-Protect 179, 181managing protection using themain window 25
subscriptionmaintaining 485product updates 56summaryproduct features 407Supervisor user accountcreating firewall rules 197SupportAutoFix Scan 478Self
WWeb pageslaunching 338protection 302reporting 304Web Queryabout 267turning off 268turning on 268Web Settingsabout 444wireless networkviewing status 2
fooNorton from Symantec products protect consumers from traditional threats with antivirus, antispam, and Spyware Protection.They also protect against
The type of definition updates that each of theSymantec products receive are as follows:Users of these productsreceive the latest virusdefinitions fro
Users of these productsreceive the latest virusdefinitions fromSymantec that protectsyour computer from alltypes of security threats.In addition, user
Contains the most importantvirus definitions that arerequired for latest securitythreats as viewed by Symantec.The Core Set is a subset of theComplete
As the Smart Definitions are of considerably smallersize, it results in lesser download time, lesserinstallation time, lesser boot time, and lesser me
These downloads are called Pulse Updates. The PulseUpdates are lighter and faster than AutomaticLiveUpdate. It keeps your computer secure from theongo
updates periodically, which are enhancements to theproduct. Program updates are usually created to fixprogram errors, improve the performance of thepr
you can acquire the product and maintain your statusare as follows:The product includes a limited-timesubscription to definition updates. Whenthe subs
run LiveUpdate manually to obtain updates if you haveturned off the Automatic LiveUpdate option.wIf you are connected to the Internet, AutomaticLiveUp
About Pulse UpdatesIn addition to the definition updates that AutomaticLiveUpdate downloads, Norton Internet Security usesstreaming technology to down
be subject to the import and export laws ofthe United States, specifically the U.S. ExportAdministration Regulations (EAR), and thelaws of any country
turn on or turn off Pulse Updates only if AutomaticLiveUpdate is turned on.To turn off or turn on Pulse Updates1In the Norton Internet Security main w
the Internet. It also contains the words which you wantto filter and block while you access the Internet. Youcan also choose the option that lets your
Lets you provide the details ofyour Proxy Settings.Under Proxy Settings, check Usea proxy server for your HTTPconnections, and do thefollowing:1 In th
5In the Network Proxy Settings window, do thefollowing:1 If you want your browser to automatically detectnetwork connection settings, under AutomaticC
Getting startedAbout Network Proxy settings64
This chapter includes the following topics:1 About System InsightAbout System InsightNorton Internet Security continuously monitors yourcomputer to ke
disk optimizations, threat detections, performancealerts, or Quick Scans. The graph displays theactivities as icon or stripe, and the description fore
The NortonTasks window provides the details suchas the timestamp, the duration, and the status ofthe background jobs. The details also include thetype
About monitoring system activitiesSystem Insight provides information about theimportant system activities that you performed or thatoccurred over a p
Indicates the optimizationactivities that you performed onyour system over a period of thelast three monthsOptimizedProvides the details about thethre
The name given to the Device during theinitial setup of such Device. If collected, thename will be used by Symantec as an accountname for the Device u
Provides the details about QuickScans that Norton InternetSecurity performed on yoursystem over a period of the lastthree monthsThe details include th
To view details of your system activities1In the Norton Internet Security main window, clickPerformance.2In the Performance window, at the top of the
exceeds the defined threshold limit, Norton InternetSecurity alerts you with a performance alert.You can use the Resource Threshold Profile forAlertin
Turns on performance alerts.Select this option if you wantNorton Internet Security tonotify you with performancealerts when a program orprocess exceed
4Under Performance Monitoring, in thePerformanceAlerting row, do one of the following:1 To turn off performance alerts, move thePerformanceAlerting sw
4Under Performance Monitoring, in the ResourceThreshold Profile for Alerting row, select one ofthe following options:Configures a low thresholdlimit f
Turning off or turning on the Use Low Resource Profile OnBattery Power optionWhen your computer runs on battery power, it isimportant that all active
3In the left pane, click Performance Monitoring.4Under Performance Monitoring, in the Use LowResource Profile On Battery Power row, move theOn/Off swi
window. When you remove a program, the programappears in the performance alert the next time itcrosses the resource consumption threshold limit.To rem
define a region of the graph that you are interested toview. You can select a Zoom option to obtain magnifiedview or historical data of the graphs. Fo
may collect, transmit, store, disclose andanalyze such information for these purposes.CPS / S 5.0 / USE
The Zoom options provide you the magnified view ofthe CPU graph and memory graph. For example, if youselect the 10min option, Norton Internet Security
3Do one of the following:1 To obtain historical data for the last one day,click 1d.1 To obtain historical data for the last one week,click 1w.1 To obt
information such as Community Usage and ResourceUsage. You can also click the application name andview the File Insight details. These details would h
These programs are called startup items. The startupitems increase the start time of your computer.Startup Manager helps you manage the startup itemso
To delay startup items1In the Norton Internet Security main window, clickPerformance.2In the Performance window, click StartupManager.3In the StartupM
Optimization rearranges file fragments into adjacentor contiguous clusters. When the drive head accessesall of the file data in one location, the file
drive that contains the boot volume. Therefore, itrequires more time to complete optimization.You can access the Optimize option at the top of thesecu
optimization does not affect the performance of yourcomputer.Optimization rearranges file fragments into adjacentor contiguous clusters in the hard di
2In the Settings window, click the General tab.3In the left pane, click Norton Tasks.4In the Idle Time Optimizer row, move the On/Offswitch to the lef
You can view details about the completion of thetask.1 The power source that the Norton Task uses.You can specify the type of power source that eachof
Chapter 1 Getting started ... . . . ... . . . 13Activation protects you ... 13About Norton Interne
3In the Norton Tasks window, view the details ofbackground jobs.4Do one of the following:1 To run a background job, click the Play icon thatappears be
You can select one of the following options:Allows the Norton Tasks torun only when your computeruses external power.If you choose this option,Norton
To configure the power source1In the Norton Internet Security main window, clickPerformance.2In the Performance window, in the left pane, clickNorton
A Norton Internet Security scan can identify threatson your computer in the following ways:At regular intervals, NortonInternet Security obtainsdefini
Norton Internet Security obtainsspecific information about theFiles of Interest and submits theinformation to Symantec duringidle time. The informatio
Symantec assigns the following confidence levels toFiles of Interest:Symantec analyzes the file asgood based on the statisticalevaluation that is done
follows the Blacklist technique to scan your computer.It scans all of the files on your computer against thesignatures that it obtained during definit
The drop-down list that is available in the NortonInsight - Application Ratings window provides youthe following options:Lists the processes that runo
Lists the Files of Interest thatyou manually trusted in theFile Insight windowThis category does not listthe files that do not belongto the File of In
To view the files using Norton Insight1In the Norton Internet Security main window, clickAdvanced.2In the Computer Protection pane, click ApplicationR
Comments to this Manuals