Symantec Norton Internet Security 2013 + Anti-Theft 1.0 Manual

Browse online or download Manual for Antivirus security software Symantec Norton Internet Security 2013 + Anti-Theft 1.0. Symantec Norton Internet Security 2013 User Manual

  • Download
  • Add to my manuals
  • Print
  • Page
    / 548
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 0
Product Manual
Care for our Environment; It's the right thing to do.
Symantec has removed the cover from this manual to reduce the Environmental Footprint of our
products. This manual is made from recycled materials.
Page view 0
1 2 3 4 5 6 ... 547 548

Summary of Contents

Page 1 - Product Manual

Product ManualCare for our Environment; ‘It's the right thing to do.’Symantec has removed the cover from this manual to reduce the Environmental

Page 2

Chapter 4 Responding to security issues .. . ... . ... 199What to do if a security risk is found ... . ... 199Chapter 5 Protecting Internet

Page 3 - Norton™ Internet Security

3In the Startup Manager window, in the On/Offcolumn, select the program that you want toautomatically start when you turn on yourcomputer.4Click Apply

Page 4

About optimizationThe data storage space on a disk is divided into discreteunits. These units are called clusters. When files arewritten to the disk,

Page 5 - 7. Limited Warranty:

application on your computer. The optimizationprocess starts next time when your computer is idle.You can use the Idle Time Optimizer option to optimi

Page 6 - 11. Arbitration:

2In the Performance window, at the top of thesecurity status graph, click Optimize.To optimize your boot volume from the Norton Taskswindow1In the Nor

Page 7 - 12. General:

Turning off or turning on Idle Time OptimizerNorton Internet Security automatically schedules theoptimization when it detects the installation of a ne

Page 8

1 The name of the Norton taskYou can use the icon that appears before the nameof a background job to start or stop a backgroundtask. You can start or

Page 9 - Contents

The Norton Tasks window lets you monitor thefollowing Norton-specific tasks:Automatic LiveUpdateautomatically checks fordefinition updates andprogram

Page 10 - Contents10

Allows the smart scanning offiles on your computer. Itimproves the performance ofNorton Internet Securityscans by letting you scanfewer files withoutc

Page 11 - 11Contents

Scans the important locationsof your computer that theviruses and other securitythreats often target.Quick Scan takes less time toscan than a Full Sys

Page 12 - Contents12

Performs backgroundmaintenance tasks related toNorton Internet Security.Tasks include clearing installlogs and rescanningconsolidated firewall rule.Pr

Page 13 - Getting started

Index ... ... ... . ... . ... . ... . ... ... ... 53511Contents

Page 14 - Activating your product

4Do one of the following:1 To run a background job, click the play icon thatappears before the name of the background job.1 To stop a running backgrou

Page 15

Allows the Norton Tasks torun irrespective if thecomputer uses externalpower or battery power.If you choose this option,Norton Internet Securityperfor

Page 16

4In the Power Source window, select one of thefollowing:1 ExternalAllows the Norton Task to run only when yourcomputer uses external power.1 External

Page 17

Norton Internet Security obtainsspecific information about theFiles of Interest and submits theinformation to Symantec duringidle time. The informatio

Page 18

Symantec assigns the following confidence levels toFiles of Interest:Symantec analyzes the file astrusted based on the statisticalevaluation that is d

Page 19 - 19Getting started

Norton Internet Security also provides differentprofiles to configure your scan performance. Whenyou use the Full Scan profile, Norton Internet Securi

Page 20

The drop-down list that is available in the NortonInsight - Application Ratings window provides youthe following options:Lists the processes that runo

Page 21 - 21Getting started

Lists the Files of Interest thatyou manually trusted in theFile Insight window.This category does not listthe files that do not belongto the File of I

Page 22

To view the files using Norton Insight1In the Norton Internet Security main window, clickAdvanced.2In the ComputerProtection pane, click ApplicationRa

Page 23 - 23Getting started

Insight - Application Ratings window. However, youcan use the CheckTrust Now option in the File Insightwindow to update the trust value of a file. You

Page 24

Contents12

Page 25 - 25Getting started

To find the location of the file4In the File Insight window, click Locate.To refresh the trust level of the file4In the File Insight window, click Che

Page 26

The complete scan includes a scan of all files onyour computer irrespective of the confidence levelor digital signature of the files.1 Configure to St

Page 27 - 27Getting started

To configure Scan Performance Profiles from the NortonInsight - Application Ratings window1In the Norton Internet Security main window, clickAdvanced.

Page 28

Norton Internet Security provides reports based on thefollowing categories:Lets you view the details of thevarious attacks your computeris protected f

Page 29 - 29Getting started

To view the Monthly Report1In the Norton Internet Security main window, clickSettings.2In the Settings window, click the General tab.3In the left pane

Page 30

This chapter includes the following topics:1 About maintaining protection1 About the Norton Internet Security scansAbout maintaining protectionAfter y

Page 31

1 Run LiveUpdate regularly to receive new programupdates.1 Keep Auto-Protect turned on at all times to preventviruses from infecting your computer.1 W

Page 32 - About your Norton Account

2In the Settings window, in the Computer tab, movethe On/Off switch to the left to the On position forthe following settings:Computer Scan providesthe

Page 33 - 1 Any time after activation

5In the Smart Firewall section, in the Smart Firewallrow, move the On/Off switch to the left to the Onposition.6In the MessageProtection section, move

Page 34

activities that are performed on your computer toprotect your computer from the Internet-based threatsthat exploit software vulnerabilities.Norton Int

Page 35

This chapter includes the following topics:1 Activation protects you1 About Norton Internet Security main window1 About your Norton Account1 About Nor

Page 36 - Creating a Norton Account

Insight Network Scan uses thevirus definitions that areavailable locally and hosted inthe Cloud. Insight Network Scandetects the files that aresuspici

Page 37 - Accessing your Norton Account

Reputation Scan displays thereputation information of thefiles on your computer. Itdisplays the reputationinformation such as trust level,prevalence,

Page 38 - About Norton Management

Scan Facebook Wall lets youscan the links and URLs that areavailable on your Facebookprofile.When you click the ScanFacebook Wall option, NortonIntern

Page 39

Accessing Norton Internet Security scansYou can use Norton Internet Security scans to secureyour computer from all types of viruses and unknownthreats

Page 40

To access the scan from the notification area4In the notification area on the taskbar, right-clickthe Norton Internet Security icon, and then clickRun

Page 41

If you suspect that your computer is infected, you canrun three types of computer scans manually to preventvirus infections on your computer.You can r

Page 42 - About managing devices

Scans a specific file, folder,drive, or removable drive thatyou choose.Custom ScanComputer Scan provides details about the scanneditems. You can view

Page 43 - About the supported devices

2In the Computer Scan pane, click FullSystem Scan.You can use the following options to suspend a FullSystem Scan:Suspends a Full System Scantemporaril

Page 44

2In the Computer Scan pane, click Quick Scan.You can use the following options to suspend aQuick Scan:Suspends a Quick Scantemporarily.Click Resume to

Page 45 - About Norton Community Watch

3In the Scans window, do one of the following:1 To scan specific drives, click Run next to DriveScan, select the drives that you want to scan,and then

Page 46

activate the product within a limited time period afteryou install it.If you are connected to the Internet, product activationtakes place automaticall

Page 47

computer. Viruses, spyware, and other risks oftentarget these areas.If your most recent scan was a Full System Scan, thiswindow shows the results of a

Page 48

About custom scansYou can create a custom scan if you regularly scan aparticular segment of your computer. This custom scanlets you scan the segment f

Page 49

5On the Scan Items tab, add the items that you wantto scan. See “Selecting the scan items” on page 142.6On the Scan Schedule tab, set the frequency an

Page 50

4In the window that appears, on the Scan Items tab,do the following:1 To add drives, click Add Drives, in the ScanDrives dialog box, select the drives

Page 51

3In the Scans window, in the Edit Scan column, clickthe edit icon next to the scan that you want toschedule.4In the Edit Scan window, on the Scan Opti

Page 52

To run a custom scan1In the Norton Internet Security main window, clickScan Now.2In the Computer Scan pane, click Custom Scan.3In the Scans window, cl

Page 53

4Click Yes to confirm that you want to delete thescan.About scheduling scansNorton Internet Security automatically detects the idlestate of your compu

Page 54

wNorton Internet Security lets you select multiple datesif you schedule a monthly scan.To schedule a custom scan1In the Norton Internet Security main

Page 55

6Under After scan completion:, select the state atwhich your computer should be after the scan iscomplete. Your options are:1 Stay On1 Turn Off1 Sleep

Page 56

5Click Next.6In the Scan Options tab, click Save.Scheduling a Quick ScanQuick Scan scans the important locations of yourcomputer that the viruses and

Page 57

During activation, the Norton Account windowappears. You can create your Norton Account andregister your product. You can also view details, suchas yo

Page 58

To edit a scheduled scan from Norton Internet SecurityScans dialog box1In the Norton Internet Security main window, clickScan Now.2In the Computer Sca

Page 59 - About Norton Power Eraser

Enables (+) or disables(-) boot recordscanning and masterboot record scanning(for example, NAVW32C: /B+ or NAVW32 C:/B-)/B[+|-]Scans only the bootreco

Page 60

To run a scan from the command prompt1At the command prompt, type the path in whichNorton Internet Security is located and theexecutable's file n

Page 61

Protection > On. By default, the Insight Protectionoption is turned on.When the Insight Protection option is turned on,Norton Internet Security per

Page 62

perform this scan by running an Insight Networkscan on single file using the Custom Scan optionon the Scans window.1 Insight Network context-menu scan

Page 63

4In the Insight Protection row, do one of thefollowing:1 To turn off Insight Protection, move the On/Offswitch to the right to the Off position.1 To t

Page 64 - About LiveUpdate

Scan, it also performs a Computer Scan. NortonInternet Security uses the Computer Scan to performthe signature-based threat detection. It compares the

Page 65

This category includesWindows System files (.sys),dynamic link library files(.dll), and device driver files(.drv).System filesThis category includesAc

Page 66

Scans all the Files of Interestthat are available on yourcomputer.When you perform a FullSystem Scan, Norton InternetSecurity searches for Files ofInt

Page 67 - About Smart Definitions

Symantec has a fewindications that the file is nottrusted.This file is suspicious and canharm your computer.PoorSymantec has a highindication that the

Page 68

Where to find your product keyThe product key is a unique key that helps you to installand activate the Symantec product on your computer.The product

Page 69 - About running LiveUpdate

4If there is a file with Poor or Bad trust level, underthe Trust Level column, click the red cross (x) icon.5In the Quarantine File window, click Quar

Page 70 - Checking for updates manually

check the trust level of a specific file, you can scan theparticular file.To run a Reputation custom scan1In the Norton Internet Security main window,

Page 71

When you run a Reputation Quick Scan, NortonInternet Security considers the Files of Interest whichinclude running processes and loaded programs. When

Page 72

1 The Norton Network graph displays the detailsabout the known good files and bad files.You can view the number of trusted files that areon your compu

Page 73

Trust LevelProtecting your files and dataAbout the Norton Internet Security scans164

Page 74

Indicates the trust level thatis assigned to a file.Symantec analyzes specificinformation about a file suchas the digital signature andthe hash value

Page 75 - About Pulse Updates

suspicious file.Indicates the communityusage level of the file.The search results aregrouped in to the followingcategories:1 Very Few Users: Showsthe

Page 76 - About Network Proxy Settings

Indicates the system resourceusage level of the file.The usage levels are asfollows:1 Low: Indicates that thefile consumes minimumsystem resources.1 M

Page 77 - 1 Use automatic configuration

Indicates the stability ratingof the file.The stability rating dependson how frequently theprogram crashes. Thedifferent stability ratings areas follo

Page 78

can also let other Facebook users know the securitystatus of any Web site.However, Norton Safe Web requires your permissionto scan the URLs that are a

Page 79

The product key is printed onthe card along withinstructions on how to use it.Be sure to save your productkey by creating or signing into your Norton

Page 80

The following are the safety states that Norton SafeWeb provides after it scans the links on your FacebookWall:Indicates that the site is safe tovisit

Page 81 - Monitoring your

To enable your Facebook Wall1In the Norton Internet Security main window, clickScan Now.2In the window that appears, click Scan FacebookWall.3In the S

Page 82

The following list provides details on the settings thatyou can make and the predefined parameters:You can set the duration afterwhich Norton Internet

Page 83

Norton Internet Security discontinues any Idle TimeScans that it started during idle time if you begin touse your computer again. However, it resumes

Page 84

3In the Idle Time Scans row, in the drop-down list,select the option that you want to set. Your optionsare:1 Weekly1 Monthly1 Quarterly4Click Apply.Sp

Page 85

wSymantec recommends that your computer remainsconnected to Internet to get the real-time protectionagainst threats and proactively detects unknownsec

Page 86

3In the SONAR Protection row, do one of thefollowing:1 To turn off SONAR Protection, move the On/Offswitch to the right to the Off position.1 To turn

Page 87 - About performance alerting

wExclude a program from Norton Internet Security scansonly if you are confident that the program is safe. Forexample, if another program relies on a s

Page 88

About Signature ExclusionsNorton Internet Security lets you select specific knownsecurity risks and exclude them from Norton InternetSecurity scans. E

Page 89

To add a signature to the Signature Exclusions1In the Norton Internet Security main window, clickSettings.2In the Settings window, in the left pane, c

Page 90

About Norton Internet Security mainwindowThe Norton Internet Security main window acts as asecurity management interface. You can access themain featu

Page 91 - Battery Power option

wWhen you exclude a reputation-based threat, NortonInternet Security does not add the signature of theexcluded threat to the Signature Exclusions wind

Page 92

3In the Clear file IDs excluded during scans row,click Clear All.4In the Warning window, click Yes.5In the Settings window, click Apply, and then clic

Page 93

Turning on or turning off Microsoft Office Automatic ScanNorton Internet Security maintains a higher level ofsecurity by automatically scanning all Of

Page 94

Norton Internet Security provides the following optionsunder Silent Mode Settings:Norton Internet Security allowsyou to manually turn on for aspecifie

Page 95

You can view the summary of the Silent Mode sessionsunder the Recent History, Full History, and SilentMode categories in the drop-down list of the Sho

Page 96

Turning on or turning off Silent Mode manuallyYou can manually turn on Silent Mode for a specifiedduration before you perform any important task onyou

Page 97 - About Startup Manager

6Click OK.To turn on Silent Mode from the notification area1In the notification area on the Windows taskbar,right-click the Norton Internet Security i

Page 98

notifications and suspends background activities toprovide uninterrupted sessions for Silent Mode optionssuch as Full Screen Detection or Media Center

Page 99

background activities and lets the task use themaximum resources for better performance.You can choose to set Norton Internet Security toautomatically

Page 100 - Managing startup items

The following table explains about the various options:When you use a Media Centerapplication to burn a CD or aDVD, Norton Internet Securityautomatica

Page 101 - About optimization

Lets you create or access yourNorton Account.Norton Account lets you manageall of your Norton products inone place.wThis feature may not beavailable i

Page 102 - Optimizing your boot volume

When you use a Media Centerapplication to record a TVprogram, Norton InternetSecurity automatically enablesQuiet Mode, if the Media CenterTV Recording

Page 103 - About the Idle Time Optimizer

Norton Internet Securityautomatically turns on QuietMode when it detects a TVprogram recording session or adisk-burning session. Inaddition, you can m

Page 104 - About the Norton Tasks

only after the TV program recording session ordisk-burning session is complete. You cannot turn offQuiet Mode during the sessions by using the options

Page 105

About User-Specified ProgramsNorton Internet Security automatically turns on QuietMode when it detects a TV program recording sessionor a disk-burning

Page 106 - About System Insight

Quiet Mode. Norton Internet Security turns on QuietMode the next time when you execute the program.You can only add the programs that have .exe fileex

Page 107

4Under Quiet Mode on Detection of, in theUser-Specified Programs row, click Configure.5In the Quiet Mode Programs window, select theprogram that you w

Page 108

1 OffTurns off boot time protection.If you turn off the Enable Boot Time Protectionoption, the protection level of your computerreduces.Configuring bo

Page 109

click Settings > Computer > Real Time Protection >Early Launch Anti-Malware Protection > On.By default this option is turned off.wThis opt

Page 110 - About Power Source

Protecting your files and dataAbout the Norton Internet Security scans198

Page 111 - Configuring the Power Source

This chapter includes the following topics:1 What to do if a security risk is foundWhat to do if a security risk is foundYour product provides many so

Page 112 - About Norton Insight

Norton™ Internet Security ProductManualThe software described in this book is furnished under a licenseagreement and may be used only in accordance wi

Page 113

Lets you access different typesof scans to protect yourcomputer and your sensitivedata.By using the Scan Now option,you can run the following typesof

Page 114 - Files of Interest:

risk. You can access the Symantec Security ResponseWeb site and refer the manual removal instructions.In some cases, Norton Internet Security might no

Page 115

You can view information about detected viruses andother security threats in Security History.Security History also includes information aboutspyware,

Page 116

3In the Show drop-down list, select the category forwhich you want to review Auto-Protect alerts.Your options are:Review Auto-Protectnotifications tha

Page 117

4In the right pane, click the Options link.The option name appears as Restore & Options forfew items.If one or more security risks such as spyware

Page 118

5In the Threat Detected window, select theappropriate action on the risk.The following are some of the options that areavailable in the Threat Detecte

Page 119

Removes the selectedsecurity risk from thecomputer andquarantines it.This option is availablefor the security risks thatrequire your attention formanu

Page 120

Sends the security risk toSymantec.In some cases, NortonInternet Security mightnot identify an item as asecurity threat, but youmight suspect that the

Page 121 - 1 High Trust

To respond to Worm Blocking alerts4In the alert window, select the action that you wantto take. Your options are:Permanently stops theworm by putting

Page 122

2After the worm has been quarantined, perform thefollowing tasks:1 Run LiveUpdate to ensure that you have thelatest definition updates.See “About Prog

Page 123 - Viewing the Monthly Report

checks for the infections that have processes runningin memory. It also checks for the infections that thestart-up files and folders refer.If that doe

Page 124

Lets you access the NortonInternet Security advancedwindow.By using the Norton InternetSecurity advanced window, youcan do the following:1 Run differe

Page 125 - Protecting your

To resolve the suspected security risk4Save all open files, and then click Go.If you do not respond to this dialog box, it closesautomatically without

Page 126

This chapter includes the following topics:1 About the Smart Firewall1 About Download Insight1 About Intrusion Prevention1 About Vulnerability Protect

Page 127

Internet. It also protects your computer from suchcommon security problems as the following:Warns you of connectionattempts from othercomputers and of

Page 128

remains protected, you can turn on the Smart Firewallmanually before the time that you specify concludes.When the Smart Firewall is turned off, your c

Page 129

To turn on Smart Firewall from the notification area4In the notification area on the taskbar, right-clickthe Norton Internet Security icon, and then c

Page 130

For example, you have a Program rule for the SymantecpcAnywhere application that blocks the use of theapplication with any other computer. You add ano

Page 131

Permit the use of theNetBIOS name serviceand the NetBIOSdatagram service that theMicrosoft Network usesin file and printer sharing.NetBIOS is an acron

Page 132

You can add a new General rule in this window. Youcan also do the following activities:You can change the settings ofa General rule that does notfunct

Page 133

The Program Control window displays a list ofprograms. In this window, you can do the following:1 Add a program.1 Rename a program.1 Modify the rules

Page 134 - About Computer Scan

Lets the firewall notifyyou when a programattempts to access theInternet. You can thenallow or block Internetaccess for the program.In some instances,

Page 135

The options on the right side of the Norton InternetSecurity main window help you do the following:Online FamilyGetting startedAbout Norton Internet S

Page 136 - Running a Full System Scan

for the first time, an alert prompts you to configureaccess settings.When you turn off Automatic Program Control, awarning appears. Symantec recommend

Page 137 - Running a Quick Scan

Adding a program to Program ControlYou can add a program to Program Control to controltheir ability to access the Internet. When you add theprogram, y

Page 138

9In the Options drop-down list, select the access levelthat you want this program to have.Your options are:Allow all access attemptsby this program.Al

Page 139

do not want them in the current version, you mustremove them again.To remove a program from Program Control1In the Norton Internet Security main windo

Page 140 - 1 Total items scanned

6In the drop-down list next to the program that youwant to change, select the access level that you wantthis program to have. Your options are:Allow a

Page 141

7Follow the instructions in the Add Rule wizard.8In the General Rules window, click OK.9In the Advanced Settings window, click OK.To add a Program rul

Page 142 - Selecting the scan items

2In the first panel of the AddRule Wizard, select theaction that you want for this rule. Your options are:Allow communication ofthis type.AllowFor exa

Page 143 - Configuring the scan options

Update the Firewall –Activities category in theevent log each time thatcommunication of thistype takes place. Thisoption lets you monitorhow often thi

Page 144 - Running a custom scan

4Select the type of connection for the rule. Youroptions are:The rule applies tooutbound connectionsfrom your computer toanother computer.Connections

Page 145 - Deleting a custom scan

5Click Next, and then select the computers that applyto the rule. Your options are:The rule applies to allcomputers.Any computerThis rule applies only

Page 146 - About scheduling scans

Lets you monitor your child’sactivities on the Internet.wNorton Online Familymay not be available in someversions of Norton InternetSecurity.When you

Page 147

The rule applies only tothe computers, sites, ordomains that you specify.You can specify thenames and addresses ofcomputers that apply tothe rule. The

Page 148 - Scheduling a Full System Scan

6Click Next, and then select the protocols for therule. Your options are:The rule applies to TCP(Transmission ControlTCPProtocol)communications.The ru

Page 149 - Editing a scheduled scan

The rule applies to allsupported protocols.When you select thisoption, you cannotspecify the types ofcommunications or portsthat apply to the rule.All

Page 150

8Click Next.9Check Create a Security History log entry if youwant Norton Internet Security to create an entry inthe firewall event log.Norton Internet

Page 151

5In the Advanced Settings window, in the GeneralRules row, click Configure.6In the General Rules window, select the rule thatyou want to change.7Click

Page 152 - About Insight Network scan

Changing the order of firewall rulesEach list of firewall rules is processed from the topdown. You can adjust how the firewall rules areprocessed by c

Page 153 - 1 Insight Network Quick Scan

5In the Program Control window, in the Programcolumn, select the program that contains the rulethat you want to move.6Click Modify.7In the Rules windo

Page 154

Removing a firewall ruleYou can remove some of the firewall rules if necessary.However, you cannot remove some of the defaultGeneral rules that appear

Page 155 - About Reputation Scan

6Click Modify.To remove all the program rules that are associatedwith the program, click Remove.7In the Rules window, select the rule that you wantto

Page 156 - Executable files

Lets you configure how NortonInternet Security must control thenetwork communications to and fromyour computer.For instance, you may have to beaway fr

Page 157

Lets you access NortonManagement.Norton Management lets youmanage your Norton productson all of your devices fromone location. Click theManage icon at

Page 158

list or remove a program from the list. Your optionsare:Displays the trust level of a program.Symantec collects the informationfrom the Norton Communi

Page 159

Displays the level of access that theprogram has.You can change the access level byselecting a different entry from thedrop-down list.Your options are

Page 160

1 View the details of the devices that are present inthe network.1 Monitor the connection status of the devices thatare present in the network.1 View

Page 161

Firewall Reset243Protecting Internet activitiesAbout the Smart Firewall

Page 162

Returns the SmartFirewall to its defaultstate. You can click Resetto ensure that allrecommended firewallrules and settings areconfigured. NortonIntern

Page 163

address range1 Your computer mustbe connected to asecure wireless orwired connectionEnsures that blocked andinactive ports do notrespond to connection

Page 164 - Trust Level

Automatic File/Printer SharingControlProtecting Internet activitiesAbout the Smart Firewall246

Page 165 - 1 Bad: Symantec has a high

Allows the computers onthe network to shareresources such as files,folders, and printers (thatare locally attached).Some of the Windows 7and Windows 8

Page 166

new network to whichyour computer isconnected as Shared orProtected. The promptappears only when thesecurity criteria forsharing matches.Protecting In

Page 167 - 1 Unknown: Indicates that

Automatic Program Control249Protecting Internet activitiesAbout the Smart Firewall

Page 168

Lets you download theNorton Mobile Security forAndroid.You can use Norton MobileSecurity on all your devicesthat use Android operatingsystem. When you

Page 169

Automatically configuresInternet access settingsfor the Web-enabledprograms that are run forthe first time.You can configure theAutomatic ProgramContr

Page 170

decisions when aprogram receivesinbound or outboundtraffic. When youselect this option,Norton InternetSecurity does notprompt you with anyfirewall ale

Page 171 - About Idle Time Scans

When you turn offAutomatic ProgramControl, you can turn onAdvanced EventsMonitoring. You can usethe Advanced EventsMonitoring options, toconfigure the

Page 172

1 Program ComponentThis option protectsyou against themalicious programsthat launchInternet-enabledprograms.1 Program LaunchThis option protectsyou ag

Page 173

Internet withoutfirewall alerts.1 Direct NetworkAccessThis option protectsyou against the Trojanhorses and othermalicious programsthat bypass networkt

Page 174 - About SONAR Protection

1 COM ControlThis option protectsyou against themalicious programsthat manipulate anapplication's behaviorby instantiatingcontrolled COMobjects.A

Page 175

1 The traffic has violated the traffic policy of thefirewall1 The traffic comes from the restricted zone ofnetworks or computers1 The traffic matches

Page 176 - About Real Time Exclusions

make definite decisions on whether to allow or blockcommunication attempts of networking applications.In addition, you can identify any suspicious pro

Page 177

reputation-based security technology providesreputation ratings for files on the Internet based onthe information that is collected from Nortoncustome

Page 178 - About Signature Exclusions

In the left pane of the firewall alerts, you can find thefollowing reputation information:Shows the stability rating ofthe file on your computer.The s

Page 179

Lets you set up the NortonOnline Backup account oraccess your online backupstatus.wNorton Online Backupmay not be available in someversions of Norton

Page 180

Shows the user prevalence ofthe file. This data is based onthe information that millionsof Norton Community Watchcustomers shared andSymantec's r

Page 181

Shows the trust level of thefile.Symantec assigns thefollowing trust levels:1 Norton Trusted -Indicates the file that isNorton Trusted.1 Good - Symant

Page 182 - About Silent Mode

About Download InsightDownload Insight provides information about thereputation of any executable file that you downloadfrom the supported portals. Th

Page 183

1 UseNext (Download Manager)1 FDM (Download Manager)1 Adobe Acrobat Reader (PDF viewer)Based on the type of portal you use to download yourfile, Norto

Page 184

Includes the files that areneither safe nor unsafe.Unknown files have unprovenreputation. These files mightharm your computer. In the caseof an unknow

Page 185

Lets you cancel the installationof the executable program.Cancel runLets you remove the file fromyour computer.Remove this file from mysystemSecurity

Page 186

You can use the Download Intelligence option to turnoff or turn on Download Insight.To turn off Download Intelligence1In the Norton Internet Security

Page 187 - About Quiet Mode

1 Notifies you only when you download a file that isinfected with a local virus identification. If the filethat you download is infected with a cloud

Page 188 - 1 User-Specified Programs

Configuring the Show Report on Launch of FilesoptionThe Show Report on Launch of Files option lets youspecify when and for what type of file you want

Page 189

When you set the Show Reporton Launch of Files option toUnproven Files Only, DownloadInsight prompts you to select asuitable action for unknown fileso

Page 190 - 1 J. River MEDIA CENTER

Lets you check the safety ofa Web site.You can also perform a safesearch.wThis option may not beavailable with some versionsof Norton Internet Securit

Page 191

When you set the Show Reporton Launch of Files option toNever, Download Insight doesnot prompt you to select asuitable action for any type offile that

Page 192

4Under Download Intelligence, in the Show Reporton Launch of Files row, do one of the following:1 If you want Download Insight to prompt you fora suit

Page 193 - About User-Specified Programs

To turn on or turn off Alert on Poor Stability1In the Norton Internet Security main window, clickSettings.2In the Settings window, click the Web tab.3

Page 194

If you are sure that a device on your network is safe,you use the Edit Device Trust Level window to changethe trust level of the device to Full Trust.

Page 195 - About boot time protection

6Click OK.To turn off or turn on an individual Intrusion Preventionnotification1In the Norton Internet Security main window, clickSettings.2In the Set

Page 196 - 1 Normal

5In the Intrusion Signatures window, uncheck theattack signatures that you want to exclude.6Click OK.To include the attack signatures that were previo

Page 197

To turn off or turn on AutoBlock1In the Norton Internet Security main window, clickSettings.2In the Settings window, click the Network tab.3In the lef

Page 198

5In the Intrusion AutoBlock window, underComputers currently blocked by AutoBlock, doone of the following:1 To unblock one computer, select its IP add

Page 199 - Responding to

Scanning every request from all the devices that accessyour computer increases the scan time which slowsdown the network speed of your computer.If you

Page 200

When you exclude a Full Trust device from IntrusionPrevention scan, Norton Internet Security does notscan any information that is received from this d

Page 201

Lets you access NortonStudio.Norton Studio is an app thatis available on your Windows8 Apps Store. Norton Studiolets you manage your Nortonproducts an

Page 202

About Vulnerability ProtectionVulnerability Protection is a component of IntrusionPrevention System. Vulnerability Protection providesinformation abou

Page 203

Viewing the list of vulnerable programsThe Vulnerability Protection window lets you viewthe extensive list of programs with the knownvulnerabilities t

Page 204

The Program Vulnerability Details list does notinclude any signature that you disable in the IntrusionSignatures window. By default, all the signature

Page 205

card numbers. These programs can then send yourcompromised data to other people.Adware displays advertisements on your computer andcollects informatio

Page 206

About Norton AntiSpamNorton AntiSpam lets you categorize the emailmessages that you receive in your email programs intospam email and legitimate email

Page 207

Norton AntiSpam also automatically imports the listsof addresses from supported email programs duringthe initial integration. It helps you keep your l

Page 208 - 1 Scan your computer

1 The option to filter email messages through WebQuery to maintain high spam detection efficiencyConfiguring Client IntegrationThe Client Integration

Page 209

you want to manually import addresses, use the Importoption in the Allowed List window.When you open your email client, the welcome screenappears. If

Page 210

6Select one or more address books to be importedautomatically into your Allowed List.7Click OK to save the changes and close the ClientIntegration win

Page 211 - Protecting Internet

7Click OK to close the AddEmail Address dialog box.8Click OK to save and close the Address BookExclusions window.To edit or delete entries in the Addr

Page 212

The panes are:Provides you the essentialcomputer protection options.It also contains links to scanyour computer, view thehistory of protection events,

Page 213

To import an address book1In the Norton Internet Security main window, clickSettings.2In the Settings window, click the Network tab.3In the left pane,

Page 214 - About firewall rules

To edit or delete entries in the Allowed List1In the Norton Internet Security main window, clickSettings.2In the Settings window, click the Network ta

Page 215 - About General rules

To import addresses to the Blocked List1In the Norton Internet Security main window, clickSettings.2In the Settings window, click the Network tab.3In

Page 216

To edit or delete entries in the Blocked List1In the Norton Internet Security main window, clickSettings.2In the Settings window, click the Network ta

Page 217 - About Program rules

You can use the following options:Marks the selected email as spam and movesthe email message into the Junk folder or theNorton AntiSpam folder.When y

Page 218

Removes all email that has been placed in theJunk folder or the Norton AntiSpam folder.EmptySpamFolderDisplays the Message Protection section of theSe

Page 219

4Under AntiSpam, in the Feedback row, select anyone from the following three options:Automatically sends themisclassified email message toSymantec whe

Page 220

approach to filter spam email messages from legitimateemail messages.The email messages that you receive in your emailprogram undergo scanning through

Page 221

Norton AntiSpam then sends the email message to youremail program. Based on predefined email rules, theemail program then moves the email message to t

Page 222

Norton Internet Security lets you manually configureyour POP3 and SMTP email ports for email protection.Typically, your Internet service provider (ISP

Page 223

Norton License AgreementNorton™ Internet SecurityIMPORTANTPLEASE READ THE TERMSAND CONDITIONS OF THIS LICENSEAGREEMENT (“LICENSE AGREEMENT”)CAREFULLY

Page 224 - 1 Program rules

You can view the different protection features on theright side of the window. You can move your mousepointer over each feature to view a brief summar

Page 225

3In the left pane, click Message Protection.4In the Protected Ports Settings row, clickConfigure.5In the Protected Ports window, click Add.6In the Add

Page 226

About the Network Security MapA home network typically consists of the computersand other devices that share your Internet connection.The Network Secu

Page 227 - About the Smart Firewall

1 Wireless Security1 Remote Monitoring1 Network Map1 Trust ControlsYou can click each of the features and read thesummary to learn more about using Ne

Page 228

Viewing devices on the Network Security MapThe Network SecurityMap window provides a pictorialrepresentation of the devices on the network to whichyou

Page 229

3If the Product Configuration panel appears, clickContinue.The Product Configuration panel appears whenyou click Network Security Map for the first ti

Page 230

To view the details of a device on the Network SecurityMap305Protecting Internet activitiesAbout the Network Security Map

Page 231

4In the NetworkSecurity Map window, click a deviceicon.You can use the scroll arrows to view the devicesthat are listed in the network map.The device

Page 232

Shows the category to which thedevice belongsThe device category iconprovides details on theconnection status and securitystatus. Norton Internet Secu

Page 233

Shows the access level that isgranted to a remote device toconnect to your computerThe initial trust level is set basedon the configuration of yourcom

Page 234

Shows if the device is excludedfrom Intrusion Prevention scan.You can exclude a Full Trustdevice from Intrusion Preventionscan. When you exclude atrus

Page 235

To respond to System Status indicators from the mainwindow1In the bottom section of the Norton InternetSecurity main window, click Fix Now.2Follow the

Page 236

3On the left side of the Network Security Mapwindow, under Remote Monitoring, click Setup.4In the Remote Monitoring Setup window, type aPasskey.The Pa

Page 237 - Removing a firewall rule

2Under Network Protection, click Network SecurityMap.3On the left side of the Network Security Mapwindow, under Remote Monitoring, click Disable.4In t

Page 238 - About Smart Firewall settings

The default trust level of the devices that you add tothe Network Security Map is Protected. However, youcan change the trust level of the devices.wIf

Page 239

Finding a computer's IP addressYou can find a computer's IP address in various ways.On Windows 2000/XP, Windows Vista, Windows 7, andWindows

Page 240

To find the IP address by using ipconfig on Windows 81On the Apps screen, under Windows System, clickCommand Prompt.2At the command prompt, type ipcon

Page 241

6In the Category drop-down list, click one of thefollowing device categories:1 GENERIC DEVICE1 DESKTOP PC1 LAPTOP1 SERVER PC1 NETWORK PRINTER1 ROUTER/

Page 242

Editing network detailsYou can view the details and change the name of yournetwork in the Edit Network Details window.wYou cannot edit the Trust Contr

Page 243

In addition, the trust level of a device is Shared in anyof the following cases:1 When the computer on the network has one or morefolders or printers

Page 244

5To select a trust level for a network, in the EditNetwork Trust Level window, click one of thefollowing:Adds the network to the TrustedlistFULL TRUST

Page 245

Adds the network to theRestricted listThe devices that are onRestricted network cannotcommunicate with yourcomputer. However, you can stilluse the net

Page 246

1 Safe SurfingTo monitor the protection status of a feature1In the Norton Internet Security main window, clickAdvanced.2In the window that appears, mo

Page 247

5To select a trust level for a device, in the EditDeviceTrust Level window, click one of the following:Adds a device to the Full TrustlistFull Trust d

Page 248

Scanning every request from all the devices that accessyour computer increases the scan time which slowsdown the network speed of your computer.If you

Page 249

4In the Network Security Map window, do one ofthe following:1 To edit the trust level of a device that is on yournetwork, in the network map, click th

Page 250

When you remove an individual device, the onlinedevices appear again the next time you open theNetwork Security Map. However, Norton InternetSecurity

Page 251

For more information on how to secure your wirelessnetwork, on the left side of the Network Security Mapwindow, click the Why is it not secure link. F

Page 252

To view the device details1In the Norton Internet Security main window, clickAdvanced.2Under Network Protection, click Network SecurityMap.3In the Net

Page 253

To modify the communication port for Network SecurityMap1In the Norton Internet Security main window, clickSettings.2In the Settings window, click the

Page 254

You can set up one of the following policies for each ofthe network connection that Norton Internet Securityuses to connect to the Internet:1 AutoAllo

Page 255 - 1 COM Control

the Internet usage of Norton Internet Security. NortonInternet Security connects to the Internet based on thepolicy that you set up in the Network Cos

Page 256

network bandwidth that Norton Internet Security canuse.To define the Internet usage of Norton Internet Security1In the Norton Internet Security main w

Page 257

1 Any time after activationIf you skip the Norton Account window duringactivation, you can create a Norton Account anytime after activation. You can c

Page 258

7Select one of the following:1 AutoAllows Norton Internet Security to receive allproduct and virus definition updates based onthe Windows 8 cost aware

Page 259

This chapter includes the following topics:1 About securing your sensitive dataAbout securing your sensitive dataThe Internet provides the fastest and

Page 260

window. The Norton Safe Web feature provides you asafe search environment in the Web by displaying thesite rating icons next to every search result.Wh

Page 261

view more details about the safety status of the Websites you visit.In addition, the Norton Site Safety pop-up windowincludes information about Symant

Page 262 - About Download Insight

Reporting an incorrect evaluation of a Web siteOn rare occasions, Antiphishing may report incorrectevaluation of a Web site. For example, you might vi

Page 263 - 1 FDM (Download Manager)

navigation to the Web sites that are confirmed to befraudulent.The Norton Site Safety pop-up window helps youunderstand if the Web site that you visit

Page 264

wNorton Safe Web supports Internet Explorer, Firefox,or Chrome Web browsers.You can view the site safety status of any Web siteusing the FullReport op

Page 265

Norton Safe Web provides the following Web site safetystates when you browse through the Internet:You can see Norton Secured iconnext to the search re

Page 266

You can see a red cross (x) iconnext to the search results.When you visit a Web site withthis status, you can see a similarstatus icon on the NortonTo

Page 267

Norton Safe Web does not havesufficient information about thisWeb site to provide a shoppingsafety rating.UntestedNorton Safe Web has analyzedthis Web

Page 268

Saves your account informationand your billing details.The Profile options are:1 Account InformationYou can update your NortonAccount information andy

Page 269

In addition, Norton Safe Web protects your computerwhile you use Facebook. It scans each URL that isavailable on your Facebook Wall and displays theNo

Page 270

In addition, Norton Safe Search provides the followingfeatures:When you search the Internetusing Norton Safe Search, itanalyzes the security levels of

Page 271

You can use Norton Safe Search even when you turnoff the Identity Safe features.wNorton Safe Search is supported only in the InternetExplorer, Firefox

Page 272 - About Intrusion Prevention

4In the Norton Safe Web row, do one of the following:1 To turn off Norton Safe Web, in the Norton SafeWeb row, move the On/Off switch to the rightto t

Page 273

5In the Scam Insight row, do one of the following:1 To turn off Scam Insight, in the Scam Insightrow, move the On/Off switch to the right to theOff po

Page 274

Antiphishing also helps to protect you frommalicious Web sites when you perform onlinetransactions.1 Manages your card information when you havemultip

Page 275

the product expires. This way, you can still view ormanage your login details even after Norton InternetSecurity expires. However, it is not safe to b

Page 276

1 The computer must be connected to the Internet.The Identity Safe data is stored online using yourNorton Account. You can create only one online vaul

Page 277

6Click OK.About Identity Safe vaultsYou can create one local vault for each Windows useraccount on your computer. The data that you save andthe Identi

Page 278

In addition to the features such as saving logins, cards,and notes, you can do the following using your IdentitySafe vault:1 Import your Identity Safe

Page 279

Norton Online Backupprovides a secure andeasy-to-use online backupsolution that safeguards yourimportant data againstsystem crash, accidentaldeleting,

Page 280

You can create Identity Safe vaults from the IdentitySafe section of the Settings window. The Identity Safesection is available in the Web tab.Creatin

Page 281

7In the Re-type Vault Password box, type thepassword again to confirm.8In the Password Hint box, type a hint for thepassword.9Check Store information

Page 282

5At the bottom of the Set Up Identity Safe window,click Log In to Norton Account.6In the Sign In to Norton Account window, type yourE-mail Address and

Page 283 - Checking Antispyware settings

5In the Sync Identity Safe Data Online window, inthe Enter the Password box, type the password foryour local vault.6Click Log In to Norton Account.7In

Page 284 - About Norton AntiSpam

5In the Sync Identity Safe Data Online window, inthe Enter the Password box, type the password foryour local vault.6Click Log In to Norton Account opt

Page 285

5In the Warning window, click Yes.6In the Settings window, click Apply.7Click OK.Merging portable profile to local vault or online vaultIf you have Id

Page 286 - 1 Windows Mail

Importing loginsIdentity Safe lets you import the logins that you havesaved in Internet Explorer. After you set up IdentitySafe vaults, the Identity S

Page 287

1 You experience a computer failure.1 You forget your Identity Safe password.wIf you forget your Identity Safe password, you cannotrestore it. You can

Page 288

1 From the Norton ToolbarWith Norton Internet Security, you can access andconfigure all the Identity Safe features even after theproduct expires. The

Page 289

Logging in to and logging out of Identity SafeYou can log in to or log out of Identity Safe from thefollowing areas of Norton Internet Security:1 The

Page 290 - 1 Domain

Creating a Norton AccountYour Norton Account stores the product key and thebilling information of your product. You can alsoregister your product with

Page 291

4Click Open Vault.To log out of Identity Safe from the Norton Toolbar1Start your Web browser.2On the Norton Toolbar, click Vault Open, and thenclick C

Page 292

4Under Identity Safe, identify the feature that youwant to use, and click Configure. Your options are:Lets you set up Identity Safevault.Identity Safe

Page 293

Lets you configure the way youwant Identity Safe to collect,store, and display the logininformation for the Web pagesyou visit.You can configure Ident

Page 294

Lets you manage your personalinformation such as name, dateof birth, email address, andcredit card information in oneplace.You can use the information

Page 295 - Setting the Feedback option

Lets you store and managesensitive information.You can save social securitynumber, driver's license number,insurance policy number, andpassport n

Page 296 - About Web Query

Lets you move your Identity Safedata that you stored in your localvault to online vault.wWhen you sync yourIdentity Safe data from localvault to onlin

Page 297

1 Lets you quickly launch the Web site login page1 Fills in your login automatically when you revisitWeb pages1 Lets you manually add logins1 Lets you

Page 298

appears on the top left corner of the Login Assistantwindow.Identity Safe automatically detects login fields whichare not auto filled or filled incorr

Page 299

2Type your login details, and then click the optionor link that logs you in.Norton Internet Security automatically saves yourlogin details when you en

Page 300

1 Lets you quickly launch the Web site login page.1 Fills in your login automatically when you revisitWeb pages.1 Lets you manually add logins.1 Lets

Page 301

To create a Norton Account from the Norton AccountWeb page1In the Norton Internet Security main window, clickAccount.2In the Norton Account Web page t

Page 302 - 1 Trust Controls

7Click OK.8In the Username dialog box, in the Enter newusername box, type the user name of the login, andthen, click OK.9In the Information dialog box

Page 303

10In the confirmation dialog box, click Yes to save thechanges.To delete a login or a folder1In the Norton Internet Security main window, clickSetting

Page 304

When you save a login, you can do the following:1 Quickly launch the Web site login page using theURL1 Change the URL of the login manuallyEnsure that

Page 305

7In the Update URL window, in the Enter the newURL here box, type the new URL.Ensure that the URL you modify is valid and isprefixed with HTTP or HTTP

Page 306 - 1 The device does not have a

5In the Edit Logins window, under Logins, select theWeb site name for which you want to change thepassword.6Under Details, next to the Password box, c

Page 307

3Type the new password, and then click the buttonor link that logs you in.4In the Save new password for login? menu bar, clickSave.About Edit CardsThe

Page 308 - 1 OFFLINE

Identity Safe automatically detects login fields whichare not auto filled or filled incorrect by Identity safein the Web pages and displays the Need A

Page 309

3In the left pane, click Identity Safe.4Under Identity Safe, in the Edit Cards row, clickConfigure.5In the Edit Identity Cards window, click Add Card.

Page 310 - Turning off Remote Monitoring

Editing, deleting, or duplicating cardsAll the cards that you have saved in Identity Safe arelisted in the Edit Identity Cards window. You canselect,

Page 311 - 1 The name or description

7Modify the required details that you want to change.8Click Save.9Click Close.To delete a card1In the Norton Internet Security main window, clickSetti

Page 312

wSymantec products that are older than the 2006product year do not appear in your Norton Account.To access Norton Account1In the Norton Internet Secur

Page 313

card to fill the Web site with the details that are savedin the card.You can also copy and edit the required fields from theselected card in the Login

Page 314 - Editing device details

5In the Edit Notes window, under Details, in the Titlebox, type a title for the note you want to save.If a note already exists, click CreateNewNotes,

Page 315

8In the Edit Notes window, click OK.About exporting and importing Identity Safe dataYou can export your Identity Safe data for securitypurposes, data

Page 316 - Editing network details

2In the Settings window, click the Web tab.3In the left pane, click Identity Safe.4Under Identity Safe, in the Export Data row, clickConfigure.5In the

Page 317 - 1 Your network

wWhen importing, the file size must not be more than15 MB for .CSV files and 35 MB for .NPM files.To import your data1In the Norton Internet Security

Page 318

About Browsing OptionsBrowsingOptions lets you configure the way you wantIdentity Safe to collect, store, and display the logininformation for the Web

Page 319

Lets you save the logincredentials for the Web sitesthat you visit.You can use the followingoptions:1 Yes, Save Automatically1 No, Never Save anylogin

Page 320

Password Security387Securing your sensitive dataAbout securing your sensitive data

Page 321

Specify the Identity Safepassword security level.Identity Safe provides fourlevels of security to protectyour Identity Safe password.Choose one of the

Page 322

period. You can specifythe idle time-out periodas 15, 30, or 45 minutes.Use this option if otherpeople have access toyour computer.1 Ask for my passwo

Page 323

1 Activate your product using another product key.1 Upgrade your Norton products to the latestavailable version.wThe features listed above vary for di

Page 324 - Viewing the device details

Changing the Identity Safe passwordYou should change your Identity Safe Passwordregularly to prevent unauthorized access to yourpersonal information i

Page 325 - Security Map

You have the following options in the NortonToolbar:Lets you access the Web Settingsand other settings.The following options areavailable in the Norto

Page 326 - About Network Cost Awareness

Lets you access the Identity Safedata stored in your online vault.You can add, edit or delete yourLogins, Cards, and Notes underthis section.You can u

Page 327 - 1 No Traffic

Lets you view the logins andcards that you have saved inIdentity Safe.Some Web sites have forms tofill or require login information.You can use the Va

Page 328

or disable the Norton Toolbar, and uninstall theNorton Toolbar from your Chrome browser.If the Norton Toolbar is enabled, you can access thefollowing

Page 329

However, Norton Internet Security notifies you aboutsuspicious and fraudulent Web sites or if an error needsyour attention.To hide or show the Norton

Page 330

Accessing Identity Safe settings from the Norton ToolbarWhen you install Norton Internet Security, it adds theNorton Toolbar to the Internet Explorer,

Page 331 - Securing your

2On the NortonToolbar, in the Norton menu, selectone of the following:Lets you report to Symantecabout the current Antiphishingevaluation.Report SiteL

Page 332 - About Antiphishing

Lets you turn on the Norton SafeWeb feature which provides asafe online browsing experience.The following are the uniquefeatures of Norton Safe Web:1

Page 333

Accessing the Vault Open/Vault Closed menuThe Vault Open/Vault Closed menu on the NortonToolbar lets you view and manage the logins, Identitycards, an

Page 334

During the Service Period, Youmay:A. use one copy of the Software on a singleDevice. If a greater number of copies and/ornumber of Devices is specifie

Page 335 - About Norton Safe Web

4Type your password that you use for NortonAccount.5Click Go.6Click Manage Devices.To access Norton Management from the Windowsnotification area1Go to

Page 336

2On the Norton Toolbar, in the Vault Open/VaultClosed menu, select one of the following:Lets you merge the IdentitySafe data from your portableMerge P

Page 337

Settings401Securing your sensitive dataAbout securing your sensitive data

Page 338

Lets you view the variousoptions that are available inIdentity Safe.The options are:1 Edit LoginsLets you open the EditLogins window.1 Edit Identity C

Page 339

autofill the logininformation in the currentWeb page.Lets you open the NortonFeedback Web site.You can submit feedback onyour experience with Identity

Page 340

Securing your sensitive dataAbout securing your sensitive data404

Page 341

This chapter includes the following topics:1 About Security HistoryAbout Security HistorySecurity History window lets you do the following:1 View the

Page 342 - 1 Click Search

window displays details of each item in the Detailspane.Based on their functionalities, Security History broadlyorganizes all categories into the foll

Page 343

You can view the security items based on the categoryof events that you select and the search string that youprovide. Norton Internet Security restric

Page 344 - About Identity Safe

You can access Security History from the followingareas:1 Norton Internet Security advanced window1 Various alert windows and notifications1 Notificat

Page 345

items that are related to the Quarantine feature appearunder Quarantine category in the Security Historywindow. In addition, the Security History wind

Page 346

3Click Sign In and log on to your account using yourNorton Account email address and password.4On the My Devices page, click Add Device.5In the confir

Page 347

3In Security History window, in the Show drop-downlist, select the category of items that you want toview. Your options are:The Recent History view in

Page 348 - About Identity Safe vaults

The security risks include thesuspicious programs that cancompromise the security ofyour computer.The Resolved Security Risksview in the Security Hist

Page 349 - 1 Reset your Identity Safe

The Security HistoryQuarantine provides a safelocation on your computerwhere you can isolate itemswhile you decide an action totake on them.The Quaran

Page 350

The firewall monitors thecommunications betweenyour computer and othercomputers on the Internet.The Firewall - Network andConnections category in theS

Page 351

The firewall monitors thecommunications betweenyour computer and othercomputers on the Internet.The firewall maintains rulesto control Internet access

Page 352

Download Insight processesany executable file that youdownload for analysis of itsreputation level. It theninforms you about theprocessing results bas

Page 353

The various features ofIdentity Safe help youmanage your identities andprovide additional securitywhile you perform onlinetransactions.The Identity vi

Page 354

The performance alertfeature lets you view,monitor, and analyze theimpact of the systemactivities on your computer.The Performance Alert viewin the Se

Page 355

In some cases, you mighthave submitted evaluation ofcertain Web pages toSymantec.The Sites Reported toSymantec view in theSecurity History windowdispl

Page 356 - Resetting Identity Safe

Email errors include anyfailure that occurs whenNorton Internet Security triesto send, download, or scan anemail message that you sendor receive.The E

Page 357 - Accessing Identity Safe

4If you are prompted to provide your email address,in the Email Address box, type the email addressthat you use to log on to your Norton Account, andt

Page 358 - 1 From the Norton Toolbar

Silent Mode suppresses alertsand notifications andtemporarily suspends mostof the background activities.The Silent Mode view in theSecurity History wi

Page 359

4Click a row to view details for that item.If you want to view additional information about anitem, click the More Details option in the Detailspane o

Page 360

The following table lists the categories that providethe advanced details about the Security History items:Displays the followinginformation about the

Page 361

Actions423Monitoring protection featuresAbout Security History

Page 362 - Securing your sensitive data

Displays the actions that areavailable for the selected itemThe options in the Actions viewvary depending on the optionsthat are available in the Show

Page 363 - 1 Change your login settings

This action removes therestricted status from theselected computer or fromall of the unclassifiedcomputers on the selectednetwork.This option is avail

Page 364

1 Stop Notifying MeThis action prevents NortonInternet Security fromnotifying you when it blocksthe selected attack signaturein the future.This option

Page 365 - About Edit logins

Security History provides a centralized location whereyou can access the FileInsight windows of the variousevents that are related to Security Risks,

Page 366

Lets you view the detailedinformation about theunresolved security risks in anorganized way.The Unresolved Security Riskscategory includes the infecte

Page 367 - Saving logins

Lets you view the reputationdetails of a file that youdownload.You can use these details todetermine the safety level of thefile and then decide the a

Page 368 - Editing logins

About the supported devicesTo install and use Norton Internet Security, your devicemust meet the following minimum systemrequirements:Hardware require

Page 369

You can select a tab to view more details about it. TheFile Insight window provides details about a file in thefollowing tabs:Displays the information

Page 370 - 1 Click Validate

Provides the details about thesuspicious actions performed bythe file on your computer. It alsoprovides information about theresource usage of a proce

Page 371

Let you return the securityrisk that is quarantined to theoriginal location on yourcomputer.Returns the selectedQuarantine item to itsoriginal locatio

Page 372

This category includes thesecurity risks or the infectedfiles that Norton InternetSecurity was not able to repair,remove, or quarantine.Unresolved Sec

Page 373

Takes you to the SymantecSecurity Response Web siteGet helpSends the security risk toSymantecSubmit to SymantecSearching in Security HistoryYou can se

Page 374

particular security risk. You can then use the Exportoption to save the list in the Security History log. Youcan later import the log file and analyze

Page 375

5In the Save As dialog box that appears, navigate toa location and specify the name for the file.The category name in the Show drop-down listappears a

Page 376 - Adding cards

The Security History Quarantine includes the followinggroups of items:Includes the items suchas spyware and adwarethat are generally low riskand that

Page 377

3In the Threat Detected window, select the actionthat you want to perform. Some of the options are:Returns the security risk thatis quarantined to the

Page 378

Adding an item to the QuarantineSecurity History Quarantine provides a safe locationon your computer in which you can isolate items whileyou decide on

Page 379

Service Pack 1 and232-bit and 64-bitversions1 MicrosoftWindows VistaHome Basic1 MicrosoftWindows VistaHome Premium1 MicrosoftWindows VistaUltimate1 Mi

Page 380 - About Edit Notes

to regain the functionality of a program that requiresthe risk program to run.For example, a shareware or freeware program thatyou download may use ad

Page 381

Manually submitting an item to SymantecWhen a virus or other risk is detected, it isautomatically submitted to Symantec SecurityResponse Web site for

Page 382

Monitoring protection featuresAbout Security History442

Page 383 - 1 Plain text

This chapter includes the following topics:1 Feature summary1 About turning off automatic features1 About customizing settings and optionsFeature summ

Page 384

downloads, and other files are scanned for viruses andother potential risks. In addition, the definition updatesthat Automatic LiveUpdate downloads wh

Page 385 - About Browsing Options

Detects viruses, spyware, andother security risks incompressed files during manualscans.See “What to do if a security riskis found” on page 199.Compre

Page 386 - About Password & Security

Scans for and detects viruses ininstant messenger attachments.Scans the instant messengerattachments for the supportedinstant messenger programsthat w

Page 387 - Password Security

About spyware and other security risk protectionfeaturesSpyware and other security risk protection featuresprovide protection against the latest secur

Page 388

If you are unsure how tohandle a program that isclassified as a security risk,you can view the security riskassessment. The security riskassessment de

Page 389 - 1 Ask for my password

Detects when your computerconnects to a new network.You can then allow or blockconnections from allcomputers that areconnected to that network.See “Ab

Page 390 - About Norton Toolbar

Supported Norton productsTo use all the features of Norton Internet Security, youmust use the following versions of Norton securityproduct:If you use

Page 391

1 Uses a user-defined address listto expedite the scanning of email.1 Accepts all email messages fromsenders in the Allowed List.1 Treats all email me

Page 392

Norton Online Family helps parents to get a betterunderstanding of what children do online, so that theycan better protect and guide them.You can use

Page 393

1 Monitor and manage the Internet search that yourchildren perform.1 Define House Rules for your children based on theirage and maturity.wNorton Onlin

Page 394

In some cases, Auto-Protect might warn you about avirus-like activity that you know are not the work of avirus. If you perform such an activity and wa

Page 395

To control these spam mails you can use the spamfiltering. By default, spam protection remains active.If for any reason you want to disable it, you ca

Page 396

wNorton Community Watch collects and submits detaileddata about the Norton-specific errors and componentsonly. It does not collect or store any person

Page 397

2In the Settings window, click the Network tab.3In the left pane, click Intrusion Prevention.4In the Intrusion Prevention row, move the On/Offswitch t

Page 398

To turn off Web settings1In the Norton Internet Security main window, clickSettings.2In the Settings window, click the Web tab, and dothe following:1

Page 399

2In the Settings window, click the Web tab, and dothe following:1 In the Browser Protection section, in theBrowser Protection row, move the On/Offswit

Page 400

Configuring Norton Internet Security settingsThe default Norton Internet Security settings providea safe, automatic, and efficient way to protect your

Page 401 - Settings

1 Identified malicious software such as portableexecutable files and running processes1 Any Web site URL that your product identifies asfraudulent1 Al

Page 402

2In the Settings window, configure your settings inthe following tabs:Lets you configure howyou want Norton InternetComputerSecurity to scan yourcompu

Page 403

Lets you configure howyou want Norton InternetSecurity to monitor yournetwork activities.You can protect yourcomputer against thethreats that you migh

Page 404

Lets you safeguard yoursensitive information andonline transactions.You can manage yourlogin information, such asemail login credentialsand your finan

Page 405 - Monitoring

Lets you configure theappearance and securityof your product.In addition, you canconfigure how NortonInternet Security submitsrisk details to Symantec

Page 406

scan your computer for viruses and other securitythreats.Your options are:AntiVirus and SONARExclusions options let youspecify the items that NortonIn

Page 407 - Opening Security History

Norton Internet Security lets yourun different types of scans todetect and prevent any virusinfection on your computer.You can use the variousComputer

Page 408

Real Time ProtectionCustomizing protection featuresAbout customizing settings and options466

Page 409

Real Time Protection optionprotects your computer bycontinuously checking forviruses and other security risks.You can use the Real TimeProtection opti

Page 410

SONAR Protection1Symantec Online Network forAdvanced Response (SONAR)provides you with real-timeprotection against threats byproactively detectingunkn

Page 411 - About Security History

1 Early Launch Anti-MalwareProtectionThis feature provides betterprotection by running all thenecessary components ofNorton Internet Security thatbloc

Page 412

If you chose not to join Norton Community Watch whenyou installed your Norton product, you can turn it onlater. To access the NortonCommunityWatch opt

Page 413

UpdatesCustomizing protection featuresAbout customizing settings and options470

Page 414

Norton Internet Securityprotects your computer fromvulnerabilities through the latestprogram and definition updates.Definition updates contain theinfo

Page 415

latest available version andprompts you for freeinstallation. To get the latestversion, this option must beturned on.wThis feature may notwork in some

Page 416

1 Apply updates only onrebootLets you choose how theprogram updates obtainedby Automatic LiveUpdateneed to be applied to yourcomputer. Certain program

Page 417

Your options are:Intrusion PreventionCustomizing protection featuresAbout customizing settings and options474

Page 418

Intrusion Prevention scans allthe network traffic to and fromyour computer and comparesthis information against a set ofattack signatures. Attacksigna

Page 419

Message ProtectionCustomizing protection featuresAbout customizing settings and options476

Page 420

Message Protection protectsyour computer against thethreats that you may receivethrough email attachments. Youcan use the Email Antivirus Scanoption,

Page 421

your computer with whichyou want to integrate NortonAntiSpam.1 Send feedback about anymisclassified email messageto Symantec for analysis.1 Classify t

Page 422

Network SecuritySettings479Customizing protection featuresAbout customizing settings and options

Page 423

Norton Bootable Recovery Tool detects and resolvesthe following security threats:Programs that infect anotherprogram, boot sector,partition sector, or

Page 424

The Network Cost Awarenessoption lets you set up policiesand restrict the Internet usageof Norton Internet Security. Youcan define the amount ofnetwor

Page 425

related to the computers ordevices that are on yournetwork.1 Grant or deny permissions tothe networked devices toaccess your computer.1 Add or Remove

Page 426 - About the File Insight window

Smart Firewall monitorscommunications between yourcomputer and the othercomputers on the Internet. Italso protects your computerfrom common security p

Page 427

Your options are:The Browser Protection featurechecks for browservulnerabilities in the followingbrowsers:1 Internet Explorer 7.0 or later1 Firefox 10

Page 428

The Identity Safe feature inNorton Internet Security lets yousave and protect your logins.Identity Safe provides you thefollowing features:1 Export Id

Page 429

By using General settings, you can do the following:1 Schedule your Norton Tasks.1 Configure the General settings of your product.1 Monitor the perfor

Page 430

Your options are:Norton TasksCustomizing protection featuresAbout customizing settings and options486

Page 431

Lets you configure yourNorton Tasks settings.Your options are:1 Automatic Resume DelayFrom Sleep orHibernationThis option delays theautomatic backgrou

Page 432

defragment your bootvolume or the local diskthat contains the bootvolume when yourcomputer is idle.When the option is turnedon, Norton InternetSecurit

Page 433

Other Settings489Customizing protection featuresAbout customizing settings and options

Page 434 - Searching in Security History

Programs that track systemactivity, gather systeminformation, or track userhabits, and relay thisinformation to third-partyorganizations. Theinformati

Page 435 - 1 Text Files (.txt)

Lets you configure themiscellaneous settings.Your options are:1 Power Saving ModeLets you save your batterypower by suspending theNorton Tasks when yo

Page 436

most recent definitions.1 Norton CommunityWatchLets you submit selectedsecurity and applicationdata to Symantec foranalysis. Symantecanalyses the data

Page 437

1 Remote ManagementLets you remotely viewyour device’s securitystatus and fix somesecurity issues by usingNorton Management,Norton One, and NortonStud

Page 438

1 Parental Controls havenot been installedLets you install NortonOnline Family.Norton Online Family is aparental controlapplication that helps youprot

Page 439

Performance MonitoringCustomizing protection featuresAbout customizing settings and options494

Page 440

Lets you monitor theperformance of yourcomputer.1 Performance MonitoringWhen you turn on thePerformance Monitoringoption, Norton InternetSecurity moni

Page 441

Log Only, or the Offmode. The Details &Settings link in thenotification alert letsyou view additionaldetails about theresource consumptionby the p

Page 442

2 Alert for High-Usageof:2 CPUWhen this optionis turned on,Norton InternetSecurity detectsand notifies youwith the details ofincreased usage ofthe CPU

Page 443 - Customizing

about theincreased usage ofhandles by anyprogram orprocess.2 Program ExclusionsLets you selectspecific programs toexclude fromappearing inperformance

Page 444 - 1 Monitors your computer for

Product Security499Customizing protection featuresAbout customizing settings and options

Page 445

to protect Symantec against software piracy.This Software may contain enforcementtechnology that limits the ability to installand uninstall the Softwa

Page 446 - Feature summary

You can download Norton Bootable Recovery ToolWizard in one of the following ways:1 From the Start menu.1 From the Norton Support Web site.To download

Page 447

Lets you protect NortonInternet Security fromunauthorized changes.Your options are:1 Non-Admins Access toSettingsLets you access andconfigure all the

Page 448

to view or configure yourproduct settings.However, if you forgetyour settings password,you can reset thepassword in the windowthat appears when youcho

Page 449 - About spam filtering features

Silent Mode SettingsCustomizing protection featuresAbout customizing settings and options502

Page 450 - About Parental Control

Lets you turn on or turn offSilent Mode.Your options are:1 Silent ModeWhen you turn on theSilent Mode option, SilentMode is enabled for aspecified dur

Page 451

turns on Quiet Mode.When Quiet Mode isturned on, NortonInternet Securitysuppresses thebackground activitiesbut continues todisplay alerts andnotificat

Page 452

2 User-SpecifiedProgramsWhen you run anapplication that islisted in theUser-SpecifiedPrograms list, NortonInternet Securitydetects the activity,and au

Page 453

wYou cannot run System Restore on your computer whenNorton Product Tamper Protection is turned on. Youmust temporarily turn off Norton Product TamperP

Page 454

To turn on Norton Product Tamper Protection1In the Norton Internet Security main window, clickSettings.2In the Settings window, click the General tab.

Page 455

wThe reset settings password option appears in theSelect your Uninstall Preference window only whenthe SettingsPassword Protection option is turned on

Page 456

6In the dialog box that appears, in the Password box,type a password.7In the Confirm Password box, type the passwordagain.8Click OK.9In the Settings w

Page 457

About locating your Norton Product Key or activationPINTo use Norton Bootable Recovery Tool, you must startthe computer from any of the following reco

Page 458

your Norton Internet Security Settings password usingthe reset settings password option in the SelectUninstall Preference window.To access the Select

Page 459

4At the bottom of the Select Your UninstallPreference window, click reset settings password.5In the dialog box that appears, in the ResetPassword Key

Page 460 - 1 Updates

Norton Account. Your device needs to be connected tothe Internet to use Remote Management feature. Whenthe Remote Management option is turned on, Nort

Page 461

2 Timestamp of last Quick Scan2 Timestamp when stats were published1 View health states of different components of yourdevice2 Overall product health2

Page 462 - 1 Safe Surfing

By default, this feature is disabled unless you registeryour Norton Internet Security with your NortonAccount.When the Remote Management option is tur

Page 463

This chapter includes the following topics:1 Finding the version number of your product1 Finding the End-User License Agreement1 About upgrading your

Page 464

Finding the End-User License AgreementEnd-User License Agreement (EULA) is a legaldocument that you agree to while installing theproduct. EULA contain

Page 465

> Updates > Automatic Download of New Version >On.If you choose to install the latest version of the product,Norton Internet Security downloa

Page 466 - Real Time Protection

The upgrade process might not work if your Webbrowser is incompatible to communicate with theSymantec servers.wYour product must be activated and you

Page 467 - 1 Auto-Protect

wYour product must be activated and you need anInternet connection to check if a new version isavailable and install new version of the product.To che

Page 468

1 If you received your Norton product preinstalledby the computer manufacturer, the Product Key isavailable on your Norton Account. When you areprompt

Page 469 - 1 Early Launch Anti-Malware

When you click the Get Support option in the Supportdrop-down menu, Norton Internet Security checks yourInternet connection. To access Norton Autofix,

Page 470

To solve a problem if your computer is unable to connectto the Internet1In the Norton Internet Security main window, clickSupport.2In the Support drop

Page 471 - 1 Automatic Download of New

1 Newsletter to which you can subscribe.1 Protection blog that lets you post your owncomments and view comments from experts.wThe Symantec Web site is

Page 472

About SupportIf you have purchased Norton Internet Security, youcan access Support from the product.wSupport offerings may vary based on the language

Page 473 - About Network settings

contact the technical support team in the followingways:Chat in real time with asupport representative.For more complex technicalissues, chat offers t

Page 474 - Your options are:

also use the SearchSupport box to find solution usinga keyword.Norton Support Web site also contains useful links tothe product manual, the Norton Acc

Page 475

http://www.norton.com/supportGetting support by phoneWhen you click the Get Support option in the Supportdrop-down menu, Norton Autofix performs a Qui

Page 476 - Message Protection

4Click the Contact Us option at the bottom of theWeb page and follow the on-screen instructions.Support policySymantec recommends that you have the la

Page 477 - 1 Specify the addresses or

www.norton.com/supportIf you are a Norton One Premium Member, go to thefollowing Norton One support Web site for informationon this topic:https://one.

Page 478

About uninstallingTo remove your Symantec product from your computer,use the Add/Remove Programs option in the WindowsControl Panel.You must restart y

Page 479 - Network Security

Creating Norton Bootable Recovery Tool on a CD orDVDNorton Bootable Recovery Tool is integrated withWindows Preinstallation Environment (WinPE).Theref

Page 480 - 1 View or modify details

wYour computer must be connected to the Internet toavail this option. Norton Internet Security does notoffer to leave the Norton Toolbar if you upgrad

Page 481

4In the page that appears, under Select YourUninstall Preference, click one of the following:Lets you retain your settings,passwords, and preferences

Page 482 - About Web settings

To uninstall Norton Internet Security from the Startmenu1Do one of the following:1 On the Windows taskbar click Start > AllPrograms > Norton Int

Page 483

5Do one of the following:1 Click RestartNow (recommended) to restart thecomputer.1 Click RestartLater to restart the computer later.Norton Internet Se

Page 484 - About General settings

Finding additional solutionsAbout uninstalling534

Page 485 - 1 Schedule your Norton Tasks

Aabout customer support 523accessingFacebook Scan 133accessing Norton Internet SecurityscansComputer Scan 133Reputation Scan 133Actions windowdeleting

Page 486

Antispywaremanaging using the mainwindow 283Application Ratingscheck trust level 118Scan Performance Profiles 120attack signatures 272attacksnetwork 2

Page 487 - 1 Idle Time Optimizer

CPU usageviewing 95Creating custom scansadding files 141adding folders 141Crimeware Protectionturning off or turning on 456custom scanconfigure scan o

Page 488

features (continued)security risk protection 447FeedbackNorton AntiSpam 295file extensionsof infected files 208filterimporting allowed 289Web Query 29

Page 489 - Other Settings

importlogins 356Insight Networkabout 152cloud computing 152Insight Network scan 152Quick Scan 152scan 152shortcut menu scan 152Single File Scan 152Ins

Page 490 - 1 Insight Protection

Creating Norton Bootable Recovery Tool ISO fileYou can create a Norton Bootable Recovery Tool ISOfile on your computer. You can burn this ISO file to

Page 491

Manual Repairreviewing remaining risksin 208Manual Repair windowreviewing remaining risksin 136, 138Media Center ExtenderSilent Mode 186Memory graphab

Page 492 - 1 Remote Management

Norton Community Watch(continued)turning off or turning on 454Norton Firewall Diagnosisabout 255Norton Insightabout 112Files of Interest 115refreshing

Page 493

OOffice documentsembedded objects 181scanning office documents 181turn on or turn off 182virus macros 181One Click Supportusing 520Online transactions

Page 494 - Performance Monitoring

Program Control (continued)turning on and off 219Program rulesadding 224changing 233removing 237program updates 65programsadding to Program Control 22

Page 495 - 2 Performance Alerting

risksintrusions 212port scans 212ruleschanging 225, 233creating 224–225Running custom scansscanning required files 144scanning required folders 144run

Page 496

Security History (continued)recent alert history 408searching 434security risks 408submission, items toSymantec 408suspicious email 408traffic alerts

Page 497 - 2 Handles

startup files 200startup itemsdelaying and running 100disabling or enabling 99Startup Managerabout 97delaying and running delayeditems 100disabling or

Page 498

version numberchecking 515virus protectionabout 443system scans 136updates 443virusesautomatic protection 443descriptions 443unknown 443Vulnerability

Page 499 - Product Security

fooNorton from Symantec products protect consumers from traditional threats with antivirus, antispam, and Spyware Protection.They also protect against

Page 500 - 1 Settings Password

To create Norton Bootable Recovery Tool on a USB key1Insert the USB key into the USB port of yourcomputer.2In the Norton Bootable RecoveryTool Wizard

Page 501

If you have a valid Norton product key or activationPIN, you can go to your Norton Account and access theNorton Bootable Recovery Tool download link.T

Page 502 - Silent Mode Settings

Norton Bootable Recovery Tool automaticallydownloads the latest virus definitions from Symantecservers and uses these virus definitions to secure your

Page 503 - 2 IMAPI 2.0 Disk Burn

4Read the Norton License Agreement, type yourProduct Key, and then click I Agree.If you use a non-QWERTY keyboard, use the VirtualKeyboard option to e

Page 504

To update Norton Bootable Recovery Tool virusdefinitions on a USB key1Insert your Norton Bootable Recovery Tool USB keyinto the USB port of your compu

Page 505 - 2 User-Specified

8. Disclaimer of Damages:SOME STATES AND COUNTRIES DO NOTALLOWTHE LIMITATIONOR EXCLUSIONOF LIABILITY FOR INCIDENTAL ORCONSEQUENTIAL DAMAGES, SO THEBEL

Page 506

2In the page that appears, click Download NortonPower Eraser.3Save the NPE.exe file to your Desktop.4Double-click the NPE.exe file on your Desktop.5Re

Page 507

Starting Norton Internet Security from thecommand promptIf you work from the command line (for example,writing a script or code), you can start Norton

Page 508

and notifications appear over the notification area ofyour computer. In most cases, you can click the linkavailable in the alert to view the details a

Page 509

About Norton Internet Security shortcut menuNorton Internet Security performs backgroundactivities to keep your computer secure. The icon inthe notifi

Page 510

Lets you turn on or turn offSilent Mode.Turn on/Turn off SilentModeLets you turn off or turn on thefirewall.Disable/Enable SmartFirewallLets you turn

Page 511 - About Remote Management

download the latest updates. To configure the proxysettings of your network, go to the Norton InternetSecurity main window, and then click Settings &g

Page 512

The type of definition updates that each of theSymantec products receive are as follows:Users of these productsreceive the latest virusdefinitions fro

Page 513

Users of these productsreceive the latest virusdefinitions fromSymantec that protectsyour computer from alltypes of security threats.In addition, user

Page 514

Contains the most importantvirus definitions that arerequired for latest securitythreats as viewed by Symantec.The Core Set is a subset of theComplete

Page 515 - Finding additional

As the Smart Definitions are of considerably smallersize, it results in lesser download time, lesserinstallation time, lesser boot time, and lesser me

Page 516 - About upgrading your product

“NOTICE OF CLAIM”. The Notice of Claimshould include both the mailing address andemail address You would like Symantec touse to contact You. If Symant

Page 517

These downloads are called Pulse Updates. The PulseUpdates are lighter and faster than AutomaticLiveUpdate. It keeps your computer secure from theongo

Page 518

updates periodically, which are enhancements to theproduct. Program updates are usually created to fixprogram errors, improve the performance of thepr

Page 519 - About Norton Autofix

you can acquire the product and maintain your statusare as follows:The product includes a limited-timesubscription to definition updates. Whenthe subs

Page 520

run LiveUpdate manually to obtain updates if you haveturned off the Automatic LiveUpdate option.wIf you are connected to the Internet, AutomaticLiveUp

Page 521 - 1 Click OK

Turning on or turning off Apply updates only on rebootLiveUpdate obtains latest definition updates and theprogram updates that keep your computer secu

Page 522

4In the Settings window, click Apply.5Click OK.About Pulse UpdatesIn addition to the definition updates that AutomaticLiveUpdate downloads, Norton Int

Page 523 - About Support

You must be connected to the Internet to obtain latestdefinition updates by using Pulse Updates. You canturn on or turn off Pulse Updates only if Auto

Page 524

PAC file contains the code that lets your browser knowabout the proxy settings for different Web sites overthe Internet. It also contains the words wh

Page 525 - About phone support

Lets you provide the details ofyour Proxy Settings.Under Proxy Settings, check Usea proxy server for your HTTPconnections, and do thefollowing:1 In th

Page 526 - Getting support by phone

5In the Network Proxy Settings window, do thefollowing:1 If you want your browser to automatically detectnetwork connection settings, under AutomaticC

Page 527 - Worldwide service and support

may only be modified by the Documentationor by a written document that has beensigned by both You and Symantec. ShouldYou have any questions concernin

Page 528 - ClubNorton

Getting startedAbout Network Proxy Settings80

Page 529 - About uninstalling

This chapter includes the following topics:1 About System InsightAbout System InsightNorton Internet Security continuously monitors yourcomputer to ke

Page 530

disk optimizations, threat detections, performancealerts, or Quick Scans. The graph displays theactivities as icon or stripe, and the description fore

Page 531

The Norton Tasks window provides the details suchas the timestamp, the duration, and the status ofthe background jobs. The details also include thetyp

Page 532

window. The Events graph at the top of thePerformance window displays each activity as icon orstripe. The description for each icon or stripe appearsa

Page 533

Provides the details about thethreat detection activities thatNorton Internet Securityperformed on your system overa period of the last threemonths.Th

Page 534 - Finding additional solutions

Provides the details about QuickScans that Norton InternetSecurity performed on yoursystem over a period of the lastthree months.The details include t

Page 535

To view details of your system activities1In the Norton Internet Security main window, clickPerformance.2In the Performance window, at the top of the

Page 536

exceeds the defined threshold limit, Norton InternetSecurity alerts you with a performance alert.You can use the Resource Threshold Profile forAlertin

Page 537

You can use the following options to configureperformance alerts:Turns off performance alerts.Select this option if you donot want Norton InternetSecu

Page 538

Chapter 1 Getting started ... ... . ... . ... . .. 13Activation protects you ... . ... ... ... 13About Norton Int

Page 539

To configure performance alerts1In the Norton Internet Security main window, clickSettings.2In the Settings window, click the General tab.3In the left

Page 540

your system resource, Norton Internet Security notifiesyou with a performance alert.To configure the resource threshold profile1In the Norton Internet

Page 541

minimum resource usage. By reducing resource usage,your computer gains longer battery life and becomesmore energy efficient.You can configure a low th

Page 542

Excluding programs from performance alertsNorton Internet Security lets you exclude programsfrom performance alerts. You can add the programsthat cons

Page 543

2In the Settings window, click the General tab.3In the left pane, click Performance Monitoring.4Under Performance Monitoring, in the ProgramExclusions

Page 544

graph for the last 10 minutes. If you select the 1Doption, Norton Internet Security displays a historicaldata of the last one day.When you click at an

Page 545

graph for the last 10 minutes. If you select the 1Woption, Norton Internet Security displays the CPUgraph and memory graph for the last one week.wBy d

Page 546

Identifying resource-consuming processesYou can click at any point on the CPU graph or memorygraph to obtain a list of top three processes thatconsume

Page 547

1 Windows System files (.sys)1 Dynamic link library files (.dll)1 ActiveX control files (.ocx)Norton Internet Security displays the community usagedet

Page 548

1 When you update a program that can possibly resetall startup settings to default.1 When you use another program to manage yourstartup programs.1 Whe

Comments to this Manuals

No comments