Product ManualCare for our Environment; ‘It's the right thing to do.’Symantec has removed the cover from this manual to reduce the Environmental
Chapter 4 Responding to security issues .. . ... . ... 199What to do if a security risk is found ... . ... 199Chapter 5 Protecting Internet
3In the Startup Manager window, in the On/Offcolumn, select the program that you want toautomatically start when you turn on yourcomputer.4Click Apply
About optimizationThe data storage space on a disk is divided into discreteunits. These units are called clusters. When files arewritten to the disk,
application on your computer. The optimizationprocess starts next time when your computer is idle.You can use the Idle Time Optimizer option to optimi
2In the Performance window, at the top of thesecurity status graph, click Optimize.To optimize your boot volume from the Norton Taskswindow1In the Nor
Turning off or turning on Idle Time OptimizerNorton Internet Security automatically schedules theoptimization when it detects the installation of a ne
1 The name of the Norton taskYou can use the icon that appears before the nameof a background job to start or stop a backgroundtask. You can start or
The Norton Tasks window lets you monitor thefollowing Norton-specific tasks:Automatic LiveUpdateautomatically checks fordefinition updates andprogram
Allows the smart scanning offiles on your computer. Itimproves the performance ofNorton Internet Securityscans by letting you scanfewer files withoutc
Scans the important locationsof your computer that theviruses and other securitythreats often target.Quick Scan takes less time toscan than a Full Sys
Performs backgroundmaintenance tasks related toNorton Internet Security.Tasks include clearing installlogs and rescanningconsolidated firewall rule.Pr
Index ... ... ... . ... . ... . ... . ... ... ... 53511Contents
4Do one of the following:1 To run a background job, click the play icon thatappears before the name of the background job.1 To stop a running backgrou
Allows the Norton Tasks torun irrespective if thecomputer uses externalpower or battery power.If you choose this option,Norton Internet Securityperfor
4In the Power Source window, select one of thefollowing:1 ExternalAllows the Norton Task to run only when yourcomputer uses external power.1 External
Norton Internet Security obtainsspecific information about theFiles of Interest and submits theinformation to Symantec duringidle time. The informatio
Symantec assigns the following confidence levels toFiles of Interest:Symantec analyzes the file astrusted based on the statisticalevaluation that is d
Norton Internet Security also provides differentprofiles to configure your scan performance. Whenyou use the Full Scan profile, Norton Internet Securi
The drop-down list that is available in the NortonInsight - Application Ratings window provides youthe following options:Lists the processes that runo
Lists the Files of Interest thatyou manually trusted in theFile Insight window.This category does not listthe files that do not belongto the File of I
To view the files using Norton Insight1In the Norton Internet Security main window, clickAdvanced.2In the ComputerProtection pane, click ApplicationRa
Insight - Application Ratings window. However, youcan use the CheckTrust Now option in the File Insightwindow to update the trust value of a file. You
Contents12
To find the location of the file4In the File Insight window, click Locate.To refresh the trust level of the file4In the File Insight window, click Che
The complete scan includes a scan of all files onyour computer irrespective of the confidence levelor digital signature of the files.1 Configure to St
To configure Scan Performance Profiles from the NortonInsight - Application Ratings window1In the Norton Internet Security main window, clickAdvanced.
Norton Internet Security provides reports based on thefollowing categories:Lets you view the details of thevarious attacks your computeris protected f
To view the Monthly Report1In the Norton Internet Security main window, clickSettings.2In the Settings window, click the General tab.3In the left pane
This chapter includes the following topics:1 About maintaining protection1 About the Norton Internet Security scansAbout maintaining protectionAfter y
1 Run LiveUpdate regularly to receive new programupdates.1 Keep Auto-Protect turned on at all times to preventviruses from infecting your computer.1 W
2In the Settings window, in the Computer tab, movethe On/Off switch to the left to the On position forthe following settings:Computer Scan providesthe
5In the Smart Firewall section, in the Smart Firewallrow, move the On/Off switch to the left to the Onposition.6In the MessageProtection section, move
activities that are performed on your computer toprotect your computer from the Internet-based threatsthat exploit software vulnerabilities.Norton Int
This chapter includes the following topics:1 Activation protects you1 About Norton Internet Security main window1 About your Norton Account1 About Nor
Insight Network Scan uses thevirus definitions that areavailable locally and hosted inthe Cloud. Insight Network Scandetects the files that aresuspici
Reputation Scan displays thereputation information of thefiles on your computer. Itdisplays the reputationinformation such as trust level,prevalence,
Scan Facebook Wall lets youscan the links and URLs that areavailable on your Facebookprofile.When you click the ScanFacebook Wall option, NortonIntern
Accessing Norton Internet Security scansYou can use Norton Internet Security scans to secureyour computer from all types of viruses and unknownthreats
To access the scan from the notification area4In the notification area on the taskbar, right-clickthe Norton Internet Security icon, and then clickRun
If you suspect that your computer is infected, you canrun three types of computer scans manually to preventvirus infections on your computer.You can r
Scans a specific file, folder,drive, or removable drive thatyou choose.Custom ScanComputer Scan provides details about the scanneditems. You can view
2In the Computer Scan pane, click FullSystem Scan.You can use the following options to suspend a FullSystem Scan:Suspends a Full System Scantemporaril
2In the Computer Scan pane, click Quick Scan.You can use the following options to suspend aQuick Scan:Suspends a Quick Scantemporarily.Click Resume to
3In the Scans window, do one of the following:1 To scan specific drives, click Run next to DriveScan, select the drives that you want to scan,and then
activate the product within a limited time period afteryou install it.If you are connected to the Internet, product activationtakes place automaticall
computer. Viruses, spyware, and other risks oftentarget these areas.If your most recent scan was a Full System Scan, thiswindow shows the results of a
About custom scansYou can create a custom scan if you regularly scan aparticular segment of your computer. This custom scanlets you scan the segment f
5On the Scan Items tab, add the items that you wantto scan. See “Selecting the scan items” on page 142.6On the Scan Schedule tab, set the frequency an
4In the window that appears, on the Scan Items tab,do the following:1 To add drives, click Add Drives, in the ScanDrives dialog box, select the drives
3In the Scans window, in the Edit Scan column, clickthe edit icon next to the scan that you want toschedule.4In the Edit Scan window, on the Scan Opti
To run a custom scan1In the Norton Internet Security main window, clickScan Now.2In the Computer Scan pane, click Custom Scan.3In the Scans window, cl
4Click Yes to confirm that you want to delete thescan.About scheduling scansNorton Internet Security automatically detects the idlestate of your compu
wNorton Internet Security lets you select multiple datesif you schedule a monthly scan.To schedule a custom scan1In the Norton Internet Security main
6Under After scan completion:, select the state atwhich your computer should be after the scan iscomplete. Your options are:1 Stay On1 Turn Off1 Sleep
5Click Next.6In the Scan Options tab, click Save.Scheduling a Quick ScanQuick Scan scans the important locations of yourcomputer that the viruses and
During activation, the Norton Account windowappears. You can create your Norton Account andregister your product. You can also view details, suchas yo
To edit a scheduled scan from Norton Internet SecurityScans dialog box1In the Norton Internet Security main window, clickScan Now.2In the Computer Sca
Enables (+) or disables(-) boot recordscanning and masterboot record scanning(for example, NAVW32C: /B+ or NAVW32 C:/B-)/B[+|-]Scans only the bootreco
To run a scan from the command prompt1At the command prompt, type the path in whichNorton Internet Security is located and theexecutable's file n
Protection > On. By default, the Insight Protectionoption is turned on.When the Insight Protection option is turned on,Norton Internet Security per
perform this scan by running an Insight Networkscan on single file using the Custom Scan optionon the Scans window.1 Insight Network context-menu scan
4In the Insight Protection row, do one of thefollowing:1 To turn off Insight Protection, move the On/Offswitch to the right to the Off position.1 To t
Scan, it also performs a Computer Scan. NortonInternet Security uses the Computer Scan to performthe signature-based threat detection. It compares the
This category includesWindows System files (.sys),dynamic link library files(.dll), and device driver files(.drv).System filesThis category includesAc
Scans all the Files of Interestthat are available on yourcomputer.When you perform a FullSystem Scan, Norton InternetSecurity searches for Files ofInt
Symantec has a fewindications that the file is nottrusted.This file is suspicious and canharm your computer.PoorSymantec has a highindication that the
Where to find your product keyThe product key is a unique key that helps you to installand activate the Symantec product on your computer.The product
4If there is a file with Poor or Bad trust level, underthe Trust Level column, click the red cross (x) icon.5In the Quarantine File window, click Quar
check the trust level of a specific file, you can scan theparticular file.To run a Reputation custom scan1In the Norton Internet Security main window,
When you run a Reputation Quick Scan, NortonInternet Security considers the Files of Interest whichinclude running processes and loaded programs. When
1 The Norton Network graph displays the detailsabout the known good files and bad files.You can view the number of trusted files that areon your compu
Trust LevelProtecting your files and dataAbout the Norton Internet Security scans164
Indicates the trust level thatis assigned to a file.Symantec analyzes specificinformation about a file suchas the digital signature andthe hash value
suspicious file.Indicates the communityusage level of the file.The search results aregrouped in to the followingcategories:1 Very Few Users: Showsthe
Indicates the system resourceusage level of the file.The usage levels are asfollows:1 Low: Indicates that thefile consumes minimumsystem resources.1 M
Indicates the stability ratingof the file.The stability rating dependson how frequently theprogram crashes. Thedifferent stability ratings areas follo
can also let other Facebook users know the securitystatus of any Web site.However, Norton Safe Web requires your permissionto scan the URLs that are a
The product key is printed onthe card along withinstructions on how to use it.Be sure to save your productkey by creating or signing into your Norton
The following are the safety states that Norton SafeWeb provides after it scans the links on your FacebookWall:Indicates that the site is safe tovisit
To enable your Facebook Wall1In the Norton Internet Security main window, clickScan Now.2In the window that appears, click Scan FacebookWall.3In the S
The following list provides details on the settings thatyou can make and the predefined parameters:You can set the duration afterwhich Norton Internet
Norton Internet Security discontinues any Idle TimeScans that it started during idle time if you begin touse your computer again. However, it resumes
3In the Idle Time Scans row, in the drop-down list,select the option that you want to set. Your optionsare:1 Weekly1 Monthly1 Quarterly4Click Apply.Sp
wSymantec recommends that your computer remainsconnected to Internet to get the real-time protectionagainst threats and proactively detects unknownsec
3In the SONAR Protection row, do one of thefollowing:1 To turn off SONAR Protection, move the On/Offswitch to the right to the Off position.1 To turn
wExclude a program from Norton Internet Security scansonly if you are confident that the program is safe. Forexample, if another program relies on a s
About Signature ExclusionsNorton Internet Security lets you select specific knownsecurity risks and exclude them from Norton InternetSecurity scans. E
To add a signature to the Signature Exclusions1In the Norton Internet Security main window, clickSettings.2In the Settings window, in the left pane, c
About Norton Internet Security mainwindowThe Norton Internet Security main window acts as asecurity management interface. You can access themain featu
wWhen you exclude a reputation-based threat, NortonInternet Security does not add the signature of theexcluded threat to the Signature Exclusions wind
3In the Clear file IDs excluded during scans row,click Clear All.4In the Warning window, click Yes.5In the Settings window, click Apply, and then clic
Turning on or turning off Microsoft Office Automatic ScanNorton Internet Security maintains a higher level ofsecurity by automatically scanning all Of
Norton Internet Security provides the following optionsunder Silent Mode Settings:Norton Internet Security allowsyou to manually turn on for aspecifie
You can view the summary of the Silent Mode sessionsunder the Recent History, Full History, and SilentMode categories in the drop-down list of the Sho
Turning on or turning off Silent Mode manuallyYou can manually turn on Silent Mode for a specifiedduration before you perform any important task onyou
6Click OK.To turn on Silent Mode from the notification area1In the notification area on the Windows taskbar,right-click the Norton Internet Security i
notifications and suspends background activities toprovide uninterrupted sessions for Silent Mode optionssuch as Full Screen Detection or Media Center
background activities and lets the task use themaximum resources for better performance.You can choose to set Norton Internet Security toautomatically
The following table explains about the various options:When you use a Media Centerapplication to burn a CD or aDVD, Norton Internet Securityautomatica
Lets you create or access yourNorton Account.Norton Account lets you manageall of your Norton products inone place.wThis feature may not beavailable i
When you use a Media Centerapplication to record a TVprogram, Norton InternetSecurity automatically enablesQuiet Mode, if the Media CenterTV Recording
Norton Internet Securityautomatically turns on QuietMode when it detects a TVprogram recording session or adisk-burning session. Inaddition, you can m
only after the TV program recording session ordisk-burning session is complete. You cannot turn offQuiet Mode during the sessions by using the options
About User-Specified ProgramsNorton Internet Security automatically turns on QuietMode when it detects a TV program recording sessionor a disk-burning
Quiet Mode. Norton Internet Security turns on QuietMode the next time when you execute the program.You can only add the programs that have .exe fileex
4Under Quiet Mode on Detection of, in theUser-Specified Programs row, click Configure.5In the Quiet Mode Programs window, select theprogram that you w
1 OffTurns off boot time protection.If you turn off the Enable Boot Time Protectionoption, the protection level of your computerreduces.Configuring bo
click Settings > Computer > Real Time Protection >Early Launch Anti-Malware Protection > On.By default this option is turned off.wThis opt
Protecting your files and dataAbout the Norton Internet Security scans198
This chapter includes the following topics:1 What to do if a security risk is foundWhat to do if a security risk is foundYour product provides many so
Norton™ Internet Security ProductManualThe software described in this book is furnished under a licenseagreement and may be used only in accordance wi
Lets you access different typesof scans to protect yourcomputer and your sensitivedata.By using the Scan Now option,you can run the following typesof
risk. You can access the Symantec Security ResponseWeb site and refer the manual removal instructions.In some cases, Norton Internet Security might no
You can view information about detected viruses andother security threats in Security History.Security History also includes information aboutspyware,
3In the Show drop-down list, select the category forwhich you want to review Auto-Protect alerts.Your options are:Review Auto-Protectnotifications tha
4In the right pane, click the Options link.The option name appears as Restore & Options forfew items.If one or more security risks such as spyware
5In the Threat Detected window, select theappropriate action on the risk.The following are some of the options that areavailable in the Threat Detecte
Removes the selectedsecurity risk from thecomputer andquarantines it.This option is availablefor the security risks thatrequire your attention formanu
Sends the security risk toSymantec.In some cases, NortonInternet Security mightnot identify an item as asecurity threat, but youmight suspect that the
To respond to Worm Blocking alerts4In the alert window, select the action that you wantto take. Your options are:Permanently stops theworm by putting
2After the worm has been quarantined, perform thefollowing tasks:1 Run LiveUpdate to ensure that you have thelatest definition updates.See “About Prog
checks for the infections that have processes runningin memory. It also checks for the infections that thestart-up files and folders refer.If that doe
Lets you access the NortonInternet Security advancedwindow.By using the Norton InternetSecurity advanced window, youcan do the following:1 Run differe
To resolve the suspected security risk4Save all open files, and then click Go.If you do not respond to this dialog box, it closesautomatically without
This chapter includes the following topics:1 About the Smart Firewall1 About Download Insight1 About Intrusion Prevention1 About Vulnerability Protect
Internet. It also protects your computer from suchcommon security problems as the following:Warns you of connectionattempts from othercomputers and of
remains protected, you can turn on the Smart Firewallmanually before the time that you specify concludes.When the Smart Firewall is turned off, your c
To turn on Smart Firewall from the notification area4In the notification area on the taskbar, right-clickthe Norton Internet Security icon, and then c
For example, you have a Program rule for the SymantecpcAnywhere application that blocks the use of theapplication with any other computer. You add ano
Permit the use of theNetBIOS name serviceand the NetBIOSdatagram service that theMicrosoft Network usesin file and printer sharing.NetBIOS is an acron
You can add a new General rule in this window. Youcan also do the following activities:You can change the settings ofa General rule that does notfunct
The Program Control window displays a list ofprograms. In this window, you can do the following:1 Add a program.1 Rename a program.1 Modify the rules
Lets the firewall notifyyou when a programattempts to access theInternet. You can thenallow or block Internetaccess for the program.In some instances,
The options on the right side of the Norton InternetSecurity main window help you do the following:Online FamilyGetting startedAbout Norton Internet S
for the first time, an alert prompts you to configureaccess settings.When you turn off Automatic Program Control, awarning appears. Symantec recommend
Adding a program to Program ControlYou can add a program to Program Control to controltheir ability to access the Internet. When you add theprogram, y
9In the Options drop-down list, select the access levelthat you want this program to have.Your options are:Allow all access attemptsby this program.Al
do not want them in the current version, you mustremove them again.To remove a program from Program Control1In the Norton Internet Security main windo
6In the drop-down list next to the program that youwant to change, select the access level that you wantthis program to have. Your options are:Allow a
7Follow the instructions in the Add Rule wizard.8In the General Rules window, click OK.9In the Advanced Settings window, click OK.To add a Program rul
2In the first panel of the AddRule Wizard, select theaction that you want for this rule. Your options are:Allow communication ofthis type.AllowFor exa
Update the Firewall –Activities category in theevent log each time thatcommunication of thistype takes place. Thisoption lets you monitorhow often thi
4Select the type of connection for the rule. Youroptions are:The rule applies tooutbound connectionsfrom your computer toanother computer.Connections
5Click Next, and then select the computers that applyto the rule. Your options are:The rule applies to allcomputers.Any computerThis rule applies only
Lets you monitor your child’sactivities on the Internet.wNorton Online Familymay not be available in someversions of Norton InternetSecurity.When you
The rule applies only tothe computers, sites, ordomains that you specify.You can specify thenames and addresses ofcomputers that apply tothe rule. The
6Click Next, and then select the protocols for therule. Your options are:The rule applies to TCP(Transmission ControlTCPProtocol)communications.The ru
The rule applies to allsupported protocols.When you select thisoption, you cannotspecify the types ofcommunications or portsthat apply to the rule.All
8Click Next.9Check Create a Security History log entry if youwant Norton Internet Security to create an entry inthe firewall event log.Norton Internet
5In the Advanced Settings window, in the GeneralRules row, click Configure.6In the General Rules window, select the rule thatyou want to change.7Click
Changing the order of firewall rulesEach list of firewall rules is processed from the topdown. You can adjust how the firewall rules areprocessed by c
5In the Program Control window, in the Programcolumn, select the program that contains the rulethat you want to move.6Click Modify.7In the Rules windo
Removing a firewall ruleYou can remove some of the firewall rules if necessary.However, you cannot remove some of the defaultGeneral rules that appear
6Click Modify.To remove all the program rules that are associatedwith the program, click Remove.7In the Rules window, select the rule that you wantto
Lets you configure how NortonInternet Security must control thenetwork communications to and fromyour computer.For instance, you may have to beaway fr
Lets you access NortonManagement.Norton Management lets youmanage your Norton productson all of your devices fromone location. Click theManage icon at
list or remove a program from the list. Your optionsare:Displays the trust level of a program.Symantec collects the informationfrom the Norton Communi
Displays the level of access that theprogram has.You can change the access level byselecting a different entry from thedrop-down list.Your options are
1 View the details of the devices that are present inthe network.1 Monitor the connection status of the devices thatare present in the network.1 View
Firewall Reset243Protecting Internet activitiesAbout the Smart Firewall
Returns the SmartFirewall to its defaultstate. You can click Resetto ensure that allrecommended firewallrules and settings areconfigured. NortonIntern
address range1 Your computer mustbe connected to asecure wireless orwired connectionEnsures that blocked andinactive ports do notrespond to connection
Automatic File/Printer SharingControlProtecting Internet activitiesAbout the Smart Firewall246
Allows the computers onthe network to shareresources such as files,folders, and printers (thatare locally attached).Some of the Windows 7and Windows 8
new network to whichyour computer isconnected as Shared orProtected. The promptappears only when thesecurity criteria forsharing matches.Protecting In
Automatic Program Control249Protecting Internet activitiesAbout the Smart Firewall
Lets you download theNorton Mobile Security forAndroid.You can use Norton MobileSecurity on all your devicesthat use Android operatingsystem. When you
Automatically configuresInternet access settingsfor the Web-enabledprograms that are run forthe first time.You can configure theAutomatic ProgramContr
decisions when aprogram receivesinbound or outboundtraffic. When youselect this option,Norton InternetSecurity does notprompt you with anyfirewall ale
When you turn offAutomatic ProgramControl, you can turn onAdvanced EventsMonitoring. You can usethe Advanced EventsMonitoring options, toconfigure the
1 Program ComponentThis option protectsyou against themalicious programsthat launchInternet-enabledprograms.1 Program LaunchThis option protectsyou ag
Internet withoutfirewall alerts.1 Direct NetworkAccessThis option protectsyou against the Trojanhorses and othermalicious programsthat bypass networkt
1 COM ControlThis option protectsyou against themalicious programsthat manipulate anapplication's behaviorby instantiatingcontrolled COMobjects.A
1 The traffic has violated the traffic policy of thefirewall1 The traffic comes from the restricted zone ofnetworks or computers1 The traffic matches
make definite decisions on whether to allow or blockcommunication attempts of networking applications.In addition, you can identify any suspicious pro
reputation-based security technology providesreputation ratings for files on the Internet based onthe information that is collected from Nortoncustome
In the left pane of the firewall alerts, you can find thefollowing reputation information:Shows the stability rating ofthe file on your computer.The s
Lets you set up the NortonOnline Backup account oraccess your online backupstatus.wNorton Online Backupmay not be available in someversions of Norton
Shows the user prevalence ofthe file. This data is based onthe information that millionsof Norton Community Watchcustomers shared andSymantec's r
Shows the trust level of thefile.Symantec assigns thefollowing trust levels:1 Norton Trusted -Indicates the file that isNorton Trusted.1 Good - Symant
About Download InsightDownload Insight provides information about thereputation of any executable file that you downloadfrom the supported portals. Th
1 UseNext (Download Manager)1 FDM (Download Manager)1 Adobe Acrobat Reader (PDF viewer)Based on the type of portal you use to download yourfile, Norto
Includes the files that areneither safe nor unsafe.Unknown files have unprovenreputation. These files mightharm your computer. In the caseof an unknow
Lets you cancel the installationof the executable program.Cancel runLets you remove the file fromyour computer.Remove this file from mysystemSecurity
You can use the Download Intelligence option to turnoff or turn on Download Insight.To turn off Download Intelligence1In the Norton Internet Security
1 Notifies you only when you download a file that isinfected with a local virus identification. If the filethat you download is infected with a cloud
Configuring the Show Report on Launch of FilesoptionThe Show Report on Launch of Files option lets youspecify when and for what type of file you want
When you set the Show Reporton Launch of Files option toUnproven Files Only, DownloadInsight prompts you to select asuitable action for unknown fileso
Lets you check the safety ofa Web site.You can also perform a safesearch.wThis option may not beavailable with some versionsof Norton Internet Securit
When you set the Show Reporton Launch of Files option toNever, Download Insight doesnot prompt you to select asuitable action for any type offile that
4Under Download Intelligence, in the Show Reporton Launch of Files row, do one of the following:1 If you want Download Insight to prompt you fora suit
To turn on or turn off Alert on Poor Stability1In the Norton Internet Security main window, clickSettings.2In the Settings window, click the Web tab.3
If you are sure that a device on your network is safe,you use the Edit Device Trust Level window to changethe trust level of the device to Full Trust.
6Click OK.To turn off or turn on an individual Intrusion Preventionnotification1In the Norton Internet Security main window, clickSettings.2In the Set
5In the Intrusion Signatures window, uncheck theattack signatures that you want to exclude.6Click OK.To include the attack signatures that were previo
To turn off or turn on AutoBlock1In the Norton Internet Security main window, clickSettings.2In the Settings window, click the Network tab.3In the lef
5In the Intrusion AutoBlock window, underComputers currently blocked by AutoBlock, doone of the following:1 To unblock one computer, select its IP add
Scanning every request from all the devices that accessyour computer increases the scan time which slowsdown the network speed of your computer.If you
When you exclude a Full Trust device from IntrusionPrevention scan, Norton Internet Security does notscan any information that is received from this d
Lets you access NortonStudio.Norton Studio is an app thatis available on your Windows8 Apps Store. Norton Studiolets you manage your Nortonproducts an
About Vulnerability ProtectionVulnerability Protection is a component of IntrusionPrevention System. Vulnerability Protection providesinformation abou
Viewing the list of vulnerable programsThe Vulnerability Protection window lets you viewthe extensive list of programs with the knownvulnerabilities t
The Program Vulnerability Details list does notinclude any signature that you disable in the IntrusionSignatures window. By default, all the signature
card numbers. These programs can then send yourcompromised data to other people.Adware displays advertisements on your computer andcollects informatio
About Norton AntiSpamNorton AntiSpam lets you categorize the emailmessages that you receive in your email programs intospam email and legitimate email
Norton AntiSpam also automatically imports the listsof addresses from supported email programs duringthe initial integration. It helps you keep your l
1 The option to filter email messages through WebQuery to maintain high spam detection efficiencyConfiguring Client IntegrationThe Client Integration
you want to manually import addresses, use the Importoption in the Allowed List window.When you open your email client, the welcome screenappears. If
6Select one or more address books to be importedautomatically into your Allowed List.7Click OK to save the changes and close the ClientIntegration win
7Click OK to close the AddEmail Address dialog box.8Click OK to save and close the Address BookExclusions window.To edit or delete entries in the Addr
The panes are:Provides you the essentialcomputer protection options.It also contains links to scanyour computer, view thehistory of protection events,
To import an address book1In the Norton Internet Security main window, clickSettings.2In the Settings window, click the Network tab.3In the left pane,
To edit or delete entries in the Allowed List1In the Norton Internet Security main window, clickSettings.2In the Settings window, click the Network ta
To import addresses to the Blocked List1In the Norton Internet Security main window, clickSettings.2In the Settings window, click the Network tab.3In
To edit or delete entries in the Blocked List1In the Norton Internet Security main window, clickSettings.2In the Settings window, click the Network ta
You can use the following options:Marks the selected email as spam and movesthe email message into the Junk folder or theNorton AntiSpam folder.When y
Removes all email that has been placed in theJunk folder or the Norton AntiSpam folder.EmptySpamFolderDisplays the Message Protection section of theSe
4Under AntiSpam, in the Feedback row, select anyone from the following three options:Automatically sends themisclassified email message toSymantec whe
approach to filter spam email messages from legitimateemail messages.The email messages that you receive in your emailprogram undergo scanning through
Norton AntiSpam then sends the email message to youremail program. Based on predefined email rules, theemail program then moves the email message to t
Norton Internet Security lets you manually configureyour POP3 and SMTP email ports for email protection.Typically, your Internet service provider (ISP
Norton License AgreementNorton™ Internet SecurityIMPORTANTPLEASE READ THE TERMSAND CONDITIONS OF THIS LICENSEAGREEMENT (“LICENSE AGREEMENT”)CAREFULLY
You can view the different protection features on theright side of the window. You can move your mousepointer over each feature to view a brief summar
3In the left pane, click Message Protection.4In the Protected Ports Settings row, clickConfigure.5In the Protected Ports window, click Add.6In the Add
About the Network Security MapA home network typically consists of the computersand other devices that share your Internet connection.The Network Secu
1 Wireless Security1 Remote Monitoring1 Network Map1 Trust ControlsYou can click each of the features and read thesummary to learn more about using Ne
Viewing devices on the Network Security MapThe Network SecurityMap window provides a pictorialrepresentation of the devices on the network to whichyou
3If the Product Configuration panel appears, clickContinue.The Product Configuration panel appears whenyou click Network Security Map for the first ti
To view the details of a device on the Network SecurityMap305Protecting Internet activitiesAbout the Network Security Map
4In the NetworkSecurity Map window, click a deviceicon.You can use the scroll arrows to view the devicesthat are listed in the network map.The device
Shows the category to which thedevice belongsThe device category iconprovides details on theconnection status and securitystatus. Norton Internet Secu
Shows the access level that isgranted to a remote device toconnect to your computerThe initial trust level is set basedon the configuration of yourcom
Shows if the device is excludedfrom Intrusion Prevention scan.You can exclude a Full Trustdevice from Intrusion Preventionscan. When you exclude atrus
To respond to System Status indicators from the mainwindow1In the bottom section of the Norton InternetSecurity main window, click Fix Now.2Follow the
3On the left side of the Network Security Mapwindow, under Remote Monitoring, click Setup.4In the Remote Monitoring Setup window, type aPasskey.The Pa
2Under Network Protection, click Network SecurityMap.3On the left side of the Network Security Mapwindow, under Remote Monitoring, click Disable.4In t
The default trust level of the devices that you add tothe Network Security Map is Protected. However, youcan change the trust level of the devices.wIf
Finding a computer's IP addressYou can find a computer's IP address in various ways.On Windows 2000/XP, Windows Vista, Windows 7, andWindows
To find the IP address by using ipconfig on Windows 81On the Apps screen, under Windows System, clickCommand Prompt.2At the command prompt, type ipcon
6In the Category drop-down list, click one of thefollowing device categories:1 GENERIC DEVICE1 DESKTOP PC1 LAPTOP1 SERVER PC1 NETWORK PRINTER1 ROUTER/
Editing network detailsYou can view the details and change the name of yournetwork in the Edit Network Details window.wYou cannot edit the Trust Contr
In addition, the trust level of a device is Shared in anyof the following cases:1 When the computer on the network has one or morefolders or printers
5To select a trust level for a network, in the EditNetwork Trust Level window, click one of thefollowing:Adds the network to the TrustedlistFULL TRUST
Adds the network to theRestricted listThe devices that are onRestricted network cannotcommunicate with yourcomputer. However, you can stilluse the net
1 Safe SurfingTo monitor the protection status of a feature1In the Norton Internet Security main window, clickAdvanced.2In the window that appears, mo
5To select a trust level for a device, in the EditDeviceTrust Level window, click one of the following:Adds a device to the Full TrustlistFull Trust d
Scanning every request from all the devices that accessyour computer increases the scan time which slowsdown the network speed of your computer.If you
4In the Network Security Map window, do one ofthe following:1 To edit the trust level of a device that is on yournetwork, in the network map, click th
When you remove an individual device, the onlinedevices appear again the next time you open theNetwork Security Map. However, Norton InternetSecurity
For more information on how to secure your wirelessnetwork, on the left side of the Network Security Mapwindow, click the Why is it not secure link. F
To view the device details1In the Norton Internet Security main window, clickAdvanced.2Under Network Protection, click Network SecurityMap.3In the Net
To modify the communication port for Network SecurityMap1In the Norton Internet Security main window, clickSettings.2In the Settings window, click the
You can set up one of the following policies for each ofthe network connection that Norton Internet Securityuses to connect to the Internet:1 AutoAllo
the Internet usage of Norton Internet Security. NortonInternet Security connects to the Internet based on thepolicy that you set up in the Network Cos
network bandwidth that Norton Internet Security canuse.To define the Internet usage of Norton Internet Security1In the Norton Internet Security main w
1 Any time after activationIf you skip the Norton Account window duringactivation, you can create a Norton Account anytime after activation. You can c
7Select one of the following:1 AutoAllows Norton Internet Security to receive allproduct and virus definition updates based onthe Windows 8 cost aware
This chapter includes the following topics:1 About securing your sensitive dataAbout securing your sensitive dataThe Internet provides the fastest and
window. The Norton Safe Web feature provides you asafe search environment in the Web by displaying thesite rating icons next to every search result.Wh
view more details about the safety status of the Websites you visit.In addition, the Norton Site Safety pop-up windowincludes information about Symant
Reporting an incorrect evaluation of a Web siteOn rare occasions, Antiphishing may report incorrectevaluation of a Web site. For example, you might vi
navigation to the Web sites that are confirmed to befraudulent.The Norton Site Safety pop-up window helps youunderstand if the Web site that you visit
wNorton Safe Web supports Internet Explorer, Firefox,or Chrome Web browsers.You can view the site safety status of any Web siteusing the FullReport op
Norton Safe Web provides the following Web site safetystates when you browse through the Internet:You can see Norton Secured iconnext to the search re
You can see a red cross (x) iconnext to the search results.When you visit a Web site withthis status, you can see a similarstatus icon on the NortonTo
Norton Safe Web does not havesufficient information about thisWeb site to provide a shoppingsafety rating.UntestedNorton Safe Web has analyzedthis Web
Saves your account informationand your billing details.The Profile options are:1 Account InformationYou can update your NortonAccount information andy
In addition, Norton Safe Web protects your computerwhile you use Facebook. It scans each URL that isavailable on your Facebook Wall and displays theNo
In addition, Norton Safe Search provides the followingfeatures:When you search the Internetusing Norton Safe Search, itanalyzes the security levels of
You can use Norton Safe Search even when you turnoff the Identity Safe features.wNorton Safe Search is supported only in the InternetExplorer, Firefox
4In the Norton Safe Web row, do one of the following:1 To turn off Norton Safe Web, in the Norton SafeWeb row, move the On/Off switch to the rightto t
5In the Scam Insight row, do one of the following:1 To turn off Scam Insight, in the Scam Insightrow, move the On/Off switch to the right to theOff po
Antiphishing also helps to protect you frommalicious Web sites when you perform onlinetransactions.1 Manages your card information when you havemultip
the product expires. This way, you can still view ormanage your login details even after Norton InternetSecurity expires. However, it is not safe to b
1 The computer must be connected to the Internet.The Identity Safe data is stored online using yourNorton Account. You can create only one online vaul
6Click OK.About Identity Safe vaultsYou can create one local vault for each Windows useraccount on your computer. The data that you save andthe Identi
In addition to the features such as saving logins, cards,and notes, you can do the following using your IdentitySafe vault:1 Import your Identity Safe
Norton Online Backupprovides a secure andeasy-to-use online backupsolution that safeguards yourimportant data againstsystem crash, accidentaldeleting,
You can create Identity Safe vaults from the IdentitySafe section of the Settings window. The Identity Safesection is available in the Web tab.Creatin
7In the Re-type Vault Password box, type thepassword again to confirm.8In the Password Hint box, type a hint for thepassword.9Check Store information
5At the bottom of the Set Up Identity Safe window,click Log In to Norton Account.6In the Sign In to Norton Account window, type yourE-mail Address and
5In the Sync Identity Safe Data Online window, inthe Enter the Password box, type the password foryour local vault.6Click Log In to Norton Account.7In
5In the Sync Identity Safe Data Online window, inthe Enter the Password box, type the password foryour local vault.6Click Log In to Norton Account opt
5In the Warning window, click Yes.6In the Settings window, click Apply.7Click OK.Merging portable profile to local vault or online vaultIf you have Id
Importing loginsIdentity Safe lets you import the logins that you havesaved in Internet Explorer. After you set up IdentitySafe vaults, the Identity S
1 You experience a computer failure.1 You forget your Identity Safe password.wIf you forget your Identity Safe password, you cannotrestore it. You can
1 From the Norton ToolbarWith Norton Internet Security, you can access andconfigure all the Identity Safe features even after theproduct expires. The
Logging in to and logging out of Identity SafeYou can log in to or log out of Identity Safe from thefollowing areas of Norton Internet Security:1 The
Creating a Norton AccountYour Norton Account stores the product key and thebilling information of your product. You can alsoregister your product with
4Click Open Vault.To log out of Identity Safe from the Norton Toolbar1Start your Web browser.2On the Norton Toolbar, click Vault Open, and thenclick C
4Under Identity Safe, identify the feature that youwant to use, and click Configure. Your options are:Lets you set up Identity Safevault.Identity Safe
Lets you configure the way youwant Identity Safe to collect,store, and display the logininformation for the Web pagesyou visit.You can configure Ident
Lets you manage your personalinformation such as name, dateof birth, email address, andcredit card information in oneplace.You can use the information
Lets you store and managesensitive information.You can save social securitynumber, driver's license number,insurance policy number, andpassport n
Lets you move your Identity Safedata that you stored in your localvault to online vault.wWhen you sync yourIdentity Safe data from localvault to onlin
1 Lets you quickly launch the Web site login page1 Fills in your login automatically when you revisitWeb pages1 Lets you manually add logins1 Lets you
appears on the top left corner of the Login Assistantwindow.Identity Safe automatically detects login fields whichare not auto filled or filled incorr
2Type your login details, and then click the optionor link that logs you in.Norton Internet Security automatically saves yourlogin details when you en
1 Lets you quickly launch the Web site login page.1 Fills in your login automatically when you revisitWeb pages.1 Lets you manually add logins.1 Lets
To create a Norton Account from the Norton AccountWeb page1In the Norton Internet Security main window, clickAccount.2In the Norton Account Web page t
7Click OK.8In the Username dialog box, in the Enter newusername box, type the user name of the login, andthen, click OK.9In the Information dialog box
10In the confirmation dialog box, click Yes to save thechanges.To delete a login or a folder1In the Norton Internet Security main window, clickSetting
When you save a login, you can do the following:1 Quickly launch the Web site login page using theURL1 Change the URL of the login manuallyEnsure that
7In the Update URL window, in the Enter the newURL here box, type the new URL.Ensure that the URL you modify is valid and isprefixed with HTTP or HTTP
5In the Edit Logins window, under Logins, select theWeb site name for which you want to change thepassword.6Under Details, next to the Password box, c
3Type the new password, and then click the buttonor link that logs you in.4In the Save new password for login? menu bar, clickSave.About Edit CardsThe
Identity Safe automatically detects login fields whichare not auto filled or filled incorrect by Identity safein the Web pages and displays the Need A
3In the left pane, click Identity Safe.4Under Identity Safe, in the Edit Cards row, clickConfigure.5In the Edit Identity Cards window, click Add Card.
Editing, deleting, or duplicating cardsAll the cards that you have saved in Identity Safe arelisted in the Edit Identity Cards window. You canselect,
7Modify the required details that you want to change.8Click Save.9Click Close.To delete a card1In the Norton Internet Security main window, clickSetti
wSymantec products that are older than the 2006product year do not appear in your Norton Account.To access Norton Account1In the Norton Internet Secur
card to fill the Web site with the details that are savedin the card.You can also copy and edit the required fields from theselected card in the Login
5In the Edit Notes window, under Details, in the Titlebox, type a title for the note you want to save.If a note already exists, click CreateNewNotes,
8In the Edit Notes window, click OK.About exporting and importing Identity Safe dataYou can export your Identity Safe data for securitypurposes, data
2In the Settings window, click the Web tab.3In the left pane, click Identity Safe.4Under Identity Safe, in the Export Data row, clickConfigure.5In the
wWhen importing, the file size must not be more than15 MB for .CSV files and 35 MB for .NPM files.To import your data1In the Norton Internet Security
About Browsing OptionsBrowsingOptions lets you configure the way you wantIdentity Safe to collect, store, and display the logininformation for the Web
Lets you save the logincredentials for the Web sitesthat you visit.You can use the followingoptions:1 Yes, Save Automatically1 No, Never Save anylogin
Password Security387Securing your sensitive dataAbout securing your sensitive data
Specify the Identity Safepassword security level.Identity Safe provides fourlevels of security to protectyour Identity Safe password.Choose one of the
period. You can specifythe idle time-out periodas 15, 30, or 45 minutes.Use this option if otherpeople have access toyour computer.1 Ask for my passwo
1 Activate your product using another product key.1 Upgrade your Norton products to the latestavailable version.wThe features listed above vary for di
Changing the Identity Safe passwordYou should change your Identity Safe Passwordregularly to prevent unauthorized access to yourpersonal information i
You have the following options in the NortonToolbar:Lets you access the Web Settingsand other settings.The following options areavailable in the Norto
Lets you access the Identity Safedata stored in your online vault.You can add, edit or delete yourLogins, Cards, and Notes underthis section.You can u
Lets you view the logins andcards that you have saved inIdentity Safe.Some Web sites have forms tofill or require login information.You can use the Va
or disable the Norton Toolbar, and uninstall theNorton Toolbar from your Chrome browser.If the Norton Toolbar is enabled, you can access thefollowing
However, Norton Internet Security notifies you aboutsuspicious and fraudulent Web sites or if an error needsyour attention.To hide or show the Norton
Accessing Identity Safe settings from the Norton ToolbarWhen you install Norton Internet Security, it adds theNorton Toolbar to the Internet Explorer,
2On the NortonToolbar, in the Norton menu, selectone of the following:Lets you report to Symantecabout the current Antiphishingevaluation.Report SiteL
Lets you turn on the Norton SafeWeb feature which provides asafe online browsing experience.The following are the uniquefeatures of Norton Safe Web:1
Accessing the Vault Open/Vault Closed menuThe Vault Open/Vault Closed menu on the NortonToolbar lets you view and manage the logins, Identitycards, an
During the Service Period, Youmay:A. use one copy of the Software on a singleDevice. If a greater number of copies and/ornumber of Devices is specifie
4Type your password that you use for NortonAccount.5Click Go.6Click Manage Devices.To access Norton Management from the Windowsnotification area1Go to
2On the Norton Toolbar, in the Vault Open/VaultClosed menu, select one of the following:Lets you merge the IdentitySafe data from your portableMerge P
Settings401Securing your sensitive dataAbout securing your sensitive data
Lets you view the variousoptions that are available inIdentity Safe.The options are:1 Edit LoginsLets you open the EditLogins window.1 Edit Identity C
autofill the logininformation in the currentWeb page.Lets you open the NortonFeedback Web site.You can submit feedback onyour experience with Identity
Securing your sensitive dataAbout securing your sensitive data404
This chapter includes the following topics:1 About Security HistoryAbout Security HistorySecurity History window lets you do the following:1 View the
window displays details of each item in the Detailspane.Based on their functionalities, Security History broadlyorganizes all categories into the foll
You can view the security items based on the categoryof events that you select and the search string that youprovide. Norton Internet Security restric
You can access Security History from the followingareas:1 Norton Internet Security advanced window1 Various alert windows and notifications1 Notificat
items that are related to the Quarantine feature appearunder Quarantine category in the Security Historywindow. In addition, the Security History wind
3Click Sign In and log on to your account using yourNorton Account email address and password.4On the My Devices page, click Add Device.5In the confir
3In Security History window, in the Show drop-downlist, select the category of items that you want toview. Your options are:The Recent History view in
The security risks include thesuspicious programs that cancompromise the security ofyour computer.The Resolved Security Risksview in the Security Hist
The Security HistoryQuarantine provides a safelocation on your computerwhere you can isolate itemswhile you decide an action totake on them.The Quaran
The firewall monitors thecommunications betweenyour computer and othercomputers on the Internet.The Firewall - Network andConnections category in theS
The firewall monitors thecommunications betweenyour computer and othercomputers on the Internet.The firewall maintains rulesto control Internet access
Download Insight processesany executable file that youdownload for analysis of itsreputation level. It theninforms you about theprocessing results bas
The various features ofIdentity Safe help youmanage your identities andprovide additional securitywhile you perform onlinetransactions.The Identity vi
The performance alertfeature lets you view,monitor, and analyze theimpact of the systemactivities on your computer.The Performance Alert viewin the Se
In some cases, you mighthave submitted evaluation ofcertain Web pages toSymantec.The Sites Reported toSymantec view in theSecurity History windowdispl
Email errors include anyfailure that occurs whenNorton Internet Security triesto send, download, or scan anemail message that you sendor receive.The E
4If you are prompted to provide your email address,in the Email Address box, type the email addressthat you use to log on to your Norton Account, andt
Silent Mode suppresses alertsand notifications andtemporarily suspends mostof the background activities.The Silent Mode view in theSecurity History wi
4Click a row to view details for that item.If you want to view additional information about anitem, click the More Details option in the Detailspane o
The following table lists the categories that providethe advanced details about the Security History items:Displays the followinginformation about the
Actions423Monitoring protection featuresAbout Security History
Displays the actions that areavailable for the selected itemThe options in the Actions viewvary depending on the optionsthat are available in the Show
This action removes therestricted status from theselected computer or fromall of the unclassifiedcomputers on the selectednetwork.This option is avail
1 Stop Notifying MeThis action prevents NortonInternet Security fromnotifying you when it blocksthe selected attack signaturein the future.This option
Security History provides a centralized location whereyou can access the FileInsight windows of the variousevents that are related to Security Risks,
Lets you view the detailedinformation about theunresolved security risks in anorganized way.The Unresolved Security Riskscategory includes the infecte
Lets you view the reputationdetails of a file that youdownload.You can use these details todetermine the safety level of thefile and then decide the a
About the supported devicesTo install and use Norton Internet Security, your devicemust meet the following minimum systemrequirements:Hardware require
You can select a tab to view more details about it. TheFile Insight window provides details about a file in thefollowing tabs:Displays the information
Provides the details about thesuspicious actions performed bythe file on your computer. It alsoprovides information about theresource usage of a proce
Let you return the securityrisk that is quarantined to theoriginal location on yourcomputer.Returns the selectedQuarantine item to itsoriginal locatio
This category includes thesecurity risks or the infectedfiles that Norton InternetSecurity was not able to repair,remove, or quarantine.Unresolved Sec
Takes you to the SymantecSecurity Response Web siteGet helpSends the security risk toSymantecSubmit to SymantecSearching in Security HistoryYou can se
particular security risk. You can then use the Exportoption to save the list in the Security History log. Youcan later import the log file and analyze
5In the Save As dialog box that appears, navigate toa location and specify the name for the file.The category name in the Show drop-down listappears a
The Security History Quarantine includes the followinggroups of items:Includes the items suchas spyware and adwarethat are generally low riskand that
3In the Threat Detected window, select the actionthat you want to perform. Some of the options are:Returns the security risk thatis quarantined to the
Adding an item to the QuarantineSecurity History Quarantine provides a safe locationon your computer in which you can isolate items whileyou decide on
Service Pack 1 and232-bit and 64-bitversions1 MicrosoftWindows VistaHome Basic1 MicrosoftWindows VistaHome Premium1 MicrosoftWindows VistaUltimate1 Mi
to regain the functionality of a program that requiresthe risk program to run.For example, a shareware or freeware program thatyou download may use ad
Manually submitting an item to SymantecWhen a virus or other risk is detected, it isautomatically submitted to Symantec SecurityResponse Web site for
Monitoring protection featuresAbout Security History442
This chapter includes the following topics:1 Feature summary1 About turning off automatic features1 About customizing settings and optionsFeature summ
downloads, and other files are scanned for viruses andother potential risks. In addition, the definition updatesthat Automatic LiveUpdate downloads wh
Detects viruses, spyware, andother security risks incompressed files during manualscans.See “What to do if a security riskis found” on page 199.Compre
Scans for and detects viruses ininstant messenger attachments.Scans the instant messengerattachments for the supportedinstant messenger programsthat w
About spyware and other security risk protectionfeaturesSpyware and other security risk protection featuresprovide protection against the latest secur
If you are unsure how tohandle a program that isclassified as a security risk,you can view the security riskassessment. The security riskassessment de
Detects when your computerconnects to a new network.You can then allow or blockconnections from allcomputers that areconnected to that network.See “Ab
Supported Norton productsTo use all the features of Norton Internet Security, youmust use the following versions of Norton securityproduct:If you use
1 Uses a user-defined address listto expedite the scanning of email.1 Accepts all email messages fromsenders in the Allowed List.1 Treats all email me
Norton Online Family helps parents to get a betterunderstanding of what children do online, so that theycan better protect and guide them.You can use
1 Monitor and manage the Internet search that yourchildren perform.1 Define House Rules for your children based on theirage and maturity.wNorton Onlin
In some cases, Auto-Protect might warn you about avirus-like activity that you know are not the work of avirus. If you perform such an activity and wa
To control these spam mails you can use the spamfiltering. By default, spam protection remains active.If for any reason you want to disable it, you ca
wNorton Community Watch collects and submits detaileddata about the Norton-specific errors and componentsonly. It does not collect or store any person
2In the Settings window, click the Network tab.3In the left pane, click Intrusion Prevention.4In the Intrusion Prevention row, move the On/Offswitch t
To turn off Web settings1In the Norton Internet Security main window, clickSettings.2In the Settings window, click the Web tab, and dothe following:1
2In the Settings window, click the Web tab, and dothe following:1 In the Browser Protection section, in theBrowser Protection row, move the On/Offswit
Configuring Norton Internet Security settingsThe default Norton Internet Security settings providea safe, automatic, and efficient way to protect your
1 Identified malicious software such as portableexecutable files and running processes1 Any Web site URL that your product identifies asfraudulent1 Al
2In the Settings window, configure your settings inthe following tabs:Lets you configure howyou want Norton InternetComputerSecurity to scan yourcompu
Lets you configure howyou want Norton InternetSecurity to monitor yournetwork activities.You can protect yourcomputer against thethreats that you migh
Lets you safeguard yoursensitive information andonline transactions.You can manage yourlogin information, such asemail login credentialsand your finan
Lets you configure theappearance and securityof your product.In addition, you canconfigure how NortonInternet Security submitsrisk details to Symantec
scan your computer for viruses and other securitythreats.Your options are:AntiVirus and SONARExclusions options let youspecify the items that NortonIn
Norton Internet Security lets yourun different types of scans todetect and prevent any virusinfection on your computer.You can use the variousComputer
Real Time ProtectionCustomizing protection featuresAbout customizing settings and options466
Real Time Protection optionprotects your computer bycontinuously checking forviruses and other security risks.You can use the Real TimeProtection opti
SONAR Protection1Symantec Online Network forAdvanced Response (SONAR)provides you with real-timeprotection against threats byproactively detectingunkn
1 Early Launch Anti-MalwareProtectionThis feature provides betterprotection by running all thenecessary components ofNorton Internet Security thatbloc
If you chose not to join Norton Community Watch whenyou installed your Norton product, you can turn it onlater. To access the NortonCommunityWatch opt
UpdatesCustomizing protection featuresAbout customizing settings and options470
Norton Internet Securityprotects your computer fromvulnerabilities through the latestprogram and definition updates.Definition updates contain theinfo
latest available version andprompts you for freeinstallation. To get the latestversion, this option must beturned on.wThis feature may notwork in some
1 Apply updates only onrebootLets you choose how theprogram updates obtainedby Automatic LiveUpdateneed to be applied to yourcomputer. Certain program
Your options are:Intrusion PreventionCustomizing protection featuresAbout customizing settings and options474
Intrusion Prevention scans allthe network traffic to and fromyour computer and comparesthis information against a set ofattack signatures. Attacksigna
Message ProtectionCustomizing protection featuresAbout customizing settings and options476
Message Protection protectsyour computer against thethreats that you may receivethrough email attachments. Youcan use the Email Antivirus Scanoption,
your computer with whichyou want to integrate NortonAntiSpam.1 Send feedback about anymisclassified email messageto Symantec for analysis.1 Classify t
Network SecuritySettings479Customizing protection featuresAbout customizing settings and options
Norton Bootable Recovery Tool detects and resolvesthe following security threats:Programs that infect anotherprogram, boot sector,partition sector, or
The Network Cost Awarenessoption lets you set up policiesand restrict the Internet usageof Norton Internet Security. Youcan define the amount ofnetwor
related to the computers ordevices that are on yournetwork.1 Grant or deny permissions tothe networked devices toaccess your computer.1 Add or Remove
Smart Firewall monitorscommunications between yourcomputer and the othercomputers on the Internet. Italso protects your computerfrom common security p
Your options are:The Browser Protection featurechecks for browservulnerabilities in the followingbrowsers:1 Internet Explorer 7.0 or later1 Firefox 10
The Identity Safe feature inNorton Internet Security lets yousave and protect your logins.Identity Safe provides you thefollowing features:1 Export Id
By using General settings, you can do the following:1 Schedule your Norton Tasks.1 Configure the General settings of your product.1 Monitor the perfor
Your options are:Norton TasksCustomizing protection featuresAbout customizing settings and options486
Lets you configure yourNorton Tasks settings.Your options are:1 Automatic Resume DelayFrom Sleep orHibernationThis option delays theautomatic backgrou
defragment your bootvolume or the local diskthat contains the bootvolume when yourcomputer is idle.When the option is turnedon, Norton InternetSecurit
Other Settings489Customizing protection featuresAbout customizing settings and options
Programs that track systemactivity, gather systeminformation, or track userhabits, and relay thisinformation to third-partyorganizations. Theinformati
Lets you configure themiscellaneous settings.Your options are:1 Power Saving ModeLets you save your batterypower by suspending theNorton Tasks when yo
most recent definitions.1 Norton CommunityWatchLets you submit selectedsecurity and applicationdata to Symantec foranalysis. Symantecanalyses the data
1 Remote ManagementLets you remotely viewyour device’s securitystatus and fix somesecurity issues by usingNorton Management,Norton One, and NortonStud
1 Parental Controls havenot been installedLets you install NortonOnline Family.Norton Online Family is aparental controlapplication that helps youprot
Performance MonitoringCustomizing protection featuresAbout customizing settings and options494
Lets you monitor theperformance of yourcomputer.1 Performance MonitoringWhen you turn on thePerformance Monitoringoption, Norton InternetSecurity moni
Log Only, or the Offmode. The Details &Settings link in thenotification alert letsyou view additionaldetails about theresource consumptionby the p
2 Alert for High-Usageof:2 CPUWhen this optionis turned on,Norton InternetSecurity detectsand notifies youwith the details ofincreased usage ofthe CPU
about theincreased usage ofhandles by anyprogram orprocess.2 Program ExclusionsLets you selectspecific programs toexclude fromappearing inperformance
Product Security499Customizing protection featuresAbout customizing settings and options
to protect Symantec against software piracy.This Software may contain enforcementtechnology that limits the ability to installand uninstall the Softwa
You can download Norton Bootable Recovery ToolWizard in one of the following ways:1 From the Start menu.1 From the Norton Support Web site.To download
Lets you protect NortonInternet Security fromunauthorized changes.Your options are:1 Non-Admins Access toSettingsLets you access andconfigure all the
to view or configure yourproduct settings.However, if you forgetyour settings password,you can reset thepassword in the windowthat appears when youcho
Silent Mode SettingsCustomizing protection featuresAbout customizing settings and options502
Lets you turn on or turn offSilent Mode.Your options are:1 Silent ModeWhen you turn on theSilent Mode option, SilentMode is enabled for aspecified dur
turns on Quiet Mode.When Quiet Mode isturned on, NortonInternet Securitysuppresses thebackground activitiesbut continues todisplay alerts andnotificat
2 User-SpecifiedProgramsWhen you run anapplication that islisted in theUser-SpecifiedPrograms list, NortonInternet Securitydetects the activity,and au
wYou cannot run System Restore on your computer whenNorton Product Tamper Protection is turned on. Youmust temporarily turn off Norton Product TamperP
To turn on Norton Product Tamper Protection1In the Norton Internet Security main window, clickSettings.2In the Settings window, click the General tab.
wThe reset settings password option appears in theSelect your Uninstall Preference window only whenthe SettingsPassword Protection option is turned on
6In the dialog box that appears, in the Password box,type a password.7In the Confirm Password box, type the passwordagain.8Click OK.9In the Settings w
About locating your Norton Product Key or activationPINTo use Norton Bootable Recovery Tool, you must startthe computer from any of the following reco
your Norton Internet Security Settings password usingthe reset settings password option in the SelectUninstall Preference window.To access the Select
4At the bottom of the Select Your UninstallPreference window, click reset settings password.5In the dialog box that appears, in the ResetPassword Key
Norton Account. Your device needs to be connected tothe Internet to use Remote Management feature. Whenthe Remote Management option is turned on, Nort
2 Timestamp of last Quick Scan2 Timestamp when stats were published1 View health states of different components of yourdevice2 Overall product health2
By default, this feature is disabled unless you registeryour Norton Internet Security with your NortonAccount.When the Remote Management option is tur
This chapter includes the following topics:1 Finding the version number of your product1 Finding the End-User License Agreement1 About upgrading your
Finding the End-User License AgreementEnd-User License Agreement (EULA) is a legaldocument that you agree to while installing theproduct. EULA contain
> Updates > Automatic Download of New Version >On.If you choose to install the latest version of the product,Norton Internet Security downloa
The upgrade process might not work if your Webbrowser is incompatible to communicate with theSymantec servers.wYour product must be activated and you
wYour product must be activated and you need anInternet connection to check if a new version isavailable and install new version of the product.To che
1 If you received your Norton product preinstalledby the computer manufacturer, the Product Key isavailable on your Norton Account. When you areprompt
When you click the Get Support option in the Supportdrop-down menu, Norton Internet Security checks yourInternet connection. To access Norton Autofix,
To solve a problem if your computer is unable to connectto the Internet1In the Norton Internet Security main window, clickSupport.2In the Support drop
1 Newsletter to which you can subscribe.1 Protection blog that lets you post your owncomments and view comments from experts.wThe Symantec Web site is
About SupportIf you have purchased Norton Internet Security, youcan access Support from the product.wSupport offerings may vary based on the language
contact the technical support team in the followingways:Chat in real time with asupport representative.For more complex technicalissues, chat offers t
also use the SearchSupport box to find solution usinga keyword.Norton Support Web site also contains useful links tothe product manual, the Norton Acc
http://www.norton.com/supportGetting support by phoneWhen you click the Get Support option in the Supportdrop-down menu, Norton Autofix performs a Qui
4Click the Contact Us option at the bottom of theWeb page and follow the on-screen instructions.Support policySymantec recommends that you have the la
www.norton.com/supportIf you are a Norton One Premium Member, go to thefollowing Norton One support Web site for informationon this topic:https://one.
About uninstallingTo remove your Symantec product from your computer,use the Add/Remove Programs option in the WindowsControl Panel.You must restart y
Creating Norton Bootable Recovery Tool on a CD orDVDNorton Bootable Recovery Tool is integrated withWindows Preinstallation Environment (WinPE).Theref
wYour computer must be connected to the Internet toavail this option. Norton Internet Security does notoffer to leave the Norton Toolbar if you upgrad
4In the page that appears, under Select YourUninstall Preference, click one of the following:Lets you retain your settings,passwords, and preferences
To uninstall Norton Internet Security from the Startmenu1Do one of the following:1 On the Windows taskbar click Start > AllPrograms > Norton Int
5Do one of the following:1 Click RestartNow (recommended) to restart thecomputer.1 Click RestartLater to restart the computer later.Norton Internet Se
Finding additional solutionsAbout uninstalling534
Aabout customer support 523accessingFacebook Scan 133accessing Norton Internet SecurityscansComputer Scan 133Reputation Scan 133Actions windowdeleting
Antispywaremanaging using the mainwindow 283Application Ratingscheck trust level 118Scan Performance Profiles 120attack signatures 272attacksnetwork 2
CPU usageviewing 95Creating custom scansadding files 141adding folders 141Crimeware Protectionturning off or turning on 456custom scanconfigure scan o
features (continued)security risk protection 447FeedbackNorton AntiSpam 295file extensionsof infected files 208filterimporting allowed 289Web Query 29
importlogins 356Insight Networkabout 152cloud computing 152Insight Network scan 152Quick Scan 152scan 152shortcut menu scan 152Single File Scan 152Ins
Creating Norton Bootable Recovery Tool ISO fileYou can create a Norton Bootable Recovery Tool ISOfile on your computer. You can burn this ISO file to
Manual Repairreviewing remaining risksin 208Manual Repair windowreviewing remaining risksin 136, 138Media Center ExtenderSilent Mode 186Memory graphab
Norton Community Watch(continued)turning off or turning on 454Norton Firewall Diagnosisabout 255Norton Insightabout 112Files of Interest 115refreshing
OOffice documentsembedded objects 181scanning office documents 181turn on or turn off 182virus macros 181One Click Supportusing 520Online transactions
Program Control (continued)turning on and off 219Program rulesadding 224changing 233removing 237program updates 65programsadding to Program Control 22
risksintrusions 212port scans 212ruleschanging 225, 233creating 224–225Running custom scansscanning required files 144scanning required folders 144run
Security History (continued)recent alert history 408searching 434security risks 408submission, items toSymantec 408suspicious email 408traffic alerts
startup files 200startup itemsdelaying and running 100disabling or enabling 99Startup Managerabout 97delaying and running delayeditems 100disabling or
version numberchecking 515virus protectionabout 443system scans 136updates 443virusesautomatic protection 443descriptions 443unknown 443Vulnerability
fooNorton from Symantec products protect consumers from traditional threats with antivirus, antispam, and Spyware Protection.They also protect against
To create Norton Bootable Recovery Tool on a USB key1Insert the USB key into the USB port of yourcomputer.2In the Norton Bootable RecoveryTool Wizard
If you have a valid Norton product key or activationPIN, you can go to your Norton Account and access theNorton Bootable Recovery Tool download link.T
Norton Bootable Recovery Tool automaticallydownloads the latest virus definitions from Symantecservers and uses these virus definitions to secure your
4Read the Norton License Agreement, type yourProduct Key, and then click I Agree.If you use a non-QWERTY keyboard, use the VirtualKeyboard option to e
To update Norton Bootable Recovery Tool virusdefinitions on a USB key1Insert your Norton Bootable Recovery Tool USB keyinto the USB port of your compu
8. Disclaimer of Damages:SOME STATES AND COUNTRIES DO NOTALLOWTHE LIMITATIONOR EXCLUSIONOF LIABILITY FOR INCIDENTAL ORCONSEQUENTIAL DAMAGES, SO THEBEL
2In the page that appears, click Download NortonPower Eraser.3Save the NPE.exe file to your Desktop.4Double-click the NPE.exe file on your Desktop.5Re
Starting Norton Internet Security from thecommand promptIf you work from the command line (for example,writing a script or code), you can start Norton
and notifications appear over the notification area ofyour computer. In most cases, you can click the linkavailable in the alert to view the details a
About Norton Internet Security shortcut menuNorton Internet Security performs backgroundactivities to keep your computer secure. The icon inthe notifi
Lets you turn on or turn offSilent Mode.Turn on/Turn off SilentModeLets you turn off or turn on thefirewall.Disable/Enable SmartFirewallLets you turn
download the latest updates. To configure the proxysettings of your network, go to the Norton InternetSecurity main window, and then click Settings &g
The type of definition updates that each of theSymantec products receive are as follows:Users of these productsreceive the latest virusdefinitions fro
Users of these productsreceive the latest virusdefinitions fromSymantec that protectsyour computer from alltypes of security threats.In addition, user
Contains the most importantvirus definitions that arerequired for latest securitythreats as viewed by Symantec.The Core Set is a subset of theComplete
As the Smart Definitions are of considerably smallersize, it results in lesser download time, lesserinstallation time, lesser boot time, and lesser me
“NOTICE OF CLAIM”. The Notice of Claimshould include both the mailing address andemail address You would like Symantec touse to contact You. If Symant
These downloads are called Pulse Updates. The PulseUpdates are lighter and faster than AutomaticLiveUpdate. It keeps your computer secure from theongo
updates periodically, which are enhancements to theproduct. Program updates are usually created to fixprogram errors, improve the performance of thepr
you can acquire the product and maintain your statusare as follows:The product includes a limited-timesubscription to definition updates. Whenthe subs
run LiveUpdate manually to obtain updates if you haveturned off the Automatic LiveUpdate option.wIf you are connected to the Internet, AutomaticLiveUp
Turning on or turning off Apply updates only on rebootLiveUpdate obtains latest definition updates and theprogram updates that keep your computer secu
4In the Settings window, click Apply.5Click OK.About Pulse UpdatesIn addition to the definition updates that AutomaticLiveUpdate downloads, Norton Int
You must be connected to the Internet to obtain latestdefinition updates by using Pulse Updates. You canturn on or turn off Pulse Updates only if Auto
PAC file contains the code that lets your browser knowabout the proxy settings for different Web sites overthe Internet. It also contains the words wh
Lets you provide the details ofyour Proxy Settings.Under Proxy Settings, check Usea proxy server for your HTTPconnections, and do thefollowing:1 In th
5In the Network Proxy Settings window, do thefollowing:1 If you want your browser to automatically detectnetwork connection settings, under AutomaticC
may only be modified by the Documentationor by a written document that has beensigned by both You and Symantec. ShouldYou have any questions concernin
Getting startedAbout Network Proxy Settings80
This chapter includes the following topics:1 About System InsightAbout System InsightNorton Internet Security continuously monitors yourcomputer to ke
disk optimizations, threat detections, performancealerts, or Quick Scans. The graph displays theactivities as icon or stripe, and the description fore
The Norton Tasks window provides the details suchas the timestamp, the duration, and the status ofthe background jobs. The details also include thetyp
window. The Events graph at the top of thePerformance window displays each activity as icon orstripe. The description for each icon or stripe appearsa
Provides the details about thethreat detection activities thatNorton Internet Securityperformed on your system overa period of the last threemonths.Th
Provides the details about QuickScans that Norton InternetSecurity performed on yoursystem over a period of the lastthree months.The details include t
To view details of your system activities1In the Norton Internet Security main window, clickPerformance.2In the Performance window, at the top of the
exceeds the defined threshold limit, Norton InternetSecurity alerts you with a performance alert.You can use the Resource Threshold Profile forAlertin
You can use the following options to configureperformance alerts:Turns off performance alerts.Select this option if you donot want Norton InternetSecu
Chapter 1 Getting started ... ... . ... . ... . .. 13Activation protects you ... . ... ... ... 13About Norton Int
To configure performance alerts1In the Norton Internet Security main window, clickSettings.2In the Settings window, click the General tab.3In the left
your system resource, Norton Internet Security notifiesyou with a performance alert.To configure the resource threshold profile1In the Norton Internet
minimum resource usage. By reducing resource usage,your computer gains longer battery life and becomesmore energy efficient.You can configure a low th
Excluding programs from performance alertsNorton Internet Security lets you exclude programsfrom performance alerts. You can add the programsthat cons
2In the Settings window, click the General tab.3In the left pane, click Performance Monitoring.4Under Performance Monitoring, in the ProgramExclusions
graph for the last 10 minutes. If you select the 1Doption, Norton Internet Security displays a historicaldata of the last one day.When you click at an
graph for the last 10 minutes. If you select the 1Woption, Norton Internet Security displays the CPUgraph and memory graph for the last one week.wBy d
Identifying resource-consuming processesYou can click at any point on the CPU graph or memorygraph to obtain a list of top three processes thatconsume
1 Windows System files (.sys)1 Dynamic link library files (.dll)1 ActiveX control files (.ocx)Norton Internet Security displays the community usagedet
1 When you update a program that can possibly resetall startup settings to default.1 When you use another program to manage yourstartup programs.1 Whe
Comments to this Manuals